<?xml version="1.0" encoding="utf-8"?>
	<updates>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-8001</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38001-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38001-8.0/" type="self" id="ROS-20251215-8001" title="ROS-20251215-8001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38001" type="cve" id="CVE-2025-38001" title="CVE-2025-38001" />
			<reference href="https://bdu.fstec.ru/vul/2025-12349" type="self" id="BDU:2025-12349" title="BDU:2025-12349" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-8002</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-11714-8.0/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-11714-8.0/" type="self" id="ROS-20251215-8002" title="ROS-20251215-8002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11714" type="cve" id="CVE-2025-11714" title="CVE-2025-11714" />
			<reference href="https://bdu.fstec.ru/vul/2025-13250" type="self" id="BDU:2025-13250" title="BDU:2025-13250" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.red80" arch="x86_64" src="firefox-115.30.0-1.red80.src.rpm">
					<filename>firefox-0:115.30.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.red80" arch="aarch64" src="firefox-115.30.0-1.red80.src.rpm">
					<filename>firefox-0:115.30.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-8003</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость advancecomp </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в advancecomp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-advancecomp-cve-2023-2961-8.0/</description>
               <solution>Установить обновление для пакета(ов) advancecomp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-advancecomp-cve-2023-2961-8.0/" type="self" id="ROS-20251215-8003" title="ROS-20251215-8003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2961" type="cve" id="CVE-2023-2961" title="CVE-2023-2961" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="advancecomp" epoch="0" version="2.6" release="1.red80" arch="x86_64" src="advancecomp-2.6-1.red80.src.rpm">
					<filename>advancecomp-0:2.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="advancecomp" epoch="0" version="2.6" release="1.red80" arch="aarch64" src="advancecomp-2.6-1.red80.src.rpm">
					<filename>advancecomp-0:2.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-8004</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость wget </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wget</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-wget-cve-2024-10524-8.0/</description>
               <solution>Установить обновление для пакета(ов) wget
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-wget-cve-2024-10524-8.0/" type="self" id="ROS-20251215-8004" title="ROS-20251215-8004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10524" type="cve" id="CVE-2024-10524" title="CVE-2024-10524" />
			<reference href="https://bdu.fstec.ru/vul/2024-10463" type="self" id="BDU:2024-10463" title="BDU:2024-10463" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="wget" epoch="0" version="1.25.0" release="1.red80" arch="x86_64" src="wget-1.25.0-1.red80.src.rpm">
					<filename>wget-0:1.25.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="wget" epoch="0" version="1.25.0" release="1.red80" arch="aarch64" src="wget-1.25.0-1.red80.src.rpm">
					<filename>wget-0:1.25.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-8005</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость phpldapadmin </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в phpldapadmin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-phpldapadmin-cve-2024-9101-8.0/</description>
               <solution>Установить обновление для пакета(ов) phpldapadmin
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-phpldapadmin-cve-2024-9101-8.0/" type="self" id="ROS-20251215-8005" title="ROS-20251215-8005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9101" type="cve" id="CVE-2024-9101" title="CVE-2024-9101" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="phpldapadmin" epoch="0" version="2.3.4" release="1.red80" arch="noarch" src="phpldapadmin-2.3.4-1.red80.src.rpm">
					<filename>phpldapadmin-0:2.3.4-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-8006</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость cifs-utils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в cifs-utils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-cifs-utils-cve-2025-2312-8.0/</description>
               <solution>Установить обновление для пакета(ов) cifs-utils
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-cifs-utils-cve-2025-2312-8.0/" type="self" id="ROS-20251215-8006" title="ROS-20251215-8006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2312" type="cve" id="CVE-2025-2312" title="CVE-2025-2312" />
			<reference href="https://bdu.fstec.ru/vul/2025-10951" type="self" id="BDU:2025-10951" title="BDU:2025-10951" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="cifs-utils" epoch="0" version="6.15" release="4.red80" arch="x86_64" src="cifs-utils-6.15-4.red80.src.rpm">
					<filename>cifs-utils-0:6.15-4.red80.x86_64.rpm</filename>
				</package>
				<package name="cifs-utils-devel" epoch="0" version="6.15" release="4.red80" arch="x86_64" src="cifs-utils-6.15-4.red80.src.rpm">
					<filename>cifs-utils-devel-0:6.15-4.red80.x86_64.rpm</filename>
				</package>
				<package name="cifs-utils-info" epoch="0" version="6.15" release="4.red80" arch="x86_64" src="cifs-utils-6.15-4.red80.src.rpm">
					<filename>cifs-utils-info-0:6.15-4.red80.x86_64.rpm</filename>
				</package>
				<package name="pam_cifscreds" epoch="0" version="6.15" release="4.red80" arch="x86_64" src="cifs-utils-6.15-4.red80.src.rpm">
					<filename>pam_cifscreds-0:6.15-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="cifs-utils" epoch="0" version="6.15" release="4.red80" arch="aarch64" src="cifs-utils-6.15-4.red80.src.rpm">
					<filename>cifs-utils-0:6.15-4.red80.aarch64.rpm</filename>
				</package>
				<package name="cifs-utils-devel" epoch="0" version="6.15" release="4.red80" arch="aarch64" src="cifs-utils-6.15-4.red80.src.rpm">
					<filename>cifs-utils-devel-0:6.15-4.red80.aarch64.rpm</filename>
				</package>
				<package name="cifs-utils-info" epoch="0" version="6.15" release="4.red80" arch="aarch64" src="cifs-utils-6.15-4.red80.src.rpm">
					<filename>cifs-utils-info-0:6.15-4.red80.aarch64.rpm</filename>
				</package>
				<package name="pam_cifscreds" epoch="0" version="6.15" release="4.red80" arch="aarch64" src="cifs-utils-6.15-4.red80.src.rpm">
					<filename>pam_cifscreds-0:6.15-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251215-8007</id>
		<issued date="2025-12-15" />
		<updated date="2025-12-15" />
		<title>Уязвимость yelp </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в yelp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-yelp-cve-2025-3155-8.0/</description>
               <solution>Установить обновление для пакета(ов) yelp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-yelp-cve-2025-3155-8.0/" type="self" id="ROS-20251215-8007" title="ROS-20251215-8007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3155" type="cve" id="CVE-2025-3155" title="CVE-2025-3155" />
			<reference href="https://bdu.fstec.ru/vul/2025-03944" type="self" id="BDU:2025-03944" title="BDU:2025-03944" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="yelp" epoch="2" version="42.2" release="3.red80" arch="x86_64" src="yelp-42.2-3.red80.src.rpm">
					<filename>yelp-2:42.2-3.red80.x86_64.rpm</filename>
				</package>
				<package name="yelp-devel" epoch="2" version="42.2" release="3.red80" arch="x86_64" src="yelp-42.2-3.red80.src.rpm">
					<filename>yelp-devel-2:42.2-3.red80.x86_64.rpm</filename>
				</package>
				<package name="yelp-libs" epoch="2" version="42.2" release="3.red80" arch="x86_64" src="yelp-42.2-3.red80.src.rpm">
					<filename>yelp-libs-2:42.2-3.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="yelp" epoch="2" version="42.2" release="3.red80" arch="aarch64" src="yelp-42.2-3.red80.src.rpm">
					<filename>yelp-2:42.2-3.red80.aarch64.rpm</filename>
				</package>
				<package name="yelp-devel" epoch="2" version="42.2" release="3.red80" arch="aarch64" src="yelp-42.2-3.red80.src.rpm">
					<filename>yelp-devel-2:42.2-3.red80.aarch64.rpm</filename>
				</package>
				<package name="yelp-libs" epoch="2" version="42.2" release="3.red80" arch="aarch64" src="yelp-42.2-3.red80.src.rpm">
					<filename>yelp-libs-2:42.2-3.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8001</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость GraphicsMagick </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в GraphicsMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-graphicsmagick-cve-2025-27795-8.0/</description>
               <solution>Установить обновление для пакета(ов) GraphicsMagick
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-graphicsmagick-cve-2025-27795-8.0/" type="self" id="ROS-20251216-8001" title="ROS-20251216-8001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27795" type="cve" id="CVE-2025-27795" title="CVE-2025-27795" />
			<reference href="https://bdu.fstec.ru/vul/2025-03871" type="self" id="BDU:2025-03871" title="BDU:2025-03871" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="GraphicsMagick" epoch="0" version="1.3.46" release="1.red80" arch="x86_64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-0:1.3.46-1.red80.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-c++" epoch="0" version="1.3.46" release="1.red80" arch="x86_64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-c++-0:1.3.46-1.red80.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-c++-devel" epoch="0" version="1.3.46" release="1.red80" arch="x86_64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-c++-devel-0:1.3.46-1.red80.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-devel" epoch="0" version="1.3.46" release="1.red80" arch="x86_64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-devel-0:1.3.46-1.red80.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-doc" epoch="0" version="1.3.46" release="1.red80" arch="x86_64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-doc-0:1.3.46-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="GraphicsMagick" epoch="0" version="1.3.46" release="1.red80" arch="aarch64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-0:1.3.46-1.red80.aarch64.rpm</filename>
				</package>
				<package name="GraphicsMagick-c++" epoch="0" version="1.3.46" release="1.red80" arch="aarch64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-c++-0:1.3.46-1.red80.aarch64.rpm</filename>
				</package>
				<package name="GraphicsMagick-c++-devel" epoch="0" version="1.3.46" release="1.red80" arch="aarch64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-c++-devel-0:1.3.46-1.red80.aarch64.rpm</filename>
				</package>
				<package name="GraphicsMagick-devel" epoch="0" version="1.3.46" release="1.red80" arch="aarch64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-devel-0:1.3.46-1.red80.aarch64.rpm</filename>
				</package>
				<package name="GraphicsMagick-doc" epoch="0" version="1.3.46" release="1.red80" arch="aarch64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-doc-0:1.3.46-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8002</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость GraphicsMagick </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в GraphicsMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-graphicsmagick-cve-2025-27796-8.0/</description>
               <solution>Установить обновление для пакета(ов) GraphicsMagick
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-graphicsmagick-cve-2025-27796-8.0/" type="self" id="ROS-20251216-8002" title="ROS-20251216-8002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27796" type="cve" id="CVE-2025-27796" title="CVE-2025-27796" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="GraphicsMagick" epoch="0" version="1.3.46" release="1.red80" arch="x86_64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-0:1.3.46-1.red80.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-c++" epoch="0" version="1.3.46" release="1.red80" arch="x86_64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-c++-0:1.3.46-1.red80.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-c++-devel" epoch="0" version="1.3.46" release="1.red80" arch="x86_64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-c++-devel-0:1.3.46-1.red80.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-devel" epoch="0" version="1.3.46" release="1.red80" arch="x86_64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-devel-0:1.3.46-1.red80.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-doc" epoch="0" version="1.3.46" release="1.red80" arch="x86_64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-doc-0:1.3.46-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="GraphicsMagick" epoch="0" version="1.3.46" release="1.red80" arch="aarch64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-0:1.3.46-1.red80.aarch64.rpm</filename>
				</package>
				<package name="GraphicsMagick-c++" epoch="0" version="1.3.46" release="1.red80" arch="aarch64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-c++-0:1.3.46-1.red80.aarch64.rpm</filename>
				</package>
				<package name="GraphicsMagick-c++-devel" epoch="0" version="1.3.46" release="1.red80" arch="aarch64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-c++-devel-0:1.3.46-1.red80.aarch64.rpm</filename>
				</package>
				<package name="GraphicsMagick-devel" epoch="0" version="1.3.46" release="1.red80" arch="aarch64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-devel-0:1.3.46-1.red80.aarch64.rpm</filename>
				</package>
				<package name="GraphicsMagick-doc" epoch="0" version="1.3.46" release="1.red80" arch="aarch64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-doc-0:1.3.46-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0006</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость GraphicsMagick </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в GraphicsMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-graphicsmagick-cve-2025-32460-8.0/</description>
               <solution>Установить обновление для пакета(ов) GraphicsMagick
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-graphicsmagick-cve-2025-32460-8.0/" type="self" id="ROS-20251216-80-0006" title="ROS-20251216-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32460" type="cve" id="CVE-2025-32460" title="CVE-2025-32460" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="GraphicsMagick" epoch="0" version="1.3.46" release="1.red80" arch="x86_64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-0:1.3.46-1.red80.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-c++" epoch="0" version="1.3.46" release="1.red80" arch="x86_64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-c++-0:1.3.46-1.red80.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-c++-devel" epoch="0" version="1.3.46" release="1.red80" arch="x86_64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-c++-devel-0:1.3.46-1.red80.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-devel" epoch="0" version="1.3.46" release="1.red80" arch="x86_64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-devel-0:1.3.46-1.red80.x86_64.rpm</filename>
				</package>
				<package name="GraphicsMagick-doc" epoch="0" version="1.3.46" release="1.red80" arch="x86_64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-doc-0:1.3.46-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="GraphicsMagick" epoch="0" version="1.3.46" release="1.red80" arch="aarch64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-0:1.3.46-1.red80.aarch64.rpm</filename>
				</package>
				<package name="GraphicsMagick-c++" epoch="0" version="1.3.46" release="1.red80" arch="aarch64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-c++-0:1.3.46-1.red80.aarch64.rpm</filename>
				</package>
				<package name="GraphicsMagick-c++-devel" epoch="0" version="1.3.46" release="1.red80" arch="aarch64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-c++-devel-0:1.3.46-1.red80.aarch64.rpm</filename>
				</package>
				<package name="GraphicsMagick-devel" epoch="0" version="1.3.46" release="1.red80" arch="aarch64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-devel-0:1.3.46-1.red80.aarch64.rpm</filename>
				</package>
				<package name="GraphicsMagick-doc" epoch="0" version="1.3.46" release="1.red80" arch="aarch64" src="GraphicsMagick-1.3.46-1.red80.src.rpm">
					<filename>GraphicsMagick-doc-0:1.3.46-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8004</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость gnuplot </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gnuplot</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gnuplot-cve-2025-31180-8.0/</description>
               <solution>Установить обновление для пакета(ов) gnuplot
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gnuplot-cve-2025-31180-8.0/" type="self" id="ROS-20251216-8004" title="ROS-20251216-8004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31180" type="cve" id="CVE-2025-31180" title="CVE-2025-31180" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gnuplot" epoch="0" version="6.0.3" release="1.red80" arch="x86_64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-0:6.0.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-common" epoch="0" version="6.0.3" release="1.red80" arch="x86_64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-common-0:6.0.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-minimal" epoch="0" version="6.0.3" release="1.red80" arch="x86_64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-minimal-0:6.0.3-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gnuplot" epoch="0" version="6.0.3" release="1.red80" arch="aarch64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-0:6.0.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gnuplot-common" epoch="0" version="6.0.3" release="1.red80" arch="aarch64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-common-0:6.0.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gnuplot-minimal" epoch="0" version="6.0.3" release="1.red80" arch="aarch64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-minimal-0:6.0.3-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="gnuplot-doc" epoch="0" version="6.0.3" release="1.red80" arch="noarch" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-doc-0:6.0.3-1.red80.noarch.rpm</filename>
				</package>
				<package name="gnuplot-latex" epoch="0" version="6.0.3" release="1.red80" arch="noarch" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-latex-0:6.0.3-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0012</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость gnuplot </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gnuplot</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gnuplot-cve-2025-31181-8.0/</description>
               <solution>Установить обновление для пакета(ов) gnuplot
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gnuplot-cve-2025-31181-8.0/" type="self" id="ROS-20251216-80-0012" title="ROS-20251216-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31181" type="cve" id="CVE-2025-31181" title="CVE-2025-31181" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gnuplot" epoch="0" version="6.0.3" release="1.red80" arch="x86_64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-0:6.0.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-common" epoch="0" version="6.0.3" release="1.red80" arch="x86_64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-common-0:6.0.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-minimal" epoch="0" version="6.0.3" release="1.red80" arch="x86_64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-minimal-0:6.0.3-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gnuplot" epoch="0" version="6.0.3" release="1.red80" arch="aarch64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-0:6.0.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gnuplot-common" epoch="0" version="6.0.3" release="1.red80" arch="aarch64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-common-0:6.0.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gnuplot-minimal" epoch="0" version="6.0.3" release="1.red80" arch="aarch64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-minimal-0:6.0.3-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="gnuplot-doc" epoch="0" version="6.0.3" release="1.red80" arch="noarch" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-doc-0:6.0.3-1.red80.noarch.rpm</filename>
				</package>
				<package name="gnuplot-latex" epoch="0" version="6.0.3" release="1.red80" arch="noarch" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-latex-0:6.0.3-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8006</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость gnuplot </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gnuplot</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gnuplot-cve-2025-3359-8.0/</description>
               <solution>Установить обновление для пакета(ов) gnuplot
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gnuplot-cve-2025-3359-8.0/" type="self" id="ROS-20251216-8006" title="ROS-20251216-8006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3359" type="cve" id="CVE-2025-3359" title="CVE-2025-3359" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gnuplot" epoch="0" version="6.0.3" release="1.red80" arch="x86_64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-0:6.0.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-common" epoch="0" version="6.0.3" release="1.red80" arch="x86_64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-common-0:6.0.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-minimal" epoch="0" version="6.0.3" release="1.red80" arch="x86_64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-minimal-0:6.0.3-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gnuplot" epoch="0" version="6.0.3" release="1.red80" arch="aarch64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-0:6.0.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gnuplot-common" epoch="0" version="6.0.3" release="1.red80" arch="aarch64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-common-0:6.0.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gnuplot-minimal" epoch="0" version="6.0.3" release="1.red80" arch="aarch64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-minimal-0:6.0.3-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="gnuplot-doc" epoch="0" version="6.0.3" release="1.red80" arch="noarch" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-doc-0:6.0.3-1.red80.noarch.rpm</filename>
				</package>
				<package name="gnuplot-latex" epoch="0" version="6.0.3" release="1.red80" arch="noarch" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-latex-0:6.0.3-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0018</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость guacamole </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в guacamole</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-guacamole-cve-2024-35164-8.0/</description>
               <solution>Установить обновление для пакета(ов) guacamole
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-guacamole-cve-2024-35164-8.0/" type="self" id="ROS-20251216-80-0018" title="ROS-20251216-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35164" type="cve" id="CVE-2024-35164" title="CVE-2024-35164" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="guacamole-auth-ban" epoch="0" version="1.6.0" release="1.red80" arch="noarch" src="guacamole-1.6.0-1.red80.src.rpm">
					<filename>guacamole-auth-ban-0:1.6.0-1.red80.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-duo" epoch="0" version="1.6.0" release="1.red80" arch="noarch" src="guacamole-1.6.0-1.red80.src.rpm">
					<filename>guacamole-auth-duo-0:1.6.0-1.red80.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-header" epoch="0" version="1.6.0" release="1.red80" arch="noarch" src="guacamole-1.6.0-1.red80.src.rpm">
					<filename>guacamole-auth-header-0:1.6.0-1.red80.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-jdbc-mysql" epoch="0" version="1.6.0" release="1.red80" arch="noarch" src="guacamole-1.6.0-1.red80.src.rpm">
					<filename>guacamole-auth-jdbc-mysql-0:1.6.0-1.red80.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-jdbc-postgresql" epoch="0" version="1.6.0" release="1.red80" arch="noarch" src="guacamole-1.6.0-1.red80.src.rpm">
					<filename>guacamole-auth-jdbc-postgresql-0:1.6.0-1.red80.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-jdbc-sqlserver" epoch="0" version="1.6.0" release="1.red80" arch="noarch" src="guacamole-1.6.0-1.red80.src.rpm">
					<filename>guacamole-auth-jdbc-sqlserver-0:1.6.0-1.red80.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-json" epoch="0" version="1.6.0" release="1.red80" arch="noarch" src="guacamole-1.6.0-1.red80.src.rpm">
					<filename>guacamole-auth-json-0:1.6.0-1.red80.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-ldap" epoch="0" version="1.6.0" release="1.red80" arch="noarch" src="guacamole-1.6.0-1.red80.src.rpm">
					<filename>guacamole-auth-ldap-0:1.6.0-1.red80.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-quickconnect" epoch="0" version="1.6.0" release="1.red80" arch="noarch" src="guacamole-1.6.0-1.red80.src.rpm">
					<filename>guacamole-auth-quickconnect-0:1.6.0-1.red80.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-restrict" epoch="0" version="1.6.0" release="1.red80" arch="noarch" src="guacamole-1.6.0-1.red80.src.rpm">
					<filename>guacamole-auth-restrict-0:1.6.0-1.red80.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-sso" epoch="0" version="1.6.0" release="1.red80" arch="noarch" src="guacamole-1.6.0-1.red80.src.rpm">
					<filename>guacamole-auth-sso-0:1.6.0-1.red80.noarch.rpm</filename>
				</package>
				<package name="guacamole-auth-totp" epoch="0" version="1.6.0" release="1.red80" arch="noarch" src="guacamole-1.6.0-1.red80.src.rpm">
					<filename>guacamole-auth-totp-0:1.6.0-1.red80.noarch.rpm</filename>
				</package>
				<package name="guacamole-client" epoch="0" version="1.6.0" release="1.red80" arch="noarch" src="guacamole-1.6.0-1.red80.src.rpm">
					<filename>guacamole-client-0:1.6.0-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8008</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость guacamole-server </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в guacamole-server</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-guacamole-server-cve-2024-35164-8.0/</description>
               <solution>Установить обновление для пакета(ов) guacamole-server
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-guacamole-server-cve-2024-35164-8.0/" type="self" id="ROS-20251216-8008" title="ROS-20251216-8008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35164" type="cve" id="CVE-2024-35164" title="CVE-2024-35164" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="guacd" epoch="0" version="1.6.0" release="1.red80" arch="x86_64" src="guacamole-server-1.6.0-1.red80.src.rpm">
					<filename>guacd-0:1.6.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libguac" epoch="0" version="1.6.0" release="1.red80" arch="x86_64" src="guacamole-server-1.6.0-1.red80.src.rpm">
					<filename>libguac-0:1.6.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libguac-client-kubernetes" epoch="0" version="1.6.0" release="1.red80" arch="x86_64" src="guacamole-server-1.6.0-1.red80.src.rpm">
					<filename>libguac-client-kubernetes-0:1.6.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libguac-client-rdp" epoch="0" version="1.6.0" release="1.red80" arch="x86_64" src="guacamole-server-1.6.0-1.red80.src.rpm">
					<filename>libguac-client-rdp-0:1.6.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libguac-client-ssh" epoch="0" version="1.6.0" release="1.red80" arch="x86_64" src="guacamole-server-1.6.0-1.red80.src.rpm">
					<filename>libguac-client-ssh-0:1.6.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libguac-client-telnet" epoch="0" version="1.6.0" release="1.red80" arch="x86_64" src="guacamole-server-1.6.0-1.red80.src.rpm">
					<filename>libguac-client-telnet-0:1.6.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libguac-client-vnc" epoch="0" version="1.6.0" release="1.red80" arch="x86_64" src="guacamole-server-1.6.0-1.red80.src.rpm">
					<filename>libguac-client-vnc-0:1.6.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libguac-devel" epoch="0" version="1.6.0" release="1.red80" arch="x86_64" src="guacamole-server-1.6.0-1.red80.src.rpm">
					<filename>libguac-devel-0:1.6.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="guacd" epoch="0" version="1.6.0" release="1.red80" arch="aarch64" src="guacamole-server-1.6.0-1.red80.src.rpm">
					<filename>guacd-0:1.6.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libguac" epoch="0" version="1.6.0" release="1.red80" arch="aarch64" src="guacamole-server-1.6.0-1.red80.src.rpm">
					<filename>libguac-0:1.6.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libguac-client-kubernetes" epoch="0" version="1.6.0" release="1.red80" arch="aarch64" src="guacamole-server-1.6.0-1.red80.src.rpm">
					<filename>libguac-client-kubernetes-0:1.6.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libguac-client-rdp" epoch="0" version="1.6.0" release="1.red80" arch="aarch64" src="guacamole-server-1.6.0-1.red80.src.rpm">
					<filename>libguac-client-rdp-0:1.6.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libguac-client-ssh" epoch="0" version="1.6.0" release="1.red80" arch="aarch64" src="guacamole-server-1.6.0-1.red80.src.rpm">
					<filename>libguac-client-ssh-0:1.6.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libguac-client-telnet" epoch="0" version="1.6.0" release="1.red80" arch="aarch64" src="guacamole-server-1.6.0-1.red80.src.rpm">
					<filename>libguac-client-telnet-0:1.6.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libguac-client-vnc" epoch="0" version="1.6.0" release="1.red80" arch="aarch64" src="guacamole-server-1.6.0-1.red80.src.rpm">
					<filename>libguac-client-vnc-0:1.6.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libguac-devel" epoch="0" version="1.6.0" release="1.red80" arch="aarch64" src="guacamole-server-1.6.0-1.red80.src.rpm">
					<filename>libguac-devel-0:1.6.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0024</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость apache-commons-lang3 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в apache-commons-lang3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-apache-commons-lang3-cve-2025-48924-8.0/</description>
               <solution>Установить обновление для пакета(ов) apache-commons-lang3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-apache-commons-lang3-cve-2025-48924-8.0/" type="self" id="ROS-20251216-80-0024" title="ROS-20251216-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48924" type="cve" id="CVE-2025-48924" title="CVE-2025-48924" />
			<reference href="https://bdu.fstec.ru/vul/2025-08956" type="self" id="BDU:2025-08956" title="BDU:2025-08956" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="apache-commons-lang3" epoch="0" version="3.18.0" release="2.red80" arch="noarch" src="apache-commons-lang3-3.18.0-2.red80.src.rpm">
					<filename>apache-commons-lang3-0:3.18.0-2.red80.noarch.rpm</filename>
				</package>
				<package name="apache-commons-lang3-javadoc" epoch="0" version="3.18.0" release="2.red80" arch="noarch" src="apache-commons-lang3-3.18.0-2.red80.src.rpm">
					<filename>apache-commons-lang3-javadoc-0:3.18.0-2.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8010</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость gnuplot </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gnuplot</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gnuplot-cve-2025-31178-8.0/</description>
               <solution>Установить обновление для пакета(ов) gnuplot
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gnuplot-cve-2025-31178-8.0/" type="self" id="ROS-20251216-8010" title="ROS-20251216-8010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31178" type="cve" id="CVE-2025-31178" title="CVE-2025-31178" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gnuplot" epoch="0" version="6.0.3" release="1.red80" arch="x86_64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-0:6.0.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-common" epoch="0" version="6.0.3" release="1.red80" arch="x86_64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-common-0:6.0.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gnuplot-minimal" epoch="0" version="6.0.3" release="1.red80" arch="x86_64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-minimal-0:6.0.3-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gnuplot" epoch="0" version="6.0.3" release="1.red80" arch="aarch64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-0:6.0.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gnuplot-common" epoch="0" version="6.0.3" release="1.red80" arch="aarch64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-common-0:6.0.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gnuplot-minimal" epoch="0" version="6.0.3" release="1.red80" arch="aarch64" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-minimal-0:6.0.3-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="gnuplot-doc" epoch="0" version="6.0.3" release="1.red80" arch="noarch" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-doc-0:6.0.3-1.red80.noarch.rpm</filename>
				</package>
				<package name="gnuplot-latex" epoch="0" version="6.0.3" release="1.red80" arch="noarch" src="gnuplot-6.0.3-1.red80.src.rpm">
					<filename>gnuplot-latex-0:6.0.3-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0030</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-10585-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-10585-8.0/" type="self" id="ROS-20251216-80-0030" title="ROS-20251216-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10585" type="cve" id="CVE-2025-10585" title="CVE-2025-10585" />
			<reference href="https://bdu.fstec.ru/vul/2025-11457" type="self" id="BDU:2025-11457" title="BDU:2025-11457" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0001</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость qt6-qtbase </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в qt6-qtbase</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-qt6-qtbase-cve-2025-3512-8.0/</description>
               <solution>Установить обновление для пакета(ов) qt6-qtbase
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-qt6-qtbase-cve-2025-3512-8.0/" type="self" id="ROS-20251216-80-0001" title="ROS-20251216-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3512" type="cve" id="CVE-2025-3512" title="CVE-2025-3512" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="qt6-qtbase" epoch="0" version="6.6.3" release="5.red80" arch="x86_64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-0:6.6.3-5.red80.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-devel" epoch="0" version="6.6.3" release="5.red80" arch="x86_64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-devel-0:6.6.3-5.red80.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-examples" epoch="0" version="6.6.3" release="5.red80" arch="x86_64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-examples-0:6.6.3-5.red80.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-gui" epoch="0" version="6.6.3" release="5.red80" arch="x86_64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-gui-0:6.6.3-5.red80.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-ibase" epoch="0" version="6.6.3" release="5.red80" arch="x86_64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-ibase-0:6.6.3-5.red80.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-mysql" epoch="0" version="6.6.3" release="5.red80" arch="x86_64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-mysql-0:6.6.3-5.red80.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-odbc" epoch="0" version="6.6.3" release="5.red80" arch="x86_64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-odbc-0:6.6.3-5.red80.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-postgresql" epoch="0" version="6.6.3" release="5.red80" arch="x86_64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-postgresql-0:6.6.3-5.red80.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-private-devel" epoch="0" version="6.6.3" release="5.red80" arch="x86_64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-private-devel-0:6.6.3-5.red80.x86_64.rpm</filename>
				</package>
				<package name="qt6-qtbase-static" epoch="0" version="6.6.3" release="5.red80" arch="x86_64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-static-0:6.6.3-5.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="qt6-qtbase" epoch="0" version="6.6.3" release="5.red80" arch="aarch64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-0:6.6.3-5.red80.aarch64.rpm</filename>
				</package>
				<package name="qt6-qtbase-devel" epoch="0" version="6.6.3" release="5.red80" arch="aarch64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-devel-0:6.6.3-5.red80.aarch64.rpm</filename>
				</package>
				<package name="qt6-qtbase-examples" epoch="0" version="6.6.3" release="5.red80" arch="aarch64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-examples-0:6.6.3-5.red80.aarch64.rpm</filename>
				</package>
				<package name="qt6-qtbase-gui" epoch="0" version="6.6.3" release="5.red80" arch="aarch64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-gui-0:6.6.3-5.red80.aarch64.rpm</filename>
				</package>
				<package name="qt6-qtbase-ibase" epoch="0" version="6.6.3" release="5.red80" arch="aarch64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-ibase-0:6.6.3-5.red80.aarch64.rpm</filename>
				</package>
				<package name="qt6-qtbase-mysql" epoch="0" version="6.6.3" release="5.red80" arch="aarch64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-mysql-0:6.6.3-5.red80.aarch64.rpm</filename>
				</package>
				<package name="qt6-qtbase-odbc" epoch="0" version="6.6.3" release="5.red80" arch="aarch64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-odbc-0:6.6.3-5.red80.aarch64.rpm</filename>
				</package>
				<package name="qt6-qtbase-postgresql" epoch="0" version="6.6.3" release="5.red80" arch="aarch64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-postgresql-0:6.6.3-5.red80.aarch64.rpm</filename>
				</package>
				<package name="qt6-qtbase-private-devel" epoch="0" version="6.6.3" release="5.red80" arch="aarch64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-private-devel-0:6.6.3-5.red80.aarch64.rpm</filename>
				</package>
				<package name="qt6-qtbase-static" epoch="0" version="6.6.3" release="5.red80" arch="aarch64" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-static-0:6.6.3-5.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="qt6-qtbase-common" epoch="0" version="6.6.3" release="5.red80" arch="noarch" src="qt6-qtbase-6.6.3-5.red80.src.rpm">
					<filename>qt6-qtbase-common-0:6.6.3-5.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0007</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость openssh </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в openssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openssh-cve-2025-61984-8.0/</description>
               <solution>Установить обновление для пакета(ов) openssh
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openssh-cve-2025-61984-8.0/" type="self" id="ROS-20251216-80-0007" title="ROS-20251216-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61984" type="cve" id="CVE-2025-61984" title="CVE-2025-61984" />
			<reference href="https://bdu.fstec.ru/vul/2025-12884" type="self" id="BDU:2025-12884" title="BDU:2025-12884" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="openssh" epoch="0" version="9.9p1" release="5.red80" arch="x86_64" src="openssh-9.9p1-5.red80.src.rpm">
					<filename>openssh-0:9.9p1-5.red80.x86_64.rpm</filename>
				</package>
				<package name="openssh-askpass" epoch="0" version="9.9p1" release="5.red80" arch="x86_64" src="openssh-9.9p1-5.red80.src.rpm">
					<filename>openssh-askpass-0:9.9p1-5.red80.x86_64.rpm</filename>
				</package>
				<package name="openssh-clients" epoch="0" version="9.9p1" release="5.red80" arch="x86_64" src="openssh-9.9p1-5.red80.src.rpm">
					<filename>openssh-clients-0:9.9p1-5.red80.x86_64.rpm</filename>
				</package>
				<package name="openssh-keycat" epoch="0" version="9.9p1" release="5.red80" arch="x86_64" src="openssh-9.9p1-5.red80.src.rpm">
					<filename>openssh-keycat-0:9.9p1-5.red80.x86_64.rpm</filename>
				</package>
				<package name="openssh-keysign" epoch="0" version="9.9p1" release="5.red80" arch="x86_64" src="openssh-9.9p1-5.red80.src.rpm">
					<filename>openssh-keysign-0:9.9p1-5.red80.x86_64.rpm</filename>
				</package>
				<package name="openssh-server" epoch="0" version="9.9p1" release="5.red80" arch="x86_64" src="openssh-9.9p1-5.red80.src.rpm">
					<filename>openssh-server-0:9.9p1-5.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="openssh" epoch="0" version="9.9p1" release="5.red80" arch="aarch64" src="openssh-9.9p1-5.red80.src.rpm">
					<filename>openssh-0:9.9p1-5.red80.aarch64.rpm</filename>
				</package>
				<package name="openssh-askpass" epoch="0" version="9.9p1" release="5.red80" arch="aarch64" src="openssh-9.9p1-5.red80.src.rpm">
					<filename>openssh-askpass-0:9.9p1-5.red80.aarch64.rpm</filename>
				</package>
				<package name="openssh-clients" epoch="0" version="9.9p1" release="5.red80" arch="aarch64" src="openssh-9.9p1-5.red80.src.rpm">
					<filename>openssh-clients-0:9.9p1-5.red80.aarch64.rpm</filename>
				</package>
				<package name="openssh-keycat" epoch="0" version="9.9p1" release="5.red80" arch="aarch64" src="openssh-9.9p1-5.red80.src.rpm">
					<filename>openssh-keycat-0:9.9p1-5.red80.aarch64.rpm</filename>
				</package>
				<package name="openssh-keysign" epoch="0" version="9.9p1" release="5.red80" arch="aarch64" src="openssh-9.9p1-5.red80.src.rpm">
					<filename>openssh-keysign-0:9.9p1-5.red80.aarch64.rpm</filename>
				</package>
				<package name="openssh-server" epoch="0" version="9.9p1" release="5.red80" arch="aarch64" src="openssh-9.9p1-5.red80.src.rpm">
					<filename>openssh-server-0:9.9p1-5.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0009</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-imagemagick-cve-2025-62171-8.0/</description>
               <solution>Установить обновление для пакета(ов) ImageMagick
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-imagemagick-cve-2025-62171-8.0/" type="self" id="ROS-20251216-80-0009" title="ROS-20251216-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62171" type="cve" id="CVE-2025-62171" title="CVE-2025-62171" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="ImageMagick" epoch="1" version="7.1.2.3" release="4.red80" arch="x86_64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-1:7.1.2.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-c++" epoch="1" version="7.1.2.3" release="4.red80" arch="x86_64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-c++-1:7.1.2.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-c++-devel" epoch="1" version="7.1.2.3" release="4.red80" arch="x86_64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-c++-devel-1:7.1.2.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-devel" epoch="1" version="7.1.2.3" release="4.red80" arch="x86_64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-devel-1:7.1.2.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-djvu" epoch="1" version="7.1.2.3" release="4.red80" arch="x86_64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-djvu-1:7.1.2.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-doc" epoch="1" version="7.1.2.3" release="4.red80" arch="x86_64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-doc-1:7.1.2.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-heic" epoch="1" version="7.1.2.3" release="4.red80" arch="x86_64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-heic-1:7.1.2.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-libs" epoch="1" version="7.1.2.3" release="4.red80" arch="x86_64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-libs-1:7.1.2.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-perl" epoch="1" version="7.1.2.3" release="4.red80" arch="x86_64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-perl-1:7.1.2.3-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="ImageMagick" epoch="1" version="7.1.2.3" release="4.red80" arch="aarch64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-1:7.1.2.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-c++" epoch="1" version="7.1.2.3" release="4.red80" arch="aarch64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-c++-1:7.1.2.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-c++-devel" epoch="1" version="7.1.2.3" release="4.red80" arch="aarch64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-c++-devel-1:7.1.2.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-devel" epoch="1" version="7.1.2.3" release="4.red80" arch="aarch64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-devel-1:7.1.2.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-djvu" epoch="1" version="7.1.2.3" release="4.red80" arch="aarch64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-djvu-1:7.1.2.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-doc" epoch="1" version="7.1.2.3" release="4.red80" arch="aarch64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-doc-1:7.1.2.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-heic" epoch="1" version="7.1.2.3" release="4.red80" arch="aarch64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-heic-1:7.1.2.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-libs" epoch="1" version="7.1.2.3" release="4.red80" arch="aarch64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-libs-1:7.1.2.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-perl" epoch="1" version="7.1.2.3" release="4.red80" arch="aarch64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-perl-1:7.1.2.3-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0013</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2025-61759-8.0/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2025-61759-8.0/" type="self" id="ROS-20251216-80-0013" title="ROS-20251216-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61759" type="cve" id="CVE-2025-61759" title="CVE-2025-61759" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="virtualbox-guest-additions-7.1.14-1.red80.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0015</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2025-61759-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2025-61759-8.0/" type="self" id="ROS-20251216-80-0015" title="ROS-20251216-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61759" type="cve" id="CVE-2025-61759" title="CVE-2025-61759" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-devel-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-server-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>python3-VirtualBox-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.14" release="1.red80" arch="noarch" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.14-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0019</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2025-61759-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2025-61759-8.0/" type="self" id="ROS-20251216-80-0019" title="ROS-20251216-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61759" type="cve" id="CVE-2025-61759" title="CVE-2025-61759" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.12.56-1.red80.x86_64" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmod_6.12.56-1.red80.x86_64-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0021</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2025-61760-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2025-61760-8.0/" type="self" id="ROS-20251216-80-0021" title="ROS-20251216-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61760" type="cve" id="CVE-2025-61760" title="CVE-2025-61760" />
			<reference href="https://bdu.fstec.ru/vul/2025-10635" type="self" id="BDU:2025-10635" title="BDU:2025-10635" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-devel-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-server-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>python3-VirtualBox-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.14" release="1.red80" arch="noarch" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.14-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0025</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2025-61760-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2025-61760-8.0/" type="self" id="ROS-20251216-80-0025" title="ROS-20251216-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61760" type="cve" id="CVE-2025-61760" title="CVE-2025-61760" />
			<reference href="https://bdu.fstec.ru/vul/2025-10635" type="self" id="BDU:2025-10635" title="BDU:2025-10635" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.12.56-1.red80.x86_64" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmod_6.12.56-1.red80.x86_64-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0027</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2025-61760-8.0/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2025-61760-8.0/" type="self" id="ROS-20251216-80-0027" title="ROS-20251216-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61760" type="cve" id="CVE-2025-61760" title="CVE-2025-61760" />
			<reference href="https://bdu.fstec.ru/vul/2025-10635" type="self" id="BDU:2025-10635" title="BDU:2025-10635" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="virtualbox-guest-additions-7.1.14-1.red80.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0031</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2025-62587-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2025-62587-8.0/" type="self" id="ROS-20251216-80-0031" title="ROS-20251216-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62587" type="cve" id="CVE-2025-62587" title="CVE-2025-62587" />
			<reference href="https://bdu.fstec.ru/vul/2025-13295" type="self" id="BDU:2025-13295" title="BDU:2025-13295" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-devel-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-server-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>python3-VirtualBox-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.14" release="1.red80" arch="noarch" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.14-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8012</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2025-62587-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2025-62587-8.0/" type="self" id="ROS-20251216-8012" title="ROS-20251216-8012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62587" type="cve" id="CVE-2025-62587" title="CVE-2025-62587" />
			<reference href="https://bdu.fstec.ru/vul/2025-13295" type="self" id="BDU:2025-13295" title="BDU:2025-13295" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.12.56-1.red80.x86_64" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmod_6.12.56-1.red80.x86_64-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0035</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2025-62587-8.0/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2025-62587-8.0/" type="self" id="ROS-20251216-80-0035" title="ROS-20251216-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62587" type="cve" id="CVE-2025-62587" title="CVE-2025-62587" />
			<reference href="https://bdu.fstec.ru/vul/2025-13295" type="self" id="BDU:2025-13295" title="BDU:2025-13295" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="virtualbox-guest-additions-7.1.14-1.red80.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8014</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2025-62588-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2025-62588-8.0/" type="self" id="ROS-20251216-8014" title="ROS-20251216-8014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62588" type="cve" id="CVE-2025-62588" title="CVE-2025-62588" />
			<reference href="https://bdu.fstec.ru/vul/2025-13298" type="self" id="BDU:2025-13298" title="BDU:2025-13298" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-devel-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-server-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>python3-VirtualBox-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.14" release="1.red80" arch="noarch" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.14-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0039</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2025-62588-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2025-62588-8.0/" type="self" id="ROS-20251216-80-0039" title="ROS-20251216-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62588" type="cve" id="CVE-2025-62588" title="CVE-2025-62588" />
			<reference href="https://bdu.fstec.ru/vul/2025-13298" type="self" id="BDU:2025-13298" title="BDU:2025-13298" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.12.56-1.red80.x86_64" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmod_6.12.56-1.red80.x86_64-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8016</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2025-62588-8.0/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2025-62588-8.0/" type="self" id="ROS-20251216-8016" title="ROS-20251216-8016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62588" type="cve" id="CVE-2025-62588" title="CVE-2025-62588" />
			<reference href="https://bdu.fstec.ru/vul/2025-13298" type="self" id="BDU:2025-13298" title="BDU:2025-13298" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="virtualbox-guest-additions-7.1.14-1.red80.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0042</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2025-62589-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2025-62589-8.0/" type="self" id="ROS-20251216-80-0042" title="ROS-20251216-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62589" type="cve" id="CVE-2025-62589" title="CVE-2025-62589" />
			<reference href="https://bdu.fstec.ru/vul/2025-13296" type="self" id="BDU:2025-13296" title="BDU:2025-13296" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-devel-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-server-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>python3-VirtualBox-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.14" release="1.red80" arch="noarch" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.14-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8018</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2025-62589-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2025-62589-8.0/" type="self" id="ROS-20251216-8018" title="ROS-20251216-8018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62589" type="cve" id="CVE-2025-62589" title="CVE-2025-62589" />
			<reference href="https://bdu.fstec.ru/vul/2025-13296" type="self" id="BDU:2025-13296" title="BDU:2025-13296" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.12.56-1.red80.x86_64" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmod_6.12.56-1.red80.x86_64-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0044</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2025-62589-8.0/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2025-62589-8.0/" type="self" id="ROS-20251216-80-0044" title="ROS-20251216-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62589" type="cve" id="CVE-2025-62589" title="CVE-2025-62589" />
			<reference href="https://bdu.fstec.ru/vul/2025-13296" type="self" id="BDU:2025-13296" title="BDU:2025-13296" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="virtualbox-guest-additions-7.1.14-1.red80.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0002</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2025-62590-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2025-62590-8.0/" type="self" id="ROS-20251216-80-0002" title="ROS-20251216-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62590" type="cve" id="CVE-2025-62590" title="CVE-2025-62590" />
			<reference href="https://bdu.fstec.ru/vul/2025-13297" type="self" id="BDU:2025-13297" title="BDU:2025-13297" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-devel-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-server-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>python3-VirtualBox-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.14" release="1.red80" arch="noarch" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.14-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0003</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2025-62590-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2025-62590-8.0/" type="self" id="ROS-20251216-80-0003" title="ROS-20251216-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62590" type="cve" id="CVE-2025-62590" title="CVE-2025-62590" />
			<reference href="https://bdu.fstec.ru/vul/2025-13297" type="self" id="BDU:2025-13297" title="BDU:2025-13297" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.12.56-1.red80.x86_64" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmod_6.12.56-1.red80.x86_64-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0008</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2025-62590-8.0/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2025-62590-8.0/" type="self" id="ROS-20251216-80-0008" title="ROS-20251216-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62590" type="cve" id="CVE-2025-62590" title="CVE-2025-62590" />
			<reference href="https://bdu.fstec.ru/vul/2025-13297" type="self" id="BDU:2025-13297" title="BDU:2025-13297" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="virtualbox-guest-additions-7.1.14-1.red80.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0010</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2025-62591-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2025-62591-8.0/" type="self" id="ROS-20251216-80-0010" title="ROS-20251216-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62591" type="cve" id="CVE-2025-62591" title="CVE-2025-62591" />
			<reference href="https://bdu.fstec.ru/vul/2025-13300" type="self" id="BDU:2025-13300" title="BDU:2025-13300" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-devel-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-server-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>python3-VirtualBox-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.14" release="1.red80" arch="noarch" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.14-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0014</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2025-62591-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2025-62591-8.0/" type="self" id="ROS-20251216-80-0014" title="ROS-20251216-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62591" type="cve" id="CVE-2025-62591" title="CVE-2025-62591" />
			<reference href="https://bdu.fstec.ru/vul/2025-13300" type="self" id="BDU:2025-13300" title="BDU:2025-13300" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.12.56-1.red80.x86_64" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmod_6.12.56-1.red80.x86_64-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0016</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2025-62591-8.0/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2025-62591-8.0/" type="self" id="ROS-20251216-80-0016" title="ROS-20251216-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62591" type="cve" id="CVE-2025-62591" title="CVE-2025-62591" />
			<reference href="https://bdu.fstec.ru/vul/2025-13300" type="self" id="BDU:2025-13300" title="BDU:2025-13300" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="virtualbox-guest-additions-7.1.14-1.red80.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0020</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2025-62592-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2025-62592-8.0/" type="self" id="ROS-20251216-80-0020" title="ROS-20251216-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62592" type="cve" id="CVE-2025-62592" title="CVE-2025-62592" />
			<reference href="https://bdu.fstec.ru/vul/2025-13214" type="self" id="BDU:2025-13214" title="BDU:2025-13214" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-devel-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-server-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>python3-VirtualBox-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.14" release="1.red80" arch="noarch" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.14-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0022</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2025-62592-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2025-62592-8.0/" type="self" id="ROS-20251216-80-0022" title="ROS-20251216-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62592" type="cve" id="CVE-2025-62592" title="CVE-2025-62592" />
			<reference href="https://bdu.fstec.ru/vul/2025-13214" type="self" id="BDU:2025-13214" title="BDU:2025-13214" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.12.56-1.red80.x86_64" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmod_6.12.56-1.red80.x86_64-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0026</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2025-62592-8.0/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2025-62592-8.0/" type="self" id="ROS-20251216-80-0026" title="ROS-20251216-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62592" type="cve" id="CVE-2025-62592" title="CVE-2025-62592" />
			<reference href="https://bdu.fstec.ru/vul/2025-13214" type="self" id="BDU:2025-13214" title="BDU:2025-13214" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="virtualbox-guest-additions-7.1.14-1.red80.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0028</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2025-62641-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2025-62641-8.0/" type="self" id="ROS-20251216-80-0028" title="ROS-20251216-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62641" type="cve" id="CVE-2025-62641" title="CVE-2025-62641" />
			<reference href="https://bdu.fstec.ru/vul/2025-13299" type="self" id="BDU:2025-13299" title="BDU:2025-13299" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-devel-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-server-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>python3-VirtualBox-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.14" release="1.red80" arch="noarch" src="VirtualBox-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.14-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0032</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2025-62641-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2025-62641-8.0/" type="self" id="ROS-20251216-80-0032" title="ROS-20251216-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62641" type="cve" id="CVE-2025-62641" title="CVE-2025-62641" />
			<reference href="https://bdu.fstec.ru/vul/2025-13299" type="self" id="BDU:2025-13299" title="BDU:2025-13299" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.12.56-1.red80.x86_64" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.14-1.red80.src.rpm">
					<filename>VirtualBox-kmod_6.12.56-1.red80.x86_64-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0033</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2025-62641-8.0/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2025-62641-8.0/" type="self" id="ROS-20251216-80-0033" title="ROS-20251216-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62641" type="cve" id="CVE-2025-62641" title="CVE-2025-62641" />
			<reference href="https://bdu.fstec.ru/vul/2025-13299" type="self" id="BDU:2025-13299" title="BDU:2025-13299" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.14" release="1.red80" arch="x86_64" src="virtualbox-guest-additions-7.1.14-1.red80.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.14-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0036</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-10934-8.0/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-10934-8.0/" type="self" id="ROS-20251216-80-0036" title="ROS-20251216-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10934" type="cve" id="CVE-2025-10934" title="CVE-2025-10934" />
			<reference href="https://bdu.fstec.ru/vul/2025-13877" type="self" id="BDU:2025-13877" title="BDU:2025-13877" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gimp" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gimp" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0037</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-10925-8.0/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-10925-8.0/" type="self" id="ROS-20251216-80-0037" title="ROS-20251216-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10925" type="cve" id="CVE-2025-10925" title="CVE-2025-10925" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gimp" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gimp" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0040</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-10924-8.0/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-10924-8.0/" type="self" id="ROS-20251216-80-0040" title="ROS-20251216-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10924" type="cve" id="CVE-2025-10924" title="CVE-2025-10924" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gimp" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gimp" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0004</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-10923-8.0/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-10923-8.0/" type="self" id="ROS-20251216-80-0004" title="ROS-20251216-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10923" type="cve" id="CVE-2025-10923" title="CVE-2025-10923" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gimp" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gimp" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0005</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-10920-8.0/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-10920-8.0/" type="self" id="ROS-20251216-80-0005" title="ROS-20251216-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10920" type="cve" id="CVE-2025-10920" title="CVE-2025-10920" />
			<reference href="https://bdu.fstec.ru/vul/2025-13626" type="self" id="BDU:2025-13626" title="BDU:2025-13626" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gimp" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gimp" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8003</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость runc </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в runc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-runc-cve-2025-52881-8.0/</description>
               <solution>Установить обновление для пакета(ов) runc
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-runc-cve-2025-52881-8.0/" type="self" id="ROS-20251216-8003" title="ROS-20251216-8003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52881" type="cve" id="CVE-2025-52881" title="CVE-2025-52881" />
			<reference href="https://bdu.fstec.ru/vul/2025-14040" type="self" id="BDU:2025-14040" title="BDU:2025-14040" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="runc" epoch="2" version="1.2.8" release="1.red80" arch="x86_64" src="runc-1.2.8-1.red80.src.rpm">
					<filename>runc-2:1.2.8-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="runc" epoch="2" version="1.2.8" release="1.red80" arch="aarch64" src="runc-1.2.8-1.red80.src.rpm">
					<filename>runc-2:1.2.8-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0011</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость containerd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в containerd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-containerd-cve-2025-64329-8.0/</description>
               <solution>Установить обновление для пакета(ов) containerd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-containerd-cve-2025-64329-8.0/" type="self" id="ROS-20251216-80-0011" title="ROS-20251216-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64329" type="cve" id="CVE-2025-64329" title="CVE-2025-64329" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="containerd" epoch="0" version="1.7.29" release="1.red80" arch="x86_64" src="containerd-1.7.29-1.red80.src.rpm">
					<filename>containerd-0:1.7.29-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="containerd" epoch="0" version="1.7.29" release="1.red80" arch="aarch64" src="containerd-1.7.29-1.red80.src.rpm">
					<filename>containerd-0:1.7.29-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8005</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12428-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12428-8.0/" type="self" id="ROS-20251216-8005" title="ROS-20251216-8005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12428" type="cve" id="CVE-2025-12428" title="CVE-2025-12428" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0017</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12429-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12429-8.0/" type="self" id="ROS-20251216-80-0017" title="ROS-20251216-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12429" type="cve" id="CVE-2025-12429" title="CVE-2025-12429" />
			<reference href="https://bdu.fstec.ru/vul/2025-14019" type="self" id="BDU:2025-14019" title="BDU:2025-14019" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8007</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12430-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12430-8.0/" type="self" id="ROS-20251216-8007" title="ROS-20251216-8007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12430" type="cve" id="CVE-2025-12430" title="CVE-2025-12430" />
			<reference href="https://bdu.fstec.ru/vul/2025-14007" type="self" id="BDU:2025-14007" title="BDU:2025-14007" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0023</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12431-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12431-8.0/" type="self" id="ROS-20251216-80-0023" title="ROS-20251216-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12431" type="cve" id="CVE-2025-12431" title="CVE-2025-12431" />
			<reference href="https://bdu.fstec.ru/vul/2025-14009" type="self" id="BDU:2025-14009" title="BDU:2025-14009" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8009</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12432-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12432-8.0/" type="self" id="ROS-20251216-8009" title="ROS-20251216-8009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12432" type="cve" id="CVE-2025-12432" title="CVE-2025-12432" />
			<reference href="https://bdu.fstec.ru/vul/2025-14008" type="self" id="BDU:2025-14008" title="BDU:2025-14008" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0029</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12433-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12433-8.0/" type="self" id="ROS-20251216-80-0029" title="ROS-20251216-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12433" type="cve" id="CVE-2025-12433" title="CVE-2025-12433" />
			<reference href="https://bdu.fstec.ru/vul/2025-14012" type="self" id="BDU:2025-14012" title="BDU:2025-14012" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8011</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12434-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12434-8.0/" type="self" id="ROS-20251216-8011" title="ROS-20251216-8011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12434" type="cve" id="CVE-2025-12434" title="CVE-2025-12434" />
			<reference href="https://bdu.fstec.ru/vul/2025-14021" type="self" id="BDU:2025-14021" title="BDU:2025-14021" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0034</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12435-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12435-8.0/" type="self" id="ROS-20251216-80-0034" title="ROS-20251216-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12435" type="cve" id="CVE-2025-12435" title="CVE-2025-12435" />
			<reference href="https://bdu.fstec.ru/vul/2025-14014" type="self" id="BDU:2025-14014" title="BDU:2025-14014" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8013</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12436-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12436-8.0/" type="self" id="ROS-20251216-8013" title="ROS-20251216-8013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12436" type="cve" id="CVE-2025-12436" title="CVE-2025-12436" />
			<reference href="https://bdu.fstec.ru/vul/2025-14016" type="self" id="BDU:2025-14016" title="BDU:2025-14016" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0038</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12437-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12437-8.0/" type="self" id="ROS-20251216-80-0038" title="ROS-20251216-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12437" type="cve" id="CVE-2025-12437" title="CVE-2025-12437" />
			<reference href="https://bdu.fstec.ru/vul/2025-14017" type="self" id="BDU:2025-14017" title="BDU:2025-14017" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8015</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12438-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12438-8.0/" type="self" id="ROS-20251216-8015" title="ROS-20251216-8015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12438" type="cve" id="CVE-2025-12438" title="CVE-2025-12438" />
			<reference href="https://bdu.fstec.ru/vul/2025-14018" type="self" id="BDU:2025-14018" title="BDU:2025-14018" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0041</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12439-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12439-8.0/" type="self" id="ROS-20251216-80-0041" title="ROS-20251216-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12439" type="cve" id="CVE-2025-12439" title="CVE-2025-12439" />
			<reference href="https://bdu.fstec.ru/vul/2025-14022" type="self" id="BDU:2025-14022" title="BDU:2025-14022" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8017</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12440-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12440-8.0/" type="self" id="ROS-20251216-8017" title="ROS-20251216-8017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12440" type="cve" id="CVE-2025-12440" title="CVE-2025-12440" />
			<reference href="https://bdu.fstec.ru/vul/2025-14023" type="self" id="BDU:2025-14023" title="BDU:2025-14023" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-80-0043</id>
		<issued date="2025-12-16" />
		<updated date="2026-03-02" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12441-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12441-8.0/" type="self" id="ROS-20251216-80-0043" title="ROS-20251216-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12441" type="cve" id="CVE-2025-12441" title="CVE-2025-12441" />
			<reference href="https://bdu.fstec.ru/vul/2025-14020" type="self" id="BDU:2025-14020" title="BDU:2025-14020" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8019</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12443-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12443-8.0/" type="self" id="ROS-20251216-8019" title="ROS-20251216-8019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12443" type="cve" id="CVE-2025-12443" title="CVE-2025-12443" />
			<reference href="https://bdu.fstec.ru/vul/2025-14025" type="self" id="BDU:2025-14025" title="BDU:2025-14025" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8020</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12444-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12444-8.0/" type="self" id="ROS-20251216-8020" title="ROS-20251216-8020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12444" type="cve" id="CVE-2025-12444" title="CVE-2025-12444" />
			<reference href="https://bdu.fstec.ru/vul/2025-14024" type="self" id="BDU:2025-14024" title="BDU:2025-14024" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8021</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12445-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12445-8.0/" type="self" id="ROS-20251216-8021" title="ROS-20251216-8021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12445" type="cve" id="CVE-2025-12445" title="CVE-2025-12445" />
			<reference href="https://bdu.fstec.ru/vul/2025-14026" type="self" id="BDU:2025-14026" title="BDU:2025-14026" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8022</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12446-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12446-8.0/" type="self" id="ROS-20251216-8022" title="ROS-20251216-8022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12446" type="cve" id="CVE-2025-12446" title="CVE-2025-12446" />
			<reference href="https://bdu.fstec.ru/vul/2025-14013" type="self" id="BDU:2025-14013" title="BDU:2025-14013" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251216-8023</id>
		<issued date="2025-12-16" />
		<updated date="2025-12-16" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12447-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12447-8.0/" type="self" id="ROS-20251216-8023" title="ROS-20251216-8023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12447" type="cve" id="CVE-2025-12447" title="CVE-2025-12447" />
			<reference href="https://bdu.fstec.ru/vul/2025-14015" type="self" id="BDU:2025-14015" title="BDU:2025-14015" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8001</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость runc </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в runc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-runc-cve-2025-52565-8.0/</description>
               <solution>Установить обновление для пакета(ов) runc
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-runc-cve-2025-52565-8.0/" type="self" id="ROS-20251217-8001" title="ROS-20251217-8001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52565" type="cve" id="CVE-2025-52565" title="CVE-2025-52565" />
			<reference href="https://bdu.fstec.ru/vul/2025-14042" type="self" id="BDU:2025-14042" title="BDU:2025-14042" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="runc" epoch="2" version="1.2.8" release="1.red80" arch="x86_64" src="runc-1.2.8-1.red80.src.rpm">
					<filename>runc-2:1.2.8-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="runc" epoch="2" version="1.2.8" release="1.red80" arch="aarch64" src="runc-1.2.8-1.red80.src.rpm">
					<filename>runc-2:1.2.8-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8002</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12725-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12725-8.0/" type="self" id="ROS-20251217-8002" title="ROS-20251217-8002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12725" type="cve" id="CVE-2025-12725" title="CVE-2025-12725" />
			<reference href="https://bdu.fstec.ru/vul/2025-13846" type="self" id="BDU:2025-13846" title="BDU:2025-13846" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8003</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12726-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12726-8.0/" type="self" id="ROS-20251217-8003" title="ROS-20251217-8003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12726" type="cve" id="CVE-2025-12726" title="CVE-2025-12726" />
			<reference href="https://bdu.fstec.ru/vul/2025-13847" type="self" id="BDU:2025-13847" title="BDU:2025-13847" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8004</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12727-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12727-8.0/" type="self" id="ROS-20251217-8004" title="ROS-20251217-8004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12727" type="cve" id="CVE-2025-12727" title="CVE-2025-12727" />
			<reference href="https://bdu.fstec.ru/vul/2025-13848" type="self" id="BDU:2025-13848" title="BDU:2025-13848" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8005</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12728-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12728-8.0/" type="self" id="ROS-20251217-8005" title="ROS-20251217-8005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12728" type="cve" id="CVE-2025-12728" title="CVE-2025-12728" />
			<reference href="https://bdu.fstec.ru/vul/2025-13849" type="self" id="BDU:2025-13849" title="BDU:2025-13849" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8006</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12729-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-12729-8.0/" type="self" id="ROS-20251217-8006" title="ROS-20251217-8006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12729" type="cve" id="CVE-2025-12729" title="CVE-2025-12729" />
			<reference href="https://bdu.fstec.ru/vul/2025-13850" type="self" id="BDU:2025-13850" title="BDU:2025-13850" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8007</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-13012-8.0/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-13012-8.0/" type="self" id="ROS-20251217-8007" title="ROS-20251217-8007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13012" type="cve" id="CVE-2025-13012" title="CVE-2025-13012" />
			<reference href="https://bdu.fstec.ru/vul/2025-14551" type="self" id="BDU:2025-14551" title="BDU:2025-14551" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.red80" arch="x86_64" src="firefox-115.30.0-1.red80.src.rpm">
					<filename>firefox-0:115.30.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.red80" arch="aarch64" src="firefox-115.30.0-1.red80.src.rpm">
					<filename>firefox-0:115.30.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8008</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-13013-8.0/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-13013-8.0/" type="self" id="ROS-20251217-8008" title="ROS-20251217-8008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13013" type="cve" id="CVE-2025-13013" title="CVE-2025-13013" />
			<reference href="https://bdu.fstec.ru/vul/2025-14552" type="self" id="BDU:2025-14552" title="BDU:2025-14552" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.red80" arch="x86_64" src="firefox-115.30.0-1.red80.src.rpm">
					<filename>firefox-0:115.30.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.red80" arch="aarch64" src="firefox-115.30.0-1.red80.src.rpm">
					<filename>firefox-0:115.30.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8009</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-13014-8.0/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-13014-8.0/" type="self" id="ROS-20251217-8009" title="ROS-20251217-8009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13014" type="cve" id="CVE-2025-13014" title="CVE-2025-13014" />
			<reference href="https://bdu.fstec.ru/vul/2025-14550" type="self" id="BDU:2025-14550" title="BDU:2025-14550" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.red80" arch="x86_64" src="firefox-115.30.0-1.red80.src.rpm">
					<filename>firefox-0:115.30.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.red80" arch="aarch64" src="firefox-115.30.0-1.red80.src.rpm">
					<filename>firefox-0:115.30.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8010</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-13015-8.0/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-13015-8.0/" type="self" id="ROS-20251217-8010" title="ROS-20251217-8010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13015" type="cve" id="CVE-2025-13015" title="CVE-2025-13015" />
			<reference href="https://bdu.fstec.ru/vul/2025-14549" type="self" id="BDU:2025-14549" title="BDU:2025-14549" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.red80" arch="x86_64" src="firefox-115.30.0-1.red80.src.rpm">
					<filename>firefox-0:115.30.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.red80" arch="aarch64" src="firefox-115.30.0-1.red80.src.rpm">
					<filename>firefox-0:115.30.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8011</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13042-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13042-8.0/" type="self" id="ROS-20251217-8011" title="ROS-20251217-8011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13042" type="cve" id="CVE-2025-13042" title="CVE-2025-13042" />
			<reference href="https://bdu.fstec.ru/vul/2025-14373" type="self" id="BDU:2025-14373" title="BDU:2025-14373" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8012</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13223-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13223-8.0/" type="self" id="ROS-20251217-8012" title="ROS-20251217-8012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13223" type="cve" id="CVE-2025-13223" title="CVE-2025-13223" />
			<reference href="https://bdu.fstec.ru/vul/2025-14497" type="self" id="BDU:2025-14497" title="BDU:2025-14497" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8013</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13224-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13224-8.0/" type="self" id="ROS-20251217-8013" title="ROS-20251217-8013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13224" type="cve" id="CVE-2025-13224" title="CVE-2025-13224" />
			<reference href="https://bdu.fstec.ru/vul/2025-14498" type="self" id="BDU:2025-14498" title="BDU:2025-14498" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8014</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13226-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13226-8.0/" type="self" id="ROS-20251217-8014" title="ROS-20251217-8014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13226" type="cve" id="CVE-2025-13226" title="CVE-2025-13226" />
			<reference href="https://bdu.fstec.ru/vul/2025-14823" type="self" id="BDU:2025-14823" title="BDU:2025-14823" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8015</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13227-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13227-8.0/" type="self" id="ROS-20251217-8015" title="ROS-20251217-8015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13227" type="cve" id="CVE-2025-13227" title="CVE-2025-13227" />
			<reference href="https://bdu.fstec.ru/vul/2025-14819" type="self" id="BDU:2025-14819" title="BDU:2025-14819" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8016</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13228-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13228-8.0/" type="self" id="ROS-20251217-8016" title="ROS-20251217-8016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13228" type="cve" id="CVE-2025-13228" title="CVE-2025-13228" />
			<reference href="https://bdu.fstec.ru/vul/2025-14821" type="self" id="BDU:2025-14821" title="BDU:2025-14821" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8017</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13229-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13229-8.0/" type="self" id="ROS-20251217-8017" title="ROS-20251217-8017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13229" type="cve" id="CVE-2025-13229" title="CVE-2025-13229" />
			<reference href="https://bdu.fstec.ru/vul/2025-14820" type="self" id="BDU:2025-14820" title="BDU:2025-14820" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8018</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13230-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13230-8.0/" type="self" id="ROS-20251217-8018" title="ROS-20251217-8018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13230" type="cve" id="CVE-2025-13230" title="CVE-2025-13230" />
			<reference href="https://bdu.fstec.ru/vul/2025-14822" type="self" id="BDU:2025-14822" title="BDU:2025-14822" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8019</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2025-61727-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2025-61727-8.0/" type="self" id="ROS-20251217-8019" title="ROS-20251217-8019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61727" type="cve" id="CVE-2025-61727" title="CVE-2025-61727" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="golang" epoch="0" version="1.25.5" release="1.red80" arch="x86_64" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-0:1.25.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.5" release="1.red80" arch="x86_64" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.5" release="1.red80" arch="x86_64" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.5-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="golang" epoch="0" version="1.25.5" release="1.red80" arch="aarch64" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-0:1.25.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.5" release="1.red80" arch="aarch64" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.5" release="1.red80" arch="aarch64" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.5-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="golang-docs" epoch="0" version="1.25.5" release="1.red80" arch="noarch" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-docs-0:1.25.5-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.5" release="1.red80" arch="noarch" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-misc-0:1.25.5-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.5" release="1.red80" arch="noarch" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-src-0:1.25.5-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.5" release="1.red80" arch="noarch" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-tests-0:1.25.5-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251217-8020</id>
		<issued date="2025-12-17" />
		<updated date="2025-12-17" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2025-61729-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2025-61729-8.0/" type="self" id="ROS-20251217-8020" title="ROS-20251217-8020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61729" type="cve" id="CVE-2025-61729" title="CVE-2025-61729" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="golang" epoch="0" version="1.25.5" release="1.red80" arch="x86_64" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-0:1.25.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.5" release="1.red80" arch="x86_64" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.5" release="1.red80" arch="x86_64" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.5-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="golang" epoch="0" version="1.25.5" release="1.red80" arch="aarch64" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-0:1.25.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.5" release="1.red80" arch="aarch64" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.5" release="1.red80" arch="aarch64" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.5-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="golang-docs" epoch="0" version="1.25.5" release="1.red80" arch="noarch" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-docs-0:1.25.5-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.5" release="1.red80" arch="noarch" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-misc-0:1.25.5-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.5" release="1.red80" arch="noarch" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-src-0:1.25.5-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.5" release="1.red80" arch="noarch" src="golang-1.25.5-1.red80.src.rpm">
					<filename>golang-tests-0:1.25.5-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251219-8001</id>
		<issued date="2025-12-19" />
		<updated date="2025-12-19" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13992-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13992-8.0/" type="self" id="ROS-20251219-8001" title="ROS-20251219-8001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13992" type="cve" id="CVE-2025-13992" title="CVE-2025-13992" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="x86_64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromedriver-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="142.0.7444.175" release="1.red80" arch="aarch64" src="chromium-142.0.7444.175-1.red80.src.rpm">
					<filename>chromium-common-0:142.0.7444.175-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251219-8002</id>
		<issued date="2025-12-19" />
		<updated date="2025-12-24" />
		<title>Уязвимость 7zip </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в 7zip</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-7-zip-cve-2025-1100280/</description>
               <solution>Установить обновление для пакета(ов) 7-zip
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-7-zip-cve-2025-1100280/" type="self" id="ROS-20251219-8002" title="ROS-20251219-8002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11002" type="cve" id="CVE-2025-11002" title="CVE-2025-11002" />
			<reference href="https://bdu.fstec.ru/vul/2025-12912" type="self" id="BDU:2025-12912" title="BDU:2025-12912" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="7zip" epoch="0" version="25.00" release="1.red80" arch="x86_64" src="7zip-25.00-1.red80.src.rpm">
					<filename>7zip-0:25.00-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="7zip" epoch="0" version="25.00" release="1.red80" arch="aarch64" src="7zip-25.00-1.red80.src.rpm">
					<filename>7zip-0:25.00-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-8001</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость perl-Module-ScanDeps </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в perl-Module-ScanDeps</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-perl-module-scandeps-cve-2024-10224-8.0/</description>
               <solution>Установить обновление для пакета(ов) perl-Module-ScanDeps
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-perl-module-scandeps-cve-2024-10224-8.0/" type="self" id="ROS-20251223-8001" title="ROS-20251223-8001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10224" type="cve" id="CVE-2024-10224" title="CVE-2024-10224" />
			<reference href="https://bdu.fstec.ru/vul/2024-10103" type="self" id="BDU:2024-10103" title="BDU:2024-10103" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="perl-Module-ScanDeps" epoch="0" version="1.37" release="1.red80" arch="noarch" src="perl-Module-ScanDeps-1.37-1.red80.src.rpm">
					<filename>perl-Module-ScanDeps-0:1.37-1.red80.noarch.rpm</filename>
				</package>
				<package name="perl-Module-ScanDeps-tests" epoch="0" version="1.37" release="1.red80" arch="noarch" src="perl-Module-ScanDeps-1.37-1.red80.src.rpm">
					<filename>perl-Module-ScanDeps-tests-0:1.37-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-8002</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость iputils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в iputils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-iputils-cve-2025-47268-8.0/</description>
               <solution>Установить обновление для пакета(ов) iputils
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-iputils-cve-2025-47268-8.0/" type="self" id="ROS-20251223-8002" title="ROS-20251223-8002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47268" type="cve" id="CVE-2025-47268" title="CVE-2025-47268" />
			<reference href="https://bdu.fstec.ru/vul/2025-11086" type="self" id="BDU:2025-11086" title="BDU:2025-11086" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="iputils" epoch="0" version="20250605" release="1.red80" arch="x86_64" src="iputils-20250605-1.red80.src.rpm">
					<filename>iputils-0:20250605-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="iputils" epoch="0" version="20250605" release="1.red80" arch="aarch64" src="iputils-20250605-1.red80.src.rpm">
					<filename>iputils-0:20250605-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-8003</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость iputils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в iputils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-iputils-cve-2025-48964-8.0/</description>
               <solution>Установить обновление для пакета(ов) iputils
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-iputils-cve-2025-48964-8.0/" type="self" id="ROS-20251223-8003" title="ROS-20251223-8003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48964" type="cve" id="CVE-2025-48964" title="CVE-2025-48964" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="iputils" epoch="0" version="20250605" release="1.red80" arch="x86_64" src="iputils-20250605-1.red80.src.rpm">
					<filename>iputils-0:20250605-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="iputils" epoch="0" version="20250605" release="1.red80" arch="aarch64" src="iputils-20250605-1.red80.src.rpm">
					<filename>iputils-0:20250605-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-8004</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость php-symfony4 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php-symfony4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-php-symfony4-cve-2025-64500-8.0/</description>
               <solution>Установить обновление для пакета(ов) php-symfony4
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-php-symfony4-cve-2025-64500-8.0/" type="self" id="ROS-20251223-8004" title="ROS-20251223-8004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64500" type="cve" id="CVE-2025-64500" title="CVE-2025-64500" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="php-symfony4" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-asset" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-asset-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-browser-kit" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-browser-kit-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-cache" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-cache-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-common" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-common-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-config" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-config-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-console" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-console-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-css-selector" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-css-selector-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-debug" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-debug-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-debug-bundle" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-debug-bundle-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-dependency-injection" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-dependency-injection-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-doctrine-bridge" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-doctrine-bridge-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-dom-crawler" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-dom-crawler-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-dotenv" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-dotenv-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-error-handler" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-error-handler-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-event-dispatcher" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-event-dispatcher-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-expression-language" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-expression-language-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-filesystem" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-filesystem-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-finder" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-finder-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-form" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-form-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-framework-bundle" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-framework-bundle-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-http-client" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-http-client-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-http-foundation" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-http-foundation-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-http-kernel" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-http-kernel-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-inflector" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-inflector-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-intl" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-intl-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-ldap" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-ldap-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-lock" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-lock-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-mailer" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-mailer-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-messenger" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-messenger-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-mime" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-mime-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-monolog-bridge" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-monolog-bridge-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-options-resolver" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-options-resolver-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-phpunit-bridge" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-phpunit-bridge-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-process" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-process-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-property-access" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-property-access-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-property-info" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-property-info-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-routing" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-routing-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-security" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-security-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-security-bundle" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-security-bundle-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-serializer" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-serializer-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-stopwatch" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-stopwatch-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-templating" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-templating-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-translation" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-translation-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-twig-bridge" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-twig-bridge-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-twig-bundle" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-twig-bundle-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-validator" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-validator-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-var-dumper" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-var-dumper-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-var-exporter" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-var-exporter-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-web-link" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-web-link-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-web-profiler-bundle" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-web-profiler-bundle-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-web-server-bundle" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-web-server-bundle-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-workflow" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-workflow-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
				<package name="php-symfony4-yaml" epoch="0" version="4.4.50" release="7.red80" arch="noarch" src="php-symfony4-4.4.50-7.red80.src.rpm">
					<filename>php-symfony4-yaml-0:4.4.50-7.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-8005</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость jenkins </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jenkins-cve-2025-67639-8.0/</description>
               <solution>Установить обновление для пакета(ов) jenkins
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jenkins-cve-2025-67639-8.0/" type="self" id="ROS-20251223-8005" title="ROS-20251223-8005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67639" type="cve" id="CVE-2025-67639" title="CVE-2025-67639" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="jenkins" epoch="0" version="2.528.3" release="1.red80" arch="noarch" src="jenkins-2.528.3-1.red80.src.rpm">
					<filename>jenkins-0:2.528.3-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-8006</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость jenkins </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jenkins-cve-2025-67635-8.0/</description>
               <solution>Установить обновление для пакета(ов) jenkins
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jenkins-cve-2025-67635-8.0/" type="self" id="ROS-20251223-8006" title="ROS-20251223-8006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67635" type="cve" id="CVE-2025-67635" title="CVE-2025-67635" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="jenkins" epoch="0" version="2.528.3" release="1.red80" arch="noarch" src="jenkins-2.528.3-1.red80.src.rpm">
					<filename>jenkins-0:2.528.3-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-8007</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость jenkins </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jenkins-cve-2025-67636-8.0/</description>
               <solution>Установить обновление для пакета(ов) jenkins
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jenkins-cve-2025-67636-8.0/" type="self" id="ROS-20251223-8007" title="ROS-20251223-8007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67636" type="cve" id="CVE-2025-67636" title="CVE-2025-67636" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="jenkins" epoch="0" version="2.528.3" release="1.red80" arch="noarch" src="jenkins-2.528.3-1.red80.src.rpm">
					<filename>jenkins-0:2.528.3-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-8008</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость jenkins </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jenkins-cve-2025-67637-8.0/</description>
               <solution>Установить обновление для пакета(ов) jenkins
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jenkins-cve-2025-67637-8.0/" type="self" id="ROS-20251223-8008" title="ROS-20251223-8008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67637" type="cve" id="CVE-2025-67637" title="CVE-2025-67637" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="jenkins" epoch="0" version="2.528.3" release="1.red80" arch="noarch" src="jenkins-2.528.3-1.red80.src.rpm">
					<filename>jenkins-0:2.528.3-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251223-8009</id>
		<issued date="2025-12-23" />
		<updated date="2025-12-23" />
		<title>Уязвимость jenkins </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jenkins-cve-2025-67638-8.0/</description>
               <solution>Установить обновление для пакета(ов) jenkins
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jenkins-cve-2025-67638-8.0/" type="self" id="ROS-20251223-8009" title="ROS-20251223-8009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67638" type="cve" id="CVE-2025-67638" title="CVE-2025-67638" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="jenkins" epoch="0" version="2.528.3" release="1.red80" arch="noarch" src="jenkins-2.528.3-1.red80.src.rpm">
					<filename>jenkins-0:2.528.3-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251226-8001</id>
		<issued date="2025-12-26" />
		<updated date="2025-12-26" />
		<title>Уязвимость cockpit </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в cockpit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-cockpit-cve-2020-35850-8.0/</description>
               <solution>Установить обновление для пакета(ов) cockpit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-cockpit-cve-2020-35850-8.0/" type="self" id="ROS-20251226-8001" title="ROS-20251226-8001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35850" type="cve" id="CVE-2020-35850" title="CVE-2020-35850" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="cockpit" epoch="0" version="331" release="1.red80" arch="x86_64" src="cockpit-331-1.red80.src.rpm">
					<filename>cockpit-0:331-1.red80.x86_64.rpm</filename>
				</package>
				<package name="cockpit-bridge" epoch="0" version="331" release="1.red80" arch="x86_64" src="cockpit-331-1.red80.src.rpm">
					<filename>cockpit-bridge-0:331-1.red80.x86_64.rpm</filename>
				</package>
				<package name="cockpit-ws" epoch="0" version="331" release="1.red80" arch="x86_64" src="cockpit-331-1.red80.src.rpm">
					<filename>cockpit-ws-0:331-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="cockpit" epoch="0" version="331" release="1.red80" arch="aarch64" src="cockpit-331-1.red80.src.rpm">
					<filename>cockpit-0:331-1.red80.aarch64.rpm</filename>
				</package>
				<package name="cockpit-bridge" epoch="0" version="331" release="1.red80" arch="aarch64" src="cockpit-331-1.red80.src.rpm">
					<filename>cockpit-bridge-0:331-1.red80.aarch64.rpm</filename>
				</package>
				<package name="cockpit-ws" epoch="0" version="331" release="1.red80" arch="aarch64" src="cockpit-331-1.red80.src.rpm">
					<filename>cockpit-ws-0:331-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="cockpit-doc" epoch="0" version="331" release="1.red80" arch="noarch" src="cockpit-331-1.red80.src.rpm">
					<filename>cockpit-doc-0:331-1.red80.noarch.rpm</filename>
				</package>
				<package name="cockpit-kdump" epoch="0" version="331" release="1.red80" arch="noarch" src="cockpit-331-1.red80.src.rpm">
					<filename>cockpit-kdump-0:331-1.red80.noarch.rpm</filename>
				</package>
				<package name="cockpit-networkmanager" epoch="0" version="331" release="1.red80" arch="noarch" src="cockpit-331-1.red80.src.rpm">
					<filename>cockpit-networkmanager-0:331-1.red80.noarch.rpm</filename>
				</package>
				<package name="cockpit-packagekit" epoch="0" version="331" release="1.red80" arch="noarch" src="cockpit-331-1.red80.src.rpm">
					<filename>cockpit-packagekit-0:331-1.red80.noarch.rpm</filename>
				</package>
				<package name="cockpit-selinux" epoch="0" version="331" release="1.red80" arch="noarch" src="cockpit-331-1.red80.src.rpm">
					<filename>cockpit-selinux-0:331-1.red80.noarch.rpm</filename>
				</package>
				<package name="cockpit-sosreport" epoch="0" version="331" release="1.red80" arch="noarch" src="cockpit-331-1.red80.src.rpm">
					<filename>cockpit-sosreport-0:331-1.red80.noarch.rpm</filename>
				</package>
				<package name="cockpit-storaged" epoch="0" version="331" release="1.red80" arch="noarch" src="cockpit-331-1.red80.src.rpm">
					<filename>cockpit-storaged-0:331-1.red80.noarch.rpm</filename>
				</package>
				<package name="cockpit-system" epoch="0" version="331" release="1.red80" arch="noarch" src="cockpit-331-1.red80.src.rpm">
					<filename>cockpit-system-0:331-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251226-8002</id>
		<issued date="2025-12-26" />
		<updated date="2025-12-26" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-11709-8.0/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-11709-8.0/" type="self" id="ROS-20251226-8002" title="ROS-20251226-8002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11709" type="cve" id="CVE-2025-11709" title="CVE-2025-11709" />
			<reference href="https://bdu.fstec.ru/vul/2025-13288" type="self" id="BDU:2025-13288" title="BDU:2025-13288" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.red80" arch="x86_64" src="firefox-115.30.0-1.red80.src.rpm">
					<filename>firefox-0:115.30.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.red80" arch="aarch64" src="firefox-115.30.0-1.red80.src.rpm">
					<filename>firefox-0:115.30.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251226-8003</id>
		<issued date="2025-12-26" />
		<updated date="2025-12-26" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-11710-8.0/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-11710-8.0/" type="self" id="ROS-20251226-8003" title="ROS-20251226-8003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11710" type="cve" id="CVE-2025-11710" title="CVE-2025-11710" />
			<reference href="https://bdu.fstec.ru/vul/2025-13290" type="self" id="BDU:2025-13290" title="BDU:2025-13290" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.red80" arch="x86_64" src="firefox-115.30.0-1.red80.src.rpm">
					<filename>firefox-0:115.30.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.red80" arch="aarch64" src="firefox-115.30.0-1.red80.src.rpm">
					<filename>firefox-0:115.30.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20251226-8004</id>
		<issued date="2025-12-26" />
		<updated date="2025-12-26" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-11711-8.0/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-11711-8.0/" type="self" id="ROS-20251226-8004" title="ROS-20251226-8004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11711" type="cve" id="CVE-2025-11711" title="CVE-2025-11711" />
			<reference href="https://bdu.fstec.ru/vul/2025-13291" type="self" id="BDU:2025-13291" title="BDU:2025-13291" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.red80" arch="x86_64" src="firefox-115.30.0-1.red80.src.rpm">
					<filename>firefox-0:115.30.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.red80" arch="aarch64" src="firefox-115.30.0-1.red80.src.rpm">
					<filename>firefox-0:115.30.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260112-8001</id>
		<issued date="2026-01-12" />
		<updated date="2026-01-12" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2023-54326-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2023-54326-8.0/" type="self" id="ROS-20260112-8001" title="ROS-20260112-8001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54326" type="cve" id="CVE-2023-54326" title="CVE-2023-54326" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8001</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21893-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21893-8.0/" type="self" id="ROS-20260120-8001" title="ROS-20260120-8001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21893" type="cve" id="CVE-2025-21893" title="CVE-2025-21893" />
			<reference href="https://bdu.fstec.ru/vul/2025-03676" type="self" id="BDU:2025-03676" title="BDU:2025-03676" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8002</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21895-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21895-8.0/" type="self" id="ROS-20260120-8002" title="ROS-20260120-8002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21895" type="cve" id="CVE-2025-21895" title="CVE-2025-21895" />
			<reference href="https://bdu.fstec.ru/vul/2025-04452" type="self" id="BDU:2025-04452" title="BDU:2025-04452" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8003</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21897-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21897-8.0/" type="self" id="ROS-20260120-8003" title="ROS-20260120-8003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21897" type="cve" id="CVE-2025-21897" title="CVE-2025-21897" />
			<reference href="https://bdu.fstec.ru/vul/2025-04411" type="self" id="BDU:2025-04411" title="BDU:2025-04411" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8004</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21900-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21900-8.0/" type="self" id="ROS-20260120-8004" title="ROS-20260120-8004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21900" type="cve" id="CVE-2025-21900" title="CVE-2025-21900" />
			<reference href="https://bdu.fstec.ru/vul/2025-04455" type="self" id="BDU:2025-04455" title="BDU:2025-04455" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8005</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21901-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21901-8.0/" type="self" id="ROS-20260120-8005" title="ROS-20260120-8005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21901" type="cve" id="CVE-2025-21901" title="CVE-2025-21901" />
			<reference href="https://bdu.fstec.ru/vul/2025-04453" type="self" id="BDU:2025-04453" title="BDU:2025-04453" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8006</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21902-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21902-8.0/" type="self" id="ROS-20260120-8006" title="ROS-20260120-8006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21902" type="cve" id="CVE-2025-21902" title="CVE-2025-21902" />
			<reference href="https://bdu.fstec.ru/vul/2025-04385" type="self" id="BDU:2025-04385" title="BDU:2025-04385" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8007</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21903-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21903-8.0/" type="self" id="ROS-20260120-8007" title="ROS-20260120-8007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21903" type="cve" id="CVE-2025-21903" title="CVE-2025-21903" />
			<reference href="https://bdu.fstec.ru/vul/2025-04819" type="self" id="BDU:2025-04819" title="BDU:2025-04819" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8008</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21906-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21906-8.0/" type="self" id="ROS-20260120-8008" title="ROS-20260120-8008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21906" type="cve" id="CVE-2025-21906" title="CVE-2025-21906" />
			<reference href="https://bdu.fstec.ru/vul/2025-04805" type="self" id="BDU:2025-04805" title="BDU:2025-04805" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8009</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21908-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21908-8.0/" type="self" id="ROS-20260120-8009" title="ROS-20260120-8009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21908" type="cve" id="CVE-2025-21908" title="CVE-2025-21908" />
			<reference href="https://bdu.fstec.ru/vul/2025-04800" type="self" id="BDU:2025-04800" title="BDU:2025-04800" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8010</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21911-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21911-8.0/" type="self" id="ROS-20260120-8010" title="ROS-20260120-8010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21911" type="cve" id="CVE-2025-21911" title="CVE-2025-21911" />
			<reference href="https://bdu.fstec.ru/vul/2025-04822" type="self" id="BDU:2025-04822" title="BDU:2025-04822" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8011</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21921-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21921-8.0/" type="self" id="ROS-20260120-8011" title="ROS-20260120-8011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21921" type="cve" id="CVE-2025-21921" title="CVE-2025-21921" />
			<reference href="https://bdu.fstec.ru/vul/2025-04086" type="self" id="BDU:2025-04086" title="BDU:2025-04086" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8012</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21923-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21923-8.0/" type="self" id="ROS-20260120-8012" title="ROS-20260120-8012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21923" type="cve" id="CVE-2025-21923" title="CVE-2025-21923" />
			<reference href="https://bdu.fstec.ru/vul/2025-05643" type="self" id="BDU:2025-05643" title="BDU:2025-05643" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8013</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21929-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21929-8.0/" type="self" id="ROS-20260120-8013" title="ROS-20260120-8013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21929" type="cve" id="CVE-2025-21929" title="CVE-2025-21929" />
			<reference href="https://bdu.fstec.ru/vul/2025-11775" type="self" id="BDU:2025-11775" title="BDU:2025-11775" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8014</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21930-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21930-8.0/" type="self" id="ROS-20260120-8014" title="ROS-20260120-8014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21930" type="cve" id="CVE-2025-21930" title="CVE-2025-21930" />
			<reference href="https://bdu.fstec.ru/vul/2025-11774" type="self" id="BDU:2025-11774" title="BDU:2025-11774" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8015</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21932-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21932-8.0/" type="self" id="ROS-20260120-8015" title="ROS-20260120-8015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21932" type="cve" id="CVE-2025-21932" title="CVE-2025-21932" />
			<reference href="https://bdu.fstec.ru/vul/2025-11779" type="self" id="BDU:2025-11779" title="BDU:2025-11779" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8016</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21939-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21939-8.0/" type="self" id="ROS-20260120-8016" title="ROS-20260120-8016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21939" type="cve" id="CVE-2025-21939" title="CVE-2025-21939" />
			<reference href="https://bdu.fstec.ru/vul/2025-04622" type="self" id="BDU:2025-04622" title="BDU:2025-04622" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8017</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21940-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21940-8.0/" type="self" id="ROS-20260120-8017" title="ROS-20260120-8017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21940" type="cve" id="CVE-2025-21940" title="CVE-2025-21940" />
			<reference href="https://bdu.fstec.ru/vul/2025-04652" type="self" id="BDU:2025-04652" title="BDU:2025-04652" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-80-0001</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21954-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21954-8.0/" type="self" id="ROS-20260120-80-0001" title="ROS-20260120-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21954" type="cve" id="CVE-2025-21954" title="CVE-2025-21954" />
			<reference href="https://bdu.fstec.ru/vul/2025-11941" type="self" id="BDU:2025-11941" title="BDU:2025-11941" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8018</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21958-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21958-8.0/" type="self" id="ROS-20260120-8018" title="ROS-20260120-8018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21958" type="cve" id="CVE-2025-21958" title="CVE-2025-21958" />
			<reference href="https://bdu.fstec.ru/vul/2025-12299" type="self" id="BDU:2025-12299" title="BDU:2025-12299" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8019</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21965-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21965-8.0/" type="self" id="ROS-20260120-8019" title="ROS-20260120-8019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21965" type="cve" id="CVE-2025-21965" title="CVE-2025-21965" />
			<reference href="https://bdu.fstec.ru/vul/2025-11803" type="self" id="BDU:2025-11803" title="BDU:2025-11803" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8020</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21966-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21966-8.0/" type="self" id="ROS-20260120-8020" title="ROS-20260120-8020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21966" type="cve" id="CVE-2025-21966" title="CVE-2025-21966" />
			<reference href="https://bdu.fstec.ru/vul/2025-12303" type="self" id="BDU:2025-12303" title="BDU:2025-12303" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8021</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21973-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21973-8.0/" type="self" id="ROS-20260120-8021" title="ROS-20260120-8021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21973" type="cve" id="CVE-2025-21973" title="CVE-2025-21973" />
			<reference href="https://bdu.fstec.ru/vul/2025-12183" type="self" id="BDU:2025-12183" title="BDU:2025-12183" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8022</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21974-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21974-8.0/" type="self" id="ROS-20260120-8022" title="ROS-20260120-8022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21974" type="cve" id="CVE-2025-21974" title="CVE-2025-21974" />
			<reference href="https://bdu.fstec.ru/vul/2025-12112" type="self" id="BDU:2025-12112" title="BDU:2025-12112" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8023</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21977-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21977-8.0/" type="self" id="ROS-20260120-8023" title="ROS-20260120-8023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21977" type="cve" id="CVE-2025-21977" title="CVE-2025-21977" />
			<reference href="https://bdu.fstec.ru/vul/2025-11802" type="self" id="BDU:2025-11802" title="BDU:2025-11802" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8024</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21982-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21982-8.0/" type="self" id="ROS-20260120-8024" title="ROS-20260120-8024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21982" type="cve" id="CVE-2025-21982" title="CVE-2025-21982" />
			<reference href="https://bdu.fstec.ru/vul/2025-12181" type="self" id="BDU:2025-12181" title="BDU:2025-12181" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8025</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21983-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21983-8.0/" type="self" id="ROS-20260120-8025" title="ROS-20260120-8025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21983" type="cve" id="CVE-2025-21983" title="CVE-2025-21983" />
			<reference href="https://bdu.fstec.ru/vul/2025-11962" type="self" id="BDU:2025-11962" title="BDU:2025-11962" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8026</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21984-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21984-8.0/" type="self" id="ROS-20260120-8026" title="ROS-20260120-8026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21984" type="cve" id="CVE-2025-21984" title="CVE-2025-21984" />
			<reference href="https://bdu.fstec.ru/vul/2025-11992" type="self" id="BDU:2025-11992" title="BDU:2025-11992" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8027</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21987-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21987-8.0/" type="self" id="ROS-20260120-8027" title="ROS-20260120-8027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21987" type="cve" id="CVE-2025-21987" title="CVE-2025-21987" />
			<reference href="https://bdu.fstec.ru/vul/2025-05645" type="self" id="BDU:2025-05645" title="BDU:2025-05645" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8028</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21989-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21989-8.0/" type="self" id="ROS-20260120-8028" title="ROS-20260120-8028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21989" type="cve" id="CVE-2025-21989" title="CVE-2025-21989" />
			<reference href="https://bdu.fstec.ru/vul/2025-05647" type="self" id="BDU:2025-05647" title="BDU:2025-05647" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8029</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21990-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21990-8.0/" type="self" id="ROS-20260120-8029" title="ROS-20260120-8029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21990" type="cve" id="CVE-2025-21990" title="CVE-2025-21990" />
			<reference href="https://bdu.fstec.ru/vul/2025-05648" type="self" id="BDU:2025-05648" title="BDU:2025-05648" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8030</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21995-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21995-8.0/" type="self" id="ROS-20260120-8030" title="ROS-20260120-8030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21995" type="cve" id="CVE-2025-21995" title="CVE-2025-21995" />
			<reference href="https://bdu.fstec.ru/vul/2025-11627" type="self" id="BDU:2025-11627" title="BDU:2025-11627" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8031</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21998-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-21998-8.0/" type="self" id="ROS-20260120-8031" title="ROS-20260120-8031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21998" type="cve" id="CVE-2025-21998" title="CVE-2025-21998" />
			<reference href="https://bdu.fstec.ru/vul/2025-11626" type="self" id="BDU:2025-11626" title="BDU:2025-11626" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8032</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22000-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22000-8.0/" type="self" id="ROS-20260120-8032" title="ROS-20260120-8032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22000" type="cve" id="CVE-2025-22000" title="CVE-2025-22000" />
			<reference href="https://bdu.fstec.ru/vul/2025-11628" type="self" id="BDU:2025-11628" title="BDU:2025-11628" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8033</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22001-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22001-8.0/" type="self" id="ROS-20260120-8033" title="ROS-20260120-8033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22001" type="cve" id="CVE-2025-22001" title="CVE-2025-22001" />
			<reference href="https://bdu.fstec.ru/vul/2025-11771" type="self" id="BDU:2025-11771" title="BDU:2025-11771" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8034</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22002-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22002-8.0/" type="self" id="ROS-20260120-8034" title="ROS-20260120-8034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22002" type="cve" id="CVE-2025-22002" title="CVE-2025-22002" />
			<reference href="https://bdu.fstec.ru/vul/2025-11634" type="self" id="BDU:2025-11634" title="BDU:2025-11634" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260120-8035</id>
		<issued date="2026-01-20" />
		<updated date="2026-01-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22003-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22003-8.0/" type="self" id="ROS-20260120-8035" title="ROS-20260120-8035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22003" type="cve" id="CVE-2025-22003" title="CVE-2025-22003" />
			<reference href="https://bdu.fstec.ru/vul/2025-11624" type="self" id="BDU:2025-11624" title="BDU:2025-11624" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0001</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22006-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22006-8.0/" type="self" id="ROS-20260121-80-0001" title="ROS-20260121-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22006" type="cve" id="CVE-2025-22006" title="CVE-2025-22006" />
			<reference href="https://bdu.fstec.ru/vul/2025-11631" type="self" id="BDU:2025-11631" title="BDU:2025-11631" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.21" release="1.red80" arch="x86_64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.21-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.21" release="1.red80" arch="aarch64" src="kernel-lt-6.12.21-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.21-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0002</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2024-58092-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2024-58092-8.0/" type="self" id="ROS-20260121-80-0002" title="ROS-20260121-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58092" type="cve" id="CVE-2024-58092" title="CVE-2024-58092" />
			<reference href="https://bdu.fstec.ru/vul/2025-12250" type="self" id="BDU:2025-12250" title="BDU:2025-12250" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0003</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22020-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22020-8.0/" type="self" id="ROS-20260121-80-0003" title="ROS-20260121-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22020" type="cve" id="CVE-2025-22020" title="CVE-2025-22020" />
			<reference href="https://bdu.fstec.ru/vul/2025-12077" type="self" id="BDU:2025-12077" title="BDU:2025-12077" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0004</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22021-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22021-8.0/" type="self" id="ROS-20260121-80-0004" title="ROS-20260121-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22021" type="cve" id="CVE-2025-22021" title="CVE-2025-22021" />
			<reference href="https://bdu.fstec.ru/vul/2025-11940" type="self" id="BDU:2025-11940" title="BDU:2025-11940" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0005</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22023-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22023-8.0/" type="self" id="ROS-20260121-80-0005" title="ROS-20260121-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22023" type="cve" id="CVE-2025-22023" title="CVE-2025-22023" />
			<reference href="https://bdu.fstec.ru/vul/2025-12286" type="self" id="BDU:2025-12286" title="BDU:2025-12286" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0006</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2023-53034-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2023-53034-8.0/" type="self" id="ROS-20260121-80-0006" title="ROS-20260121-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53034" type="cve" id="CVE-2023-53034" title="CVE-2023-53034" />
			<reference href="https://bdu.fstec.ru/vul/2025-11886" type="self" id="BDU:2025-11886" title="BDU:2025-11886" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0007</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2024-58093-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2024-58093-8.0/" type="self" id="ROS-20260121-80-0007" title="ROS-20260121-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58093" type="cve" id="CVE-2024-58093" title="CVE-2024-58093" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0008</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22024-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22024-8.0/" type="self" id="ROS-20260121-80-0008" title="ROS-20260121-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22024" type="cve" id="CVE-2025-22024" title="CVE-2025-22024" />
			<reference href="https://bdu.fstec.ru/vul/2025-12098" type="self" id="BDU:2025-12098" title="BDU:2025-12098" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0009</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22025-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22025-8.0/" type="self" id="ROS-20260121-80-0009" title="ROS-20260121-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22025" type="cve" id="CVE-2025-22025" title="CVE-2025-22025" />
			<reference href="https://bdu.fstec.ru/vul/2025-12371" type="self" id="BDU:2025-12371" title="BDU:2025-12371" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0010</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22027-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22027-8.0/" type="self" id="ROS-20260121-80-0010" title="ROS-20260121-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22027" type="cve" id="CVE-2025-22027" title="CVE-2025-22027" />
			<reference href="https://bdu.fstec.ru/vul/2025-11991" type="self" id="BDU:2025-11991" title="BDU:2025-11991" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0011</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22030-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22030-8.0/" type="self" id="ROS-20260121-80-0011" title="ROS-20260121-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22030" type="cve" id="CVE-2025-22030" title="CVE-2025-22030" />
			<reference href="https://bdu.fstec.ru/vul/2025-12345" type="self" id="BDU:2025-12345" title="BDU:2025-12345" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0012</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22032-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22032-8.0/" type="self" id="ROS-20260121-80-0012" title="ROS-20260121-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22032" type="cve" id="CVE-2025-22032" title="CVE-2025-22032" />
			<reference href="https://bdu.fstec.ru/vul/2025-12179" type="self" id="BDU:2025-12179" title="BDU:2025-12179" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0013</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22033-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22033-8.0/" type="self" id="ROS-20260121-80-0013" title="ROS-20260121-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22033" type="cve" id="CVE-2025-22033" title="CVE-2025-22033" />
			<reference href="https://bdu.fstec.ru/vul/2025-12178" type="self" id="BDU:2025-12178" title="BDU:2025-12178" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0014</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22034-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22034-8.0/" type="self" id="ROS-20260121-80-0014" title="ROS-20260121-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22034" type="cve" id="CVE-2025-22034" title="CVE-2025-22034" />
			<reference href="https://bdu.fstec.ru/vul/2025-12097" type="self" id="BDU:2025-12097" title="BDU:2025-12097" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0015</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22035-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22035-8.0/" type="self" id="ROS-20260121-80-0015" title="ROS-20260121-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22035" type="cve" id="CVE-2025-22035" title="CVE-2025-22035" />
			<reference href="https://bdu.fstec.ru/vul/2025-12076" type="self" id="BDU:2025-12076" title="BDU:2025-12076" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0016</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22036-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22036-8.0/" type="self" id="ROS-20260121-80-0016" title="ROS-20260121-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22036" type="cve" id="CVE-2025-22036" title="CVE-2025-22036" />
			<reference href="https://bdu.fstec.ru/vul/2025-11990" type="self" id="BDU:2025-11990" title="BDU:2025-11990" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0017</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22038-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22038-8.0/" type="self" id="ROS-20260121-80-0017" title="ROS-20260121-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22038" type="cve" id="CVE-2025-22038" title="CVE-2025-22038" />
			<reference href="https://bdu.fstec.ru/vul/2025-11873" type="self" id="BDU:2025-11873" title="BDU:2025-11873" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0018</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22040-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22040-8.0/" type="self" id="ROS-20260121-80-0018" title="ROS-20260121-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22040" type="cve" id="CVE-2025-22040" title="CVE-2025-22040" />
			<reference href="https://bdu.fstec.ru/vul/2025-12075" type="self" id="BDU:2025-12075" title="BDU:2025-12075" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0019</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22041-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22041-8.0/" type="self" id="ROS-20260121-80-0019" title="ROS-20260121-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22041" type="cve" id="CVE-2025-22041" title="CVE-2025-22041" />
			<reference href="https://bdu.fstec.ru/vul/2025-12096" type="self" id="BDU:2025-12096" title="BDU:2025-12096" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0020</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22042-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22042-8.0/" type="self" id="ROS-20260121-80-0020" title="ROS-20260121-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22042" type="cve" id="CVE-2025-22042" title="CVE-2025-22042" />
			<reference href="https://bdu.fstec.ru/vul/2025-11826" type="self" id="BDU:2025-11826" title="BDU:2025-11826" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0021</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22044-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22044-8.0/" type="self" id="ROS-20260121-80-0021" title="ROS-20260121-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22044" type="cve" id="CVE-2025-22044" title="CVE-2025-22044" />
			<reference href="https://bdu.fstec.ru/vul/2025-12276" type="self" id="BDU:2025-12276" title="BDU:2025-12276" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0022</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22045-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22045-8.0/" type="self" id="ROS-20260121-80-0022" title="ROS-20260121-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22045" type="cve" id="CVE-2025-22045" title="CVE-2025-22045" />
			<reference href="https://bdu.fstec.ru/vul/2025-12281" type="self" id="BDU:2025-12281" title="BDU:2025-12281" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0023</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22046-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22046-8.0/" type="self" id="ROS-20260121-80-0023" title="ROS-20260121-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22046" type="cve" id="CVE-2025-22046" title="CVE-2025-22046" />
			<reference href="https://bdu.fstec.ru/vul/2025-12312" type="self" id="BDU:2025-12312" title="BDU:2025-12312" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0024</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22047-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22047-8.0/" type="self" id="ROS-20260121-80-0024" title="ROS-20260121-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22047" type="cve" id="CVE-2025-22047" title="CVE-2025-22047" />
			<reference href="https://bdu.fstec.ru/vul/2025-11939" type="self" id="BDU:2025-11939" title="BDU:2025-11939" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0025</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22049-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22049-8.0/" type="self" id="ROS-20260121-80-0025" title="ROS-20260121-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22049" type="cve" id="CVE-2025-22049" title="CVE-2025-22049" />
			<reference href="https://bdu.fstec.ru/vul/2025-12300" type="self" id="BDU:2025-12300" title="BDU:2025-12300" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0026</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22050-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22050-8.0/" type="self" id="ROS-20260121-80-0026" title="ROS-20260121-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22050" type="cve" id="CVE-2025-22050" title="CVE-2025-22050" />
			<reference href="https://bdu.fstec.ru/vul/2025-12177" type="self" id="BDU:2025-12177" title="BDU:2025-12177" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0027</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22054-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22054-8.0/" type="self" id="ROS-20260121-80-0027" title="ROS-20260121-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22054" type="cve" id="CVE-2025-22054" title="CVE-2025-22054" />
			<reference href="https://bdu.fstec.ru/vul/2025-12114" type="self" id="BDU:2025-12114" title="BDU:2025-12114" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0028</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22055-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22055-8.0/" type="self" id="ROS-20260121-80-0028" title="ROS-20260121-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22055" type="cve" id="CVE-2025-22055" title="CVE-2025-22055" />
			<reference href="https://bdu.fstec.ru/vul/2025-11892" type="self" id="BDU:2025-11892" title="BDU:2025-11892" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0029</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22056-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22056-8.0/" type="self" id="ROS-20260121-80-0029" title="ROS-20260121-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22056" type="cve" id="CVE-2025-22056" title="CVE-2025-22056" />
			<reference href="https://bdu.fstec.ru/vul/2025-08099" type="self" id="BDU:2025-08099" title="BDU:2025-08099" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0030</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22058-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22058-8.0/" type="self" id="ROS-20260121-80-0030" title="ROS-20260121-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22058" type="cve" id="CVE-2025-22058" title="CVE-2025-22058" />
			<reference href="https://bdu.fstec.ru/vul/2025-11911" type="self" id="BDU:2025-11911" title="BDU:2025-11911" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0031</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22059-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22059-8.0/" type="self" id="ROS-20260121-80-0031" title="ROS-20260121-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22059" type="cve" id="CVE-2025-22059" title="CVE-2025-22059" />
			<reference href="https://bdu.fstec.ru/vul/2025-11910" type="self" id="BDU:2025-11910" title="BDU:2025-11910" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0032</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22060-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22060-8.0/" type="self" id="ROS-20260121-80-0032" title="ROS-20260121-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22060" type="cve" id="CVE-2025-22060" title="CVE-2025-22060" />
			<reference href="https://bdu.fstec.ru/vul/2025-11827" type="self" id="BDU:2025-11827" title="BDU:2025-11827" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0033</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22062-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22062-8.0/" type="self" id="ROS-20260121-80-0033" title="ROS-20260121-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22062" type="cve" id="CVE-2025-22062" title="CVE-2025-22062" />
			<reference href="https://bdu.fstec.ru/vul/2025-12176" type="self" id="BDU:2025-12176" title="BDU:2025-12176" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0034</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22063-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22063-8.0/" type="self" id="ROS-20260121-80-0034" title="ROS-20260121-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22063" type="cve" id="CVE-2025-22063" title="CVE-2025-22063" />
			<reference href="https://bdu.fstec.ru/vul/2025-12175" type="self" id="BDU:2025-12175" title="BDU:2025-12175" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0035</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22064-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22064-8.0/" type="self" id="ROS-20260121-80-0035" title="ROS-20260121-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22064" type="cve" id="CVE-2025-22064" title="CVE-2025-22064" />
			<reference href="https://bdu.fstec.ru/vul/2025-11872" type="self" id="BDU:2025-11872" title="BDU:2025-11872" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0036</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22065-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22065-8.0/" type="self" id="ROS-20260121-80-0036" title="ROS-20260121-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22065" type="cve" id="CVE-2025-22065" title="CVE-2025-22065" />
			<reference href="https://bdu.fstec.ru/vul/2025-12174" type="self" id="BDU:2025-12174" title="BDU:2025-12174" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0037</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22066-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22066-8.0/" type="self" id="ROS-20260121-80-0037" title="ROS-20260121-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22066" type="cve" id="CVE-2025-22066" title="CVE-2025-22066" />
			<reference href="https://bdu.fstec.ru/vul/2025-12173" type="self" id="BDU:2025-12173" title="BDU:2025-12173" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0038</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22067-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22067-8.0/" type="self" id="ROS-20260121-80-0038" title="ROS-20260121-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22067" type="cve" id="CVE-2025-22067" title="CVE-2025-22067" />
			<reference href="https://bdu.fstec.ru/vul/2025-11897" type="self" id="BDU:2025-11897" title="BDU:2025-11897" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0039</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22068-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22068-8.0/" type="self" id="ROS-20260121-80-0039" title="ROS-20260121-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22068" type="cve" id="CVE-2025-22068" title="CVE-2025-22068" />
			<reference href="https://bdu.fstec.ru/vul/2025-12095" type="self" id="BDU:2025-12095" title="BDU:2025-12095" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0040</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22071-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22071-8.0/" type="self" id="ROS-20260121-80-0040" title="ROS-20260121-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22071" type="cve" id="CVE-2025-22071" title="CVE-2025-22071" />
			<reference href="https://bdu.fstec.ru/vul/2025-12040" type="self" id="BDU:2025-12040" title="BDU:2025-12040" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0041</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22072-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22072-8.0/" type="self" id="ROS-20260121-80-0041" title="ROS-20260121-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22072" type="cve" id="CVE-2025-22072" title="CVE-2025-22072" />
			<reference href="https://bdu.fstec.ru/vul/2025-12039" type="self" id="BDU:2025-12039" title="BDU:2025-12039" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0042</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22073-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22073-8.0/" type="self" id="ROS-20260121-80-0042" title="ROS-20260121-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22073" type="cve" id="CVE-2025-22073" title="CVE-2025-22073" />
			<reference href="https://bdu.fstec.ru/vul/2025-12038" type="self" id="BDU:2025-12038" title="BDU:2025-12038" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0043</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22074-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22074-8.0/" type="self" id="ROS-20260121-80-0043" title="ROS-20260121-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22074" type="cve" id="CVE-2025-22074" title="CVE-2025-22074" />
			<reference href="https://bdu.fstec.ru/vul/2025-11801" type="self" id="BDU:2025-11801" title="BDU:2025-11801" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0044</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22075-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22075-8.0/" type="self" id="ROS-20260121-80-0044" title="ROS-20260121-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22075" type="cve" id="CVE-2025-22075" title="CVE-2025-22075" />
			<reference href="https://bdu.fstec.ru/vul/2025-11901" type="self" id="BDU:2025-11901" title="BDU:2025-11901" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0045</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22076-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22076-8.0/" type="self" id="ROS-20260121-80-0045" title="ROS-20260121-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22076" type="cve" id="CVE-2025-22076" title="CVE-2025-22076" />
			<reference href="https://bdu.fstec.ru/vul/2025-11961" type="self" id="BDU:2025-11961" title="BDU:2025-11961" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0046</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22077-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22077-8.0/" type="self" id="ROS-20260121-80-0046" title="ROS-20260121-80-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22077" type="cve" id="CVE-2025-22077" title="CVE-2025-22077" />
			<reference href="https://bdu.fstec.ru/vul/2025-12094" type="self" id="BDU:2025-12094" title="BDU:2025-12094" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0047</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22078-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22078-8.0/" type="self" id="ROS-20260121-80-0047" title="ROS-20260121-80-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22078" type="cve" id="CVE-2025-22078" title="CVE-2025-22078" />
			<reference href="https://bdu.fstec.ru/vul/2025-12016" type="self" id="BDU:2025-12016" title="BDU:2025-12016" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0048</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23137-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23137-8.0/" type="self" id="ROS-20260121-80-0048" title="ROS-20260121-80-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23137" type="cve" id="CVE-2025-23137" title="CVE-2025-23137" />
			<reference href="https://bdu.fstec.ru/vul/2025-15234" type="self" id="BDU:2025-15234" title="BDU:2025-15234" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0049</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23136-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23136-8.0/" type="self" id="ROS-20260121-80-0049" title="ROS-20260121-80-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23136" type="cve" id="CVE-2025-23136" title="CVE-2025-23136" />
			<reference href="https://bdu.fstec.ru/vul/2025-12167" type="self" id="BDU:2025-12167" title="BDU:2025-12167" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0050</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23134-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23134-8.0/" type="self" id="ROS-20260121-80-0050" title="ROS-20260121-80-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23134" type="cve" id="CVE-2025-23134" title="CVE-2025-23134" />
			<reference href="https://bdu.fstec.ru/vul/2025-12258" type="self" id="BDU:2025-12258" title="BDU:2025-12258" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0051</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22128-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22128-8.0/" type="self" id="ROS-20260121-80-0051" title="ROS-20260121-80-0051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22128" type="cve" id="CVE-2025-22128" title="CVE-2025-22128" />
			<reference href="https://bdu.fstec.ru/vul/2025-15113" type="self" id="BDU:2025-15113" title="BDU:2025-15113" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0052</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22126-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22126-8.0/" type="self" id="ROS-20260121-80-0052" title="ROS-20260121-80-0052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22126" type="cve" id="CVE-2025-22126" title="CVE-2025-22126" />
			<reference href="https://bdu.fstec.ru/vul/2025-12105" type="self" id="BDU:2025-12105" title="BDU:2025-12105" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0053</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22124-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22124-8.0/" type="self" id="ROS-20260121-80-0053" title="ROS-20260121-80-0053" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22124" type="cve" id="CVE-2025-22124" title="CVE-2025-22124" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0054</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22123-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22123-8.0/" type="self" id="ROS-20260121-80-0054" title="ROS-20260121-80-0054" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22123" type="cve" id="CVE-2025-22123" title="CVE-2025-22123" />
			<reference href="https://bdu.fstec.ru/vul/2025-12331" type="self" id="BDU:2025-12331" title="BDU:2025-12331" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0055</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22122-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22122-8.0/" type="self" id="ROS-20260121-80-0055" title="ROS-20260121-80-0055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22122" type="cve" id="CVE-2025-22122" title="CVE-2025-22122" />
			<reference href="https://bdu.fstec.ru/vul/2025-11985" type="self" id="BDU:2025-11985" title="BDU:2025-11985" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0056</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22120-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22120-8.0/" type="self" id="ROS-20260121-80-0056" title="ROS-20260121-80-0056" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22120" type="cve" id="CVE-2025-22120" title="CVE-2025-22120" />
			<reference href="https://bdu.fstec.ru/vul/2025-12259" type="self" id="BDU:2025-12259" title="BDU:2025-12259" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0057</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22119-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22119-8.0/" type="self" id="ROS-20260121-80-0057" title="ROS-20260121-80-0057" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22119" type="cve" id="CVE-2025-22119" title="CVE-2025-22119" />
			<reference href="https://bdu.fstec.ru/vul/2025-15114" type="self" id="BDU:2025-15114" title="BDU:2025-15114" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0058</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22112-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22112-8.0/" type="self" id="ROS-20260121-80-0058" title="ROS-20260121-80-0058" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22112" type="cve" id="CVE-2025-22112" title="CVE-2025-22112" />
			<reference href="https://bdu.fstec.ru/vul/2025-15232" type="self" id="BDU:2025-15232" title="BDU:2025-15232" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0059</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22106-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22106-8.0/" type="self" id="ROS-20260121-80-0059" title="ROS-20260121-80-0059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22106" type="cve" id="CVE-2025-22106" title="CVE-2025-22106" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0060</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22102-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22102-8.0/" type="self" id="ROS-20260121-80-0060" title="ROS-20260121-80-0060" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22102" type="cve" id="CVE-2025-22102" title="CVE-2025-22102" />
			<reference href="https://bdu.fstec.ru/vul/2025-11800" type="self" id="BDU:2025-11800" title="BDU:2025-11800" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260121-80-0061</id>
		<issued date="2026-01-21" />
		<updated date="2026-01-21" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22101-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22101-8.0/" type="self" id="ROS-20260121-80-0061" title="ROS-20260121-80-0061" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22101" type="cve" id="CVE-2025-22101" title="CVE-2025-22101" />
			<reference href="https://bdu.fstec.ru/vul/2025-15233" type="self" id="BDU:2025-15233" title="BDU:2025-15233" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0001</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость python-sentry-sdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-sentry-sdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-sentry-sdk-cve-2024-40647-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-sentry-sdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-sentry-sdk-cve-2024-40647-8.0/" type="self" id="ROS-20260122-80-0001" title="ROS-20260122-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40647" type="cve" id="CVE-2024-40647" title="CVE-2024-40647" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="python3-sentry-sdk" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+aiohttp" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+aiohttp-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+bottle" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+bottle-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+celery" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+celery-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+django" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+django-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+fastapi" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+fastapi-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+flask" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+flask-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+httpx" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+httpx-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+pymongo" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+pymongo-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+sqlalchemy" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+sqlalchemy-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+starlette" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+starlette-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+tornado" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+tornado-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="python3-sentry-sdk" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+aiohttp" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+aiohttp-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+bottle" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+bottle-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+celery" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+celery-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+django" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+django-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+fastapi" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+fastapi-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+flask" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+flask-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+httpx" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+httpx-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+pymongo" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+pymongo-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+sqlalchemy" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+sqlalchemy-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+starlette" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+starlette-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+tornado" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+tornado-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0002</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость openstack-ironic-python-agent </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openstack-ironic-python-agent</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openstack-ironic-python-agent-cve-2024-44082-8.0/</description>
               <solution>Установить обновление для пакета(ов) openstack-ironic-python-agent
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openstack-ironic-python-agent-cve-2024-44082-8.0/" type="self" id="ROS-20260122-80-0002" title="ROS-20260122-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44082" type="cve" id="CVE-2024-44082" title="CVE-2024-44082" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="openstack-ironic-python-agent" epoch="0" version="10.0.0" release="1.red80" arch="noarch" src="openstack-ironic-python-agent-10.0.0-1.red80.src.rpm">
					<filename>openstack-ironic-python-agent-0:10.0.0-1.red80.noarch.rpm</filename>
				</package>
				<package name="python-ironic-python-agent-doc" epoch="0" version="10.0.0" release="1.red80" arch="noarch" src="openstack-ironic-python-agent-10.0.0-1.red80.src.rpm">
					<filename>python-ironic-python-agent-doc-0:10.0.0-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-ironic-python-agent" epoch="0" version="10.0.0" release="1.red80" arch="noarch" src="openstack-ironic-python-agent-10.0.0-1.red80.src.rpm">
					<filename>python3-ironic-python-agent-0:10.0.0-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-ironic-python-agent-tests" epoch="0" version="10.0.0" release="1.red80" arch="noarch" src="openstack-ironic-python-agent-10.0.0-1.red80.src.rpm">
					<filename>python3-ironic-python-agent-tests-0:10.0.0-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0003</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость python-sentry-sdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-sentry-sdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-sentry-sdk-cve-2024-53253-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-sentry-sdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-sentry-sdk-cve-2024-53253-8.0/" type="self" id="ROS-20260122-80-0003" title="ROS-20260122-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53253" type="cve" id="CVE-2024-53253" title="CVE-2024-53253" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="python3-sentry-sdk" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+aiohttp" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+aiohttp-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+bottle" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+bottle-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+celery" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+celery-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+django" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+django-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+fastapi" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+fastapi-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+flask" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+flask-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+httpx" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+httpx-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+pymongo" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+pymongo-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+sqlalchemy" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+sqlalchemy-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+starlette" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+starlette-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+tornado" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+tornado-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="python3-sentry-sdk" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+aiohttp" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+aiohttp-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+bottle" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+bottle-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+celery" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+celery-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+django" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+django-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+fastapi" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+fastapi-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+flask" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+flask-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+httpx" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+httpx-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+pymongo" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+pymongo-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+sqlalchemy" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+sqlalchemy-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+starlette" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+starlette-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+tornado" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+tornado-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0004</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость atop </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в atop</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-atop-cve-2025-31160-8.0/</description>
               <solution>Установить обновление для пакета(ов) atop
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-atop-cve-2025-31160-8.0/" type="self" id="ROS-20260122-80-0004" title="ROS-20260122-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31160" type="cve" id="CVE-2025-31160" title="CVE-2025-31160" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="atop" epoch="0" version="2.12.1" release="1.red80" arch="x86_64" src="atop-2.12.1-1.red80.src.rpm">
					<filename>atop-0:2.12.1-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="atop" epoch="0" version="2.12.1" release="1.red80" arch="aarch64" src="atop-2.12.1-1.red80.src.rpm">
					<filename>atop-0:2.12.1-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0005</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость python-sentry-sdk </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в python-sentry-sdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-sentry-sdk-cve-2025-53099-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-sentry-sdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-sentry-sdk-cve-2025-53099-8.0/" type="self" id="ROS-20260122-80-0005" title="ROS-20260122-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53099" type="cve" id="CVE-2025-53099" title="CVE-2025-53099" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="python3-sentry-sdk" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+aiohttp" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+aiohttp-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+bottle" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+bottle-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+celery" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+celery-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+django" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+django-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+fastapi" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+fastapi-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+flask" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+flask-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+httpx" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+httpx-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+pymongo" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+pymongo-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+sqlalchemy" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+sqlalchemy-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+starlette" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+starlette-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+tornado" epoch="0" version="2.47.0" release="1.red80" arch="x86_64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+tornado-0:2.47.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="python3-sentry-sdk" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+aiohttp" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+aiohttp-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+bottle" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+bottle-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+celery" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+celery-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+django" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+django-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+fastapi" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+fastapi-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+flask" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+flask-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+httpx" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+httpx-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+pymongo" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+pymongo-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+sqlalchemy" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+sqlalchemy-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+starlette" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+starlette-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sentry-sdk+tornado" epoch="0" version="2.47.0" release="1.red80" arch="aarch64" src="python-sentry-sdk-2.47.0-1.red80.src.rpm">
					<filename>python3-sentry-sdk+tornado-0:2.47.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0006</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость python-authlib </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-authlib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-authlib-cve-2025-61920-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-authlib
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-authlib-cve-2025-61920-8.0/" type="self" id="ROS-20260122-80-0006" title="ROS-20260122-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61920" type="cve" id="CVE-2025-61920" title="CVE-2025-61920" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python3-authlib" epoch="0" version="1.6.5" release="1.red80" arch="noarch" src="python-authlib-1.6.5-1.red80.src.rpm">
					<filename>python3-authlib-0:1.6.5-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0007</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость strongswan </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в strongswan</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-strongswan-cve-2025-62291-8.0/</description>
               <solution>Установить обновление для пакета(ов) strongswan
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-strongswan-cve-2025-62291-8.0/" type="self" id="ROS-20260122-80-0007" title="ROS-20260122-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62291" type="cve" id="CVE-2025-62291" title="CVE-2025-62291" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="strongswan" epoch="0" version="5.9.10" release="4.red80" arch="x86_64" src="strongswan-5.9.10-4.red80.src.rpm">
					<filename>strongswan-0:5.9.10-4.red80.x86_64.rpm</filename>
				</package>
				<package name="strongswan-charon-nm" epoch="0" version="5.9.10" release="4.red80" arch="x86_64" src="strongswan-5.9.10-4.red80.src.rpm">
					<filename>strongswan-charon-nm-0:5.9.10-4.red80.x86_64.rpm</filename>
				</package>
				<package name="strongswan-libipsec" epoch="0" version="5.9.10" release="4.red80" arch="x86_64" src="strongswan-5.9.10-4.red80.src.rpm">
					<filename>strongswan-libipsec-0:5.9.10-4.red80.x86_64.rpm</filename>
				</package>
				<package name="strongswan-sqlite" epoch="0" version="5.9.10" release="4.red80" arch="x86_64" src="strongswan-5.9.10-4.red80.src.rpm">
					<filename>strongswan-sqlite-0:5.9.10-4.red80.x86_64.rpm</filename>
				</package>
				<package name="strongswan-tnc-imcvs" epoch="0" version="5.9.10" release="4.red80" arch="x86_64" src="strongswan-5.9.10-4.red80.src.rpm">
					<filename>strongswan-tnc-imcvs-0:5.9.10-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="strongswan" epoch="0" version="5.9.10" release="4.red80" arch="aarch64" src="strongswan-5.9.10-4.red80.src.rpm">
					<filename>strongswan-0:5.9.10-4.red80.aarch64.rpm</filename>
				</package>
				<package name="strongswan-charon-nm" epoch="0" version="5.9.10" release="4.red80" arch="aarch64" src="strongswan-5.9.10-4.red80.src.rpm">
					<filename>strongswan-charon-nm-0:5.9.10-4.red80.aarch64.rpm</filename>
				</package>
				<package name="strongswan-libipsec" epoch="0" version="5.9.10" release="4.red80" arch="aarch64" src="strongswan-5.9.10-4.red80.src.rpm">
					<filename>strongswan-libipsec-0:5.9.10-4.red80.aarch64.rpm</filename>
				</package>
				<package name="strongswan-sqlite" epoch="0" version="5.9.10" release="4.red80" arch="aarch64" src="strongswan-5.9.10-4.red80.src.rpm">
					<filename>strongswan-sqlite-0:5.9.10-4.red80.aarch64.rpm</filename>
				</package>
				<package name="strongswan-tnc-imcvs" epoch="0" version="5.9.10" release="4.red80" arch="aarch64" src="strongswan-5.9.10-4.red80.src.rpm">
					<filename>strongswan-tnc-imcvs-0:5.9.10-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="perl-vici" epoch="0" version="5.9.10" release="4.red80" arch="noarch" src="strongswan-5.9.10-4.red80.src.rpm">
					<filename>perl-vici-0:5.9.10-4.red80.noarch.rpm</filename>
				</package>
				<package name="python3-vici" epoch="0" version="5.9.10" release="4.red80" arch="noarch" src="strongswan-5.9.10-4.red80.src.rpm">
					<filename>python3-vici-0:5.9.10-4.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0008</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость ceph </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ceph</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-ceph-cve-2024-47866-8.0/</description>
               <solution>Установить обновление для пакета(ов) ceph
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-ceph-cve-2024-47866-8.0/" type="self" id="ROS-20260122-80-0008" title="ROS-20260122-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47866" type="cve" id="CVE-2024-47866" title="CVE-2024-47866" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="ceph" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="ceph-base" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-base-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="ceph-common" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-common-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="ceph-exporter" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-exporter-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="ceph-fuse" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-fuse-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="ceph-immutable-object-cache" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-immutable-object-cache-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="ceph-mds" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-mds-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="ceph-mgr" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-mgr-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="ceph-mon" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-mon-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="ceph-osd" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-osd-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="ceph-radosgw" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-radosgw-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="ceph-selinux" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-selinux-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="ceph-test" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-test-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="cephfs-mirror" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>cephfs-mirror-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="cephfs-shell" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>cephfs-shell-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="libcephfs-devel" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>libcephfs-devel-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="libcephfs2" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>libcephfs2-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="libcephsqlite" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>libcephsqlite-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="libcephsqlite-devel" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>libcephsqlite-devel-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="librados-devel" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>librados-devel-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="librados2" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>librados2-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="libradospp-devel" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>libradospp-devel-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="libradosstriper-devel" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>libradosstriper-devel-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="libradosstriper1" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>libradosstriper1-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="librbd-devel" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>librbd-devel-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="librbd1" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>librbd1-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="librgw-devel" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>librgw-devel-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="librgw2" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>librgw2-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-ceph-argparse" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>python3-ceph-argparse-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-ceph-common" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>python3-ceph-common-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-cephfs" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>python3-cephfs-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-rados" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>python3-rados-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-rbd" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>python3-rbd-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-rgw" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>python3-rgw-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="rados-objclass-devel" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>rados-objclass-devel-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="rbd-fuse" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>rbd-fuse-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="rbd-mirror" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>rbd-mirror-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="rbd-nbd" epoch="2" version="19.2.2" release="5.red80" arch="x86_64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>rbd-nbd-2:19.2.2-5.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="ceph" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="ceph-base" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-base-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="ceph-common" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-common-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="ceph-exporter" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-exporter-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="ceph-fuse" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-fuse-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="ceph-immutable-object-cache" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-immutable-object-cache-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="ceph-mds" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-mds-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="ceph-mgr" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-mgr-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="ceph-mon" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-mon-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="ceph-osd" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-osd-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="ceph-radosgw" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-radosgw-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="ceph-selinux" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-selinux-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="ceph-test" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-test-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="cephfs-mirror" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>cephfs-mirror-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="cephfs-shell" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>cephfs-shell-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="libcephfs-devel" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>libcephfs-devel-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="libcephfs2" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>libcephfs2-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="libcephsqlite" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>libcephsqlite-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="libcephsqlite-devel" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>libcephsqlite-devel-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="librados-devel" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>librados-devel-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="librados2" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>librados2-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="libradospp-devel" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>libradospp-devel-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="libradosstriper-devel" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>libradosstriper-devel-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="libradosstriper1" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>libradosstriper1-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="librbd-devel" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>librbd-devel-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="librbd1" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>librbd1-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="librgw-devel" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>librgw-devel-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="librgw2" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>librgw2-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-ceph-argparse" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>python3-ceph-argparse-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-ceph-common" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>python3-ceph-common-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-cephfs" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>python3-cephfs-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-rados" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>python3-rados-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-rbd" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>python3-rbd-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-rgw" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>python3-rgw-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="rados-objclass-devel" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>rados-objclass-devel-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="rbd-fuse" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>rbd-fuse-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="rbd-mirror" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>rbd-mirror-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
				<package name="rbd-nbd" epoch="2" version="19.2.2" release="5.red80" arch="aarch64" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>rbd-nbd-2:19.2.2-5.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="ceph-grafana-dashboards" epoch="2" version="19.2.2" release="5.red80" arch="noarch" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-grafana-dashboards-2:19.2.2-5.red80.noarch.rpm</filename>
				</package>
				<package name="ceph-mgr-cephadm" epoch="2" version="19.2.2" release="5.red80" arch="noarch" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-mgr-cephadm-2:19.2.2-5.red80.noarch.rpm</filename>
				</package>
				<package name="ceph-mgr-dashboard" epoch="2" version="19.2.2" release="5.red80" arch="noarch" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-mgr-dashboard-2:19.2.2-5.red80.noarch.rpm</filename>
				</package>
				<package name="ceph-mgr-diskprediction-local" epoch="2" version="19.2.2" release="5.red80" arch="noarch" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-mgr-diskprediction-local-2:19.2.2-5.red80.noarch.rpm</filename>
				</package>
				<package name="ceph-mgr-k8sevents" epoch="2" version="19.2.2" release="5.red80" arch="noarch" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-mgr-k8sevents-2:19.2.2-5.red80.noarch.rpm</filename>
				</package>
				<package name="ceph-mgr-modules-core" epoch="2" version="19.2.2" release="5.red80" arch="noarch" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-mgr-modules-core-2:19.2.2-5.red80.noarch.rpm</filename>
				</package>
				<package name="ceph-mgr-rook" epoch="2" version="19.2.2" release="5.red80" arch="noarch" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-mgr-rook-2:19.2.2-5.red80.noarch.rpm</filename>
				</package>
				<package name="ceph-mib" epoch="2" version="19.2.2" release="5.red80" arch="noarch" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-mib-2:19.2.2-5.red80.noarch.rpm</filename>
				</package>
				<package name="ceph-node-proxy" epoch="2" version="19.2.2" release="5.red80" arch="noarch" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-node-proxy-2:19.2.2-5.red80.noarch.rpm</filename>
				</package>
				<package name="ceph-prometheus-alerts" epoch="2" version="19.2.2" release="5.red80" arch="noarch" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-prometheus-alerts-2:19.2.2-5.red80.noarch.rpm</filename>
				</package>
				<package name="ceph-resource-agents" epoch="2" version="19.2.2" release="5.red80" arch="noarch" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-resource-agents-2:19.2.2-5.red80.noarch.rpm</filename>
				</package>
				<package name="ceph-volume" epoch="2" version="19.2.2" release="5.red80" arch="noarch" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>ceph-volume-2:19.2.2-5.red80.noarch.rpm</filename>
				</package>
				<package name="cephadm" epoch="2" version="19.2.2" release="5.red80" arch="noarch" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>cephadm-2:19.2.2-5.red80.noarch.rpm</filename>
				</package>
				<package name="cephfs-top" epoch="2" version="19.2.2" release="5.red80" arch="noarch" src="ceph-19.2.2-5.red80.src.rpm">
					<filename>cephfs-top-2:19.2.2-5.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0009</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость python-django5 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-django5</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-django5-cve-2025-64460-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-django5
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-django5-cve-2025-64460-8.0/" type="self" id="ROS-20260122-80-0009" title="ROS-20260122-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64460" type="cve" id="CVE-2025-64460" title="CVE-2025-64460" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python3-django5" epoch="0" version="5.2.9" release="1.red80" arch="noarch" src="python-django5-5.2.9-1.red80.src.rpm">
					<filename>python3-django5-0:5.2.9-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-django5-bash-completion" epoch="0" version="5.2.9" release="1.red80" arch="noarch" src="python-django5-5.2.9-1.red80.src.rpm">
					<filename>python3-django5-bash-completion-0:5.2.9-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-django5-doc" epoch="0" version="5.2.9" release="1.red80" arch="noarch" src="python-django5-5.2.9-1.red80.src.rpm">
					<filename>python3-django5-doc-0:5.2.9-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0010</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13630-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13630-8.0/" type="self" id="ROS-20260122-80-0010" title="ROS-20260122-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13630" type="cve" id="CVE-2025-13630" title="CVE-2025-13630" />
			<reference href="https://bdu.fstec.ru/vul/2025-15242" type="self" id="BDU:2025-15242" title="BDU:2025-15242" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0011</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13631-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13631-8.0/" type="self" id="ROS-20260122-80-0011" title="ROS-20260122-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13631" type="cve" id="CVE-2025-13631" title="CVE-2025-13631" />
			<reference href="https://bdu.fstec.ru/vul/2025-15243" type="self" id="BDU:2025-15243" title="BDU:2025-15243" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0012</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13632-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13632-8.0/" type="self" id="ROS-20260122-80-0012" title="ROS-20260122-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13632" type="cve" id="CVE-2025-13632" title="CVE-2025-13632" />
			<reference href="https://bdu.fstec.ru/vul/2025-15241" type="self" id="BDU:2025-15241" title="BDU:2025-15241" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0013</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13633-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13633-8.0/" type="self" id="ROS-20260122-80-0013" title="ROS-20260122-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13633" type="cve" id="CVE-2025-13633" title="CVE-2025-13633" />
			<reference href="https://bdu.fstec.ru/vul/2025-15244" type="self" id="BDU:2025-15244" title="BDU:2025-15244" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0014</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13634-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13634-8.0/" type="self" id="ROS-20260122-80-0014" title="ROS-20260122-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13634" type="cve" id="CVE-2025-13634" title="CVE-2025-13634" />
			<reference href="https://bdu.fstec.ru/vul/2025-15245" type="self" id="BDU:2025-15245" title="BDU:2025-15245" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0015</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13635-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13635-8.0/" type="self" id="ROS-20260122-80-0015" title="ROS-20260122-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13635" type="cve" id="CVE-2025-13635" title="CVE-2025-13635" />
			<reference href="https://bdu.fstec.ru/vul/2025-15246" type="self" id="BDU:2025-15246" title="BDU:2025-15246" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0016</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13636-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13636-8.0/" type="self" id="ROS-20260122-80-0016" title="ROS-20260122-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13636" type="cve" id="CVE-2025-13636" title="CVE-2025-13636" />
			<reference href="https://bdu.fstec.ru/vul/2025-15247" type="self" id="BDU:2025-15247" title="BDU:2025-15247" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0017</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13637-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13637-8.0/" type="self" id="ROS-20260122-80-0017" title="ROS-20260122-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13637" type="cve" id="CVE-2025-13637" title="CVE-2025-13637" />
			<reference href="https://bdu.fstec.ru/vul/2025-15249" type="self" id="BDU:2025-15249" title="BDU:2025-15249" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0018</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13638-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13638-8.0/" type="self" id="ROS-20260122-80-0018" title="ROS-20260122-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13638" type="cve" id="CVE-2025-13638" title="CVE-2025-13638" />
			<reference href="https://bdu.fstec.ru/vul/2025-15250" type="self" id="BDU:2025-15250" title="BDU:2025-15250" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0019</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13639-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13639-8.0/" type="self" id="ROS-20260122-80-0019" title="ROS-20260122-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13639" type="cve" id="CVE-2025-13639" title="CVE-2025-13639" />
			<reference href="https://bdu.fstec.ru/vul/2025-15251" type="self" id="BDU:2025-15251" title="BDU:2025-15251" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0020</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13720-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13720-8.0/" type="self" id="ROS-20260122-80-0020" title="ROS-20260122-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13720" type="cve" id="CVE-2025-13720" title="CVE-2025-13720" />
			<reference href="https://bdu.fstec.ru/vul/2025-15254" type="self" id="BDU:2025-15254" title="BDU:2025-15254" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0021</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13721-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13721-8.0/" type="self" id="ROS-20260122-80-0021" title="ROS-20260122-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13721" type="cve" id="CVE-2025-13721" title="CVE-2025-13721" />
			<reference href="https://bdu.fstec.ru/vul/2025-15255" type="self" id="BDU:2025-15255" title="BDU:2025-15255" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0022</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13640-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-13640-8.0/" type="self" id="ROS-20260122-80-0022" title="ROS-20260122-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13640" type="cve" id="CVE-2025-13640" title="CVE-2025-13640" />
			<reference href="https://bdu.fstec.ru/vul/2025-15253" type="self" id="BDU:2025-15253" title="BDU:2025-15253" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0023</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость httpd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-httpd-cve-2025-55753-8.0/</description>
               <solution>Установить обновление для пакета(ов) httpd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-httpd-cve-2025-55753-8.0/" type="self" id="ROS-20260122-80-0023" title="ROS-20260122-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55753" type="cve" id="CVE-2025-55753" title="CVE-2025-55753" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="httpd" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="httpd-core" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-core-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="httpd-devel" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-devel-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="httpd-tools" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-tools-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_ldap" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ldap-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_lua" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_lua-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_proxy_html" epoch="1" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_proxy_html-1:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_session" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_session-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_ssl" epoch="1" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ssl-1:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="httpd" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="httpd-core" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-core-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="httpd-devel" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-devel-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="httpd-tools" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-tools-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_ldap" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ldap-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_lua" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_lua-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_proxy_html" epoch="1" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_proxy_html-1:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_session" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_session-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_ssl" epoch="1" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ssl-1:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="httpd-filesystem" epoch="0" version="2.4.66" release="7.red80" arch="noarch" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-filesystem-0:2.4.66-7.red80.noarch.rpm</filename>
				</package>
				<package name="httpd-manual" epoch="0" version="2.4.66" release="7.red80" arch="noarch" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-manual-0:2.4.66-7.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0024</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость httpd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-httpd-cve-2025-58098-8.0/</description>
               <solution>Установить обновление для пакета(ов) httpd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-httpd-cve-2025-58098-8.0/" type="self" id="ROS-20260122-80-0024" title="ROS-20260122-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58098" type="cve" id="CVE-2025-58098" title="CVE-2025-58098" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="httpd" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="httpd-core" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-core-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="httpd-devel" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-devel-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="httpd-tools" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-tools-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_ldap" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ldap-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_lua" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_lua-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_proxy_html" epoch="1" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_proxy_html-1:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_session" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_session-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_ssl" epoch="1" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ssl-1:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="httpd" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="httpd-core" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-core-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="httpd-devel" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-devel-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="httpd-tools" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-tools-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_ldap" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ldap-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_lua" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_lua-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_proxy_html" epoch="1" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_proxy_html-1:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_session" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_session-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_ssl" epoch="1" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ssl-1:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="httpd-filesystem" epoch="0" version="2.4.66" release="7.red80" arch="noarch" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-filesystem-0:2.4.66-7.red80.noarch.rpm</filename>
				</package>
				<package name="httpd-manual" epoch="0" version="2.4.66" release="7.red80" arch="noarch" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-manual-0:2.4.66-7.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0025</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость httpd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-httpd-cve-2025-59775-8.0/</description>
               <solution>Установить обновление для пакета(ов) httpd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-httpd-cve-2025-59775-8.0/" type="self" id="ROS-20260122-80-0025" title="ROS-20260122-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59775" type="cve" id="CVE-2025-59775" title="CVE-2025-59775" />
			<reference href="https://bdu.fstec.ru/vul/2025-15293" type="self" id="BDU:2025-15293" title="BDU:2025-15293" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="httpd" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="httpd-core" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-core-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="httpd-devel" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-devel-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="httpd-tools" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-tools-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_ldap" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ldap-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_lua" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_lua-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_proxy_html" epoch="1" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_proxy_html-1:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_session" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_session-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_ssl" epoch="1" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ssl-1:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="httpd" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="httpd-core" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-core-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="httpd-devel" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-devel-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="httpd-tools" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-tools-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_ldap" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ldap-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_lua" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_lua-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_proxy_html" epoch="1" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_proxy_html-1:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_session" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_session-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_ssl" epoch="1" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ssl-1:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="httpd-filesystem" epoch="0" version="2.4.66" release="7.red80" arch="noarch" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-filesystem-0:2.4.66-7.red80.noarch.rpm</filename>
				</package>
				<package name="httpd-manual" epoch="0" version="2.4.66" release="7.red80" arch="noarch" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-manual-0:2.4.66-7.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0026</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость httpd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-httpd-cve-2025-65082-8.0/</description>
               <solution>Установить обновление для пакета(ов) httpd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-httpd-cve-2025-65082-8.0/" type="self" id="ROS-20260122-80-0026" title="ROS-20260122-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65082" type="cve" id="CVE-2025-65082" title="CVE-2025-65082" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="httpd" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="httpd-core" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-core-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="httpd-devel" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-devel-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="httpd-tools" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-tools-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_ldap" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ldap-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_lua" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_lua-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_proxy_html" epoch="1" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_proxy_html-1:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_session" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_session-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_ssl" epoch="1" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ssl-1:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="httpd" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="httpd-core" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-core-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="httpd-devel" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-devel-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="httpd-tools" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-tools-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_ldap" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ldap-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_lua" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_lua-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_proxy_html" epoch="1" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_proxy_html-1:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_session" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_session-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_ssl" epoch="1" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ssl-1:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="httpd-filesystem" epoch="0" version="2.4.66" release="7.red80" arch="noarch" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-filesystem-0:2.4.66-7.red80.noarch.rpm</filename>
				</package>
				<package name="httpd-manual" epoch="0" version="2.4.66" release="7.red80" arch="noarch" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-manual-0:2.4.66-7.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0027</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость httpd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в httpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-httpd-cve-2025-66200-8.0/</description>
               <solution>Установить обновление для пакета(ов) httpd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-httpd-cve-2025-66200-8.0/" type="self" id="ROS-20260122-80-0027" title="ROS-20260122-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66200" type="cve" id="CVE-2025-66200" title="CVE-2025-66200" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="httpd" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="httpd-core" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-core-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="httpd-devel" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-devel-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="httpd-tools" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-tools-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_ldap" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ldap-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_lua" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_lua-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_proxy_html" epoch="1" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_proxy_html-1:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_session" epoch="0" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_session-0:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
				<package name="mod_ssl" epoch="1" version="2.4.66" release="7.red80" arch="x86_64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ssl-1:2.4.66-7.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="httpd" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="httpd-core" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-core-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="httpd-devel" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-devel-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="httpd-tools" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-tools-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_ldap" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ldap-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_lua" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_lua-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_proxy_html" epoch="1" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_proxy_html-1:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_session" epoch="0" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_session-0:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
				<package name="mod_ssl" epoch="1" version="2.4.66" release="7.red80" arch="aarch64" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>mod_ssl-1:2.4.66-7.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="httpd-filesystem" epoch="0" version="2.4.66" release="7.red80" arch="noarch" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-filesystem-0:2.4.66-7.red80.noarch.rpm</filename>
				</package>
				<package name="httpd-manual" epoch="0" version="2.4.66" release="7.red80" arch="noarch" src="httpd-2.4.66-7.red80.src.rpm">
					<filename>httpd-manual-0:2.4.66-7.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0028</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость brotli </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в brotli</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-brotli-cve-2025-66418-8.0/</description>
               <solution>Установить обновление для пакета(ов) brotli
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-brotli-cve-2025-66418-8.0/" type="self" id="ROS-20260122-80-0028" title="ROS-20260122-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66418" type="cve" id="CVE-2025-66418" title="CVE-2025-66418" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="brotli" epoch="0" version="1.2.0" release="1.red80" arch="x86_64" src="brotli-1.2.0-1.red80.src.rpm">
					<filename>brotli-0:1.2.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="brotli-devel" epoch="0" version="1.2.0" release="1.red80" arch="x86_64" src="brotli-1.2.0-1.red80.src.rpm">
					<filename>brotli-devel-0:1.2.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libbrotli" epoch="0" version="1.2.0" release="1.red80" arch="x86_64" src="brotli-1.2.0-1.red80.src.rpm">
					<filename>libbrotli-0:1.2.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-brotli" epoch="0" version="1.2.0" release="1.red80" arch="x86_64" src="brotli-1.2.0-1.red80.src.rpm">
					<filename>python3-brotli-0:1.2.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="brotli" epoch="0" version="1.2.0" release="1.red80" arch="aarch64" src="brotli-1.2.0-1.red80.src.rpm">
					<filename>brotli-0:1.2.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="brotli-devel" epoch="0" version="1.2.0" release="1.red80" arch="aarch64" src="brotli-1.2.0-1.red80.src.rpm">
					<filename>brotli-devel-0:1.2.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libbrotli" epoch="0" version="1.2.0" release="1.red80" arch="aarch64" src="brotli-1.2.0-1.red80.src.rpm">
					<filename>libbrotli-0:1.2.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-brotli" epoch="0" version="1.2.0" release="1.red80" arch="aarch64" src="brotli-1.2.0-1.red80.src.rpm">
					<filename>python3-brotli-0:1.2.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0029</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость brotli </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в brotli</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-brotli-cve-2025-66471-8.0/</description>
               <solution>Установить обновление для пакета(ов) brotli
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-brotli-cve-2025-66471-8.0/" type="self" id="ROS-20260122-80-0029" title="ROS-20260122-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66471" type="cve" id="CVE-2025-66471" title="CVE-2025-66471" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="brotli" epoch="0" version="1.2.0" release="1.red80" arch="x86_64" src="brotli-1.2.0-1.red80.src.rpm">
					<filename>brotli-0:1.2.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="brotli-devel" epoch="0" version="1.2.0" release="1.red80" arch="x86_64" src="brotli-1.2.0-1.red80.src.rpm">
					<filename>brotli-devel-0:1.2.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libbrotli" epoch="0" version="1.2.0" release="1.red80" arch="x86_64" src="brotli-1.2.0-1.red80.src.rpm">
					<filename>libbrotli-0:1.2.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-brotli" epoch="0" version="1.2.0" release="1.red80" arch="x86_64" src="brotli-1.2.0-1.red80.src.rpm">
					<filename>python3-brotli-0:1.2.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="brotli" epoch="0" version="1.2.0" release="1.red80" arch="aarch64" src="brotli-1.2.0-1.red80.src.rpm">
					<filename>brotli-0:1.2.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="brotli-devel" epoch="0" version="1.2.0" release="1.red80" arch="aarch64" src="brotli-1.2.0-1.red80.src.rpm">
					<filename>brotli-devel-0:1.2.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libbrotli" epoch="0" version="1.2.0" release="1.red80" arch="aarch64" src="brotli-1.2.0-1.red80.src.rpm">
					<filename>libbrotli-0:1.2.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-brotli" epoch="0" version="1.2.0" release="1.red80" arch="aarch64" src="brotli-1.2.0-1.red80.src.rpm">
					<filename>python3-brotli-0:1.2.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0030</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-imagemagick-cve-2025-66628-8.0/</description>
               <solution>Установить обновление для пакета(ов) ImageMagick
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-imagemagick-cve-2025-66628-8.0/" type="self" id="ROS-20260122-80-0030" title="ROS-20260122-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66628" type="cve" id="CVE-2025-66628" title="CVE-2025-66628" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="ImageMagick" epoch="1" version="7.1.2.10" release="1.red80" arch="x86_64" src="ImageMagick-7.1.2.10-1.red80.src.rpm">
					<filename>ImageMagick-1:7.1.2.10-1.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-c++" epoch="1" version="7.1.2.10" release="1.red80" arch="x86_64" src="ImageMagick-7.1.2.10-1.red80.src.rpm">
					<filename>ImageMagick-c++-1:7.1.2.10-1.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-c++-devel" epoch="1" version="7.1.2.10" release="1.red80" arch="x86_64" src="ImageMagick-7.1.2.10-1.red80.src.rpm">
					<filename>ImageMagick-c++-devel-1:7.1.2.10-1.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-devel" epoch="1" version="7.1.2.10" release="1.red80" arch="x86_64" src="ImageMagick-7.1.2.10-1.red80.src.rpm">
					<filename>ImageMagick-devel-1:7.1.2.10-1.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-djvu" epoch="1" version="7.1.2.10" release="1.red80" arch="x86_64" src="ImageMagick-7.1.2.10-1.red80.src.rpm">
					<filename>ImageMagick-djvu-1:7.1.2.10-1.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-doc" epoch="1" version="7.1.2.10" release="1.red80" arch="x86_64" src="ImageMagick-7.1.2.10-1.red80.src.rpm">
					<filename>ImageMagick-doc-1:7.1.2.10-1.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-heic" epoch="1" version="7.1.2.10" release="1.red80" arch="x86_64" src="ImageMagick-7.1.2.10-1.red80.src.rpm">
					<filename>ImageMagick-heic-1:7.1.2.10-1.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-libs" epoch="1" version="7.1.2.10" release="1.red80" arch="x86_64" src="ImageMagick-7.1.2.10-1.red80.src.rpm">
					<filename>ImageMagick-libs-1:7.1.2.10-1.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-perl" epoch="1" version="7.1.2.10" release="1.red80" arch="x86_64" src="ImageMagick-7.1.2.10-1.red80.src.rpm">
					<filename>ImageMagick-perl-1:7.1.2.10-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="ImageMagick" epoch="1" version="7.1.2.10" release="1.red80" arch="aarch64" src="ImageMagick-7.1.2.10-1.red80.src.rpm">
					<filename>ImageMagick-1:7.1.2.10-1.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-c++" epoch="1" version="7.1.2.10" release="1.red80" arch="aarch64" src="ImageMagick-7.1.2.10-1.red80.src.rpm">
					<filename>ImageMagick-c++-1:7.1.2.10-1.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-c++-devel" epoch="1" version="7.1.2.10" release="1.red80" arch="aarch64" src="ImageMagick-7.1.2.10-1.red80.src.rpm">
					<filename>ImageMagick-c++-devel-1:7.1.2.10-1.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-devel" epoch="1" version="7.1.2.10" release="1.red80" arch="aarch64" src="ImageMagick-7.1.2.10-1.red80.src.rpm">
					<filename>ImageMagick-devel-1:7.1.2.10-1.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-djvu" epoch="1" version="7.1.2.10" release="1.red80" arch="aarch64" src="ImageMagick-7.1.2.10-1.red80.src.rpm">
					<filename>ImageMagick-djvu-1:7.1.2.10-1.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-doc" epoch="1" version="7.1.2.10" release="1.red80" arch="aarch64" src="ImageMagick-7.1.2.10-1.red80.src.rpm">
					<filename>ImageMagick-doc-1:7.1.2.10-1.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-heic" epoch="1" version="7.1.2.10" release="1.red80" arch="aarch64" src="ImageMagick-7.1.2.10-1.red80.src.rpm">
					<filename>ImageMagick-heic-1:7.1.2.10-1.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-libs" epoch="1" version="7.1.2.10" release="1.red80" arch="aarch64" src="ImageMagick-7.1.2.10-1.red80.src.rpm">
					<filename>ImageMagick-libs-1:7.1.2.10-1.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-perl" epoch="1" version="7.1.2.10" release="1.red80" arch="aarch64" src="ImageMagick-7.1.2.10-1.red80.src.rpm">
					<filename>ImageMagick-perl-1:7.1.2.10-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0031</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-14372-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-14372-8.0/" type="self" id="ROS-20260122-80-0031" title="ROS-20260122-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14372" type="cve" id="CVE-2025-14372" title="CVE-2025-14372" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="x86_64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.109" release="1.red80" arch="aarch64" src="chromium-143.0.7499.109-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0032</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость jetty </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в jetty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jetty-cve-2024-13009-8.0/</description>
               <solution>Установить обновление для пакета(ов) jetty
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jetty-cve-2024-13009-8.0/" type="self" id="ROS-20260122-80-0032" title="ROS-20260122-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13009" type="cve" id="CVE-2024-13009" title="CVE-2024-13009" />
			<reference href="https://bdu.fstec.ru/vul/2025-08601" type="self" id="BDU:2025-08601" title="BDU:2025-08601" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="jetty" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-client" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-client-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-continuation" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-continuation-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-http" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-http-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-io" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-io-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-jaas" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-jaas-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-javadoc" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-javadoc-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-jmx" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-jmx-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-security" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-security-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-server" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-server-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-servlet" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-servlet-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-util" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-util-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-util-ajax" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-util-ajax-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-webapp" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-webapp-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-xml" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-xml-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0033</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость netty </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в netty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-netty-cve-2025-58057-8.0/</description>
               <solution>Установить обновление для пакета(ов) netty
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-netty-cve-2025-58057-8.0/" type="self" id="ROS-20260122-80-0033" title="ROS-20260122-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58057" type="cve" id="CVE-2025-58057" title="CVE-2025-58057" />
			<reference href="https://bdu.fstec.ru/vul/2025-12594" type="self" id="BDU:2025-12594" title="BDU:2025-12594" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="netty" epoch="0" version="4.1.128" release="1.red80" arch="x86_64" src="netty-4.1.128-1.red80.src.rpm">
					<filename>netty-0:4.1.128-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="netty-javadoc" epoch="0" version="4.1.128" release="1.red80" arch="noarch" src="netty-4.1.128-1.red80.src.rpm">
					<filename>netty-javadoc-0:4.1.128-1.red80.noarch.rpm</filename>
				</package>
				<package name="netty-poms" epoch="0" version="4.1.128" release="1.red80" arch="noarch" src="netty-4.1.128-1.red80.src.rpm">
					<filename>netty-poms-0:4.1.128-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0034</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость apache-commons-beanutils </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в apache-commons-beanutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-apache-commons-beanutils-cve-2025-48734-8.0/</description>
               <solution>Установить обновление для пакета(ов) apache-commons-beanutils
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-apache-commons-beanutils-cve-2025-48734-8.0/" type="self" id="ROS-20260122-80-0034" title="ROS-20260122-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48734" type="cve" id="CVE-2025-48734" title="CVE-2025-48734" />
			<reference href="https://bdu.fstec.ru/vul/2025-06231" type="self" id="BDU:2025-06231" title="BDU:2025-06231" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="apache-commons-beanutils" epoch="0" version="1.11.0" release="1.red80" arch="noarch" src="apache-commons-beanutils-1.11.0-1.red80.src.rpm">
					<filename>apache-commons-beanutils-0:1.11.0-1.red80.noarch.rpm</filename>
				</package>
				<package name="apache-commons-beanutils-javadoc" epoch="0" version="1.11.0" release="1.red80" arch="noarch" src="apache-commons-beanutils-1.11.0-1.red80.src.rpm">
					<filename>apache-commons-beanutils-javadoc-0:1.11.0-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260122-80-0035</id>
		<issued date="2026-01-22" />
		<updated date="2026-01-22" />
		<title>Уязвимость apache-kafka </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в apache-kafka</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-apache-kafka-cve-2024-29371-8.0/</description>
               <solution>Установить обновление для пакета(ов) apache-kafka
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-apache-kafka-cve-2024-29371-8.0/" type="self" id="ROS-20260122-80-0035" title="ROS-20260122-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29371" type="cve" id="CVE-2024-29371" title="CVE-2024-29371" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="apache-kafka" epoch="0" version="4.1.1" release="3.red80" arch="x86_64" src="apache-kafka-4.1.1-3.red80.src.rpm">
					<filename>apache-kafka-0:4.1.1-3.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="apache-kafka" epoch="0" version="4.1.1" release="3.red80" arch="aarch64" src="apache-kafka-4.1.1-3.red80.src.rpm">
					<filename>apache-kafka-0:4.1.1-3.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0001</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22080-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22080-8.0/" type="self" id="ROS-20260126-80-0001" title="ROS-20260126-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22080" type="cve" id="CVE-2025-22080" title="CVE-2025-22080" />
			<reference href="https://bdu.fstec.ru/vul/2025-11909" type="self" id="BDU:2025-11909" title="BDU:2025-11909" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0002</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22081-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22081-8.0/" type="self" id="ROS-20260126-80-0002" title="ROS-20260126-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22081" type="cve" id="CVE-2025-22081" title="CVE-2025-22081" />
			<reference href="https://bdu.fstec.ru/vul/2025-11908" type="self" id="BDU:2025-11908" title="BDU:2025-11908" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0003</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22082-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22082-8.0/" type="self" id="ROS-20260126-80-0003" title="ROS-20260126-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22082" type="cve" id="CVE-2025-22082" title="CVE-2025-22082" />
			<reference href="https://bdu.fstec.ru/vul/2025-12172" type="self" id="BDU:2025-12172" title="BDU:2025-12172" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0004</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22084-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22084-8.0/" type="self" id="ROS-20260126-80-0004" title="ROS-20260126-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22084" type="cve" id="CVE-2025-22084" title="CVE-2025-22084" />
			<reference href="https://bdu.fstec.ru/vul/2025-12171" type="self" id="BDU:2025-12171" title="BDU:2025-12171" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0005</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22085-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22085-8.0/" type="self" id="ROS-20260126-80-0005" title="ROS-20260126-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22085" type="cve" id="CVE-2025-22085" title="CVE-2025-22085" />
			<reference href="https://bdu.fstec.ru/vul/2025-12084" type="self" id="BDU:2025-12084" title="BDU:2025-12084" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0006</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22086-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22086-8.0/" type="self" id="ROS-20260126-80-0006" title="ROS-20260126-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22086" type="cve" id="CVE-2025-22086" title="CVE-2025-22086" />
			<reference href="https://bdu.fstec.ru/vul/2025-12170" type="self" id="BDU:2025-12170" title="BDU:2025-12170" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0007</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22087-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22087-8.0/" type="self" id="ROS-20260126-80-0007" title="ROS-20260126-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22087" type="cve" id="CVE-2025-22087" title="CVE-2025-22087" />
			<reference href="https://bdu.fstec.ru/vul/2025-11938" type="self" id="BDU:2025-11938" title="BDU:2025-11938" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0008</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22088-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22088-8.0/" type="self" id="ROS-20260126-80-0008" title="ROS-20260126-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22088" type="cve" id="CVE-2025-22088" title="CVE-2025-22088" />
			<reference href="https://bdu.fstec.ru/vul/2025-12093" type="self" id="BDU:2025-12093" title="BDU:2025-12093" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0009</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22089-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22089-8.0/" type="self" id="ROS-20260126-80-0009" title="ROS-20260126-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22089" type="cve" id="CVE-2025-22089" title="CVE-2025-22089" />
			<reference href="https://bdu.fstec.ru/vul/2025-12169" type="self" id="BDU:2025-12169" title="BDU:2025-12169" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0010</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22091-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22091-8.0/" type="self" id="ROS-20260126-80-0010" title="ROS-20260126-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22091" type="cve" id="CVE-2025-22091" title="CVE-2025-22091" />
			<reference href="https://bdu.fstec.ru/vul/2025-11818" type="self" id="BDU:2025-11818" title="BDU:2025-11818" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0011</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22093-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22093-8.0/" type="self" id="ROS-20260126-80-0011" title="ROS-20260126-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22093" type="cve" id="CVE-2025-22093" title="CVE-2025-22093" />
			<reference href="https://bdu.fstec.ru/vul/2025-12168" type="self" id="BDU:2025-12168" title="BDU:2025-12168" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0012</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22095-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22095-8.0/" type="self" id="ROS-20260126-80-0012" title="ROS-20260126-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22095" type="cve" id="CVE-2025-22095" title="CVE-2025-22095" />
			<reference href="https://bdu.fstec.ru/vul/2025-11810" type="self" id="BDU:2025-11810" title="BDU:2025-11810" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0013</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22097-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22097-8.0/" type="self" id="ROS-20260126-80-0013" title="ROS-20260126-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22097" type="cve" id="CVE-2025-22097" title="CVE-2025-22097" />
			<reference href="https://bdu.fstec.ru/vul/2025-12092" type="self" id="BDU:2025-12092" title="BDU:2025-12092" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0014</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23138-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23138-8.0/" type="self" id="ROS-20260126-80-0014" title="ROS-20260126-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23138" type="cve" id="CVE-2025-23138" title="CVE-2025-23138" />
			<reference href="https://bdu.fstec.ru/vul/2025-11925" type="self" id="BDU:2025-11925" title="BDU:2025-11925" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0015</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37785-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37785-8.0/" type="self" id="ROS-20260126-80-0015" title="ROS-20260126-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37785" type="cve" id="CVE-2025-37785" title="CVE-2025-37785" />
			<reference href="https://bdu.fstec.ru/vul/2025-10257" type="self" id="BDU:2025-10257" title="BDU:2025-10257" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0016</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37893-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37893-8.0/" type="self" id="ROS-20260126-80-0016" title="ROS-20260126-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37893" type="cve" id="CVE-2025-37893" title="CVE-2025-37893" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0017</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37925-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37925-8.0/" type="self" id="ROS-20260126-80-0017" title="ROS-20260126-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37925" type="cve" id="CVE-2025-37925" title="CVE-2025-37925" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0018</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38049-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38049-8.0/" type="self" id="ROS-20260126-80-0018" title="ROS-20260126-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38049" type="cve" id="CVE-2025-38049" title="CVE-2025-38049" />
			<reference href="https://bdu.fstec.ru/vul/2025-12122" type="self" id="BDU:2025-12122" title="BDU:2025-12122" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0019</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38152-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38152-8.0/" type="self" id="ROS-20260126-80-0019" title="ROS-20260126-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38152" type="cve" id="CVE-2025-38152" title="CVE-2025-38152" />
			<reference href="https://bdu.fstec.ru/vul/2025-12113" type="self" id="BDU:2025-12113" title="BDU:2025-12113" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0020</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38240-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38240-8.0/" type="self" id="ROS-20260126-80-0020" title="ROS-20260126-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38240" type="cve" id="CVE-2025-38240" title="CVE-2025-38240" />
			<reference href="https://bdu.fstec.ru/vul/2025-12118" type="self" id="BDU:2025-12118" title="BDU:2025-12118" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0021</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38479-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38479-8.0/" type="self" id="ROS-20260126-80-0021" title="ROS-20260126-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38479" type="cve" id="CVE-2025-38479" title="CVE-2025-38479" />
			<reference href="https://bdu.fstec.ru/vul/2025-12013" type="self" id="BDU:2025-12013" title="BDU:2025-12013" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0022</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38575-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38575-8.0/" type="self" id="ROS-20260126-80-0022" title="ROS-20260126-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38575" type="cve" id="CVE-2025-38575" title="CVE-2025-38575" />
			<reference href="https://bdu.fstec.ru/vul/2025-12063" type="self" id="BDU:2025-12063" title="BDU:2025-12063" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0023</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38637-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38637-8.0/" type="self" id="ROS-20260126-80-0023" title="ROS-20260126-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38637" type="cve" id="CVE-2025-38637" title="CVE-2025-38637" />
			<reference href="https://bdu.fstec.ru/vul/2025-12236" type="self" id="BDU:2025-12236" title="BDU:2025-12236" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0024</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39688-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39688-8.0/" type="self" id="ROS-20260126-80-0024" title="ROS-20260126-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39688" type="cve" id="CVE-2025-39688" title="CVE-2025-39688" />
			<reference href="https://bdu.fstec.ru/vul/2025-12308" type="self" id="BDU:2025-12308" title="BDU:2025-12308" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0025</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23161-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23161-8.0/" type="self" id="ROS-20260126-80-0025" title="ROS-20260126-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23161" type="cve" id="CVE-2025-23161" title="CVE-2025-23161" />
			<reference href="https://bdu.fstec.ru/vul/2025-12257" type="self" id="BDU:2025-12257" title="BDU:2025-12257" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0026</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23160-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23160-8.0/" type="self" id="ROS-20260126-80-0026" title="ROS-20260126-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23160" type="cve" id="CVE-2025-23160" title="CVE-2025-23160" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0027</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23159-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23159-8.0/" type="self" id="ROS-20260126-80-0027" title="ROS-20260126-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23159" type="cve" id="CVE-2025-23159" title="CVE-2025-23159" />
			<reference href="https://bdu.fstec.ru/vul/2025-12307" type="self" id="BDU:2025-12307" title="BDU:2025-12307" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0028</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23158-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23158-8.0/" type="self" id="ROS-20260126-80-0028" title="ROS-20260126-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23158" type="cve" id="CVE-2025-23158" title="CVE-2025-23158" />
			<reference href="https://bdu.fstec.ru/vul/2025-12306" type="self" id="BDU:2025-12306" title="BDU:2025-12306" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0029</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23157-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23157-8.0/" type="self" id="ROS-20260126-80-0029" title="ROS-20260126-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23157" type="cve" id="CVE-2025-23157" title="CVE-2025-23157" />
			<reference href="https://bdu.fstec.ru/vul/2025-11893" type="self" id="BDU:2025-11893" title="BDU:2025-11893" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0030</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23156-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23156-8.0/" type="self" id="ROS-20260126-80-0030" title="ROS-20260126-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23156" type="cve" id="CVE-2025-23156" title="CVE-2025-23156" />
			<reference href="https://bdu.fstec.ru/vul/2025-11888" type="self" id="BDU:2025-11888" title="BDU:2025-11888" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0031</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23154-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23154-8.0/" type="self" id="ROS-20260126-80-0031" title="ROS-20260126-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23154" type="cve" id="CVE-2025-23154" title="CVE-2025-23154" />
			<reference href="https://bdu.fstec.ru/vul/2025-12247" type="self" id="BDU:2025-12247" title="BDU:2025-12247" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0032</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23151-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23151-8.0/" type="self" id="ROS-20260126-80-0032" title="ROS-20260126-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23151" type="cve" id="CVE-2025-23151" title="CVE-2025-23151" />
			<reference href="https://bdu.fstec.ru/vul/2025-11997" type="self" id="BDU:2025-11997" title="BDU:2025-11997" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0033</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23150-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23150-8.0/" type="self" id="ROS-20260126-80-0033" title="ROS-20260126-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23150" type="cve" id="CVE-2025-23150" title="CVE-2025-23150" />
			<reference href="https://bdu.fstec.ru/vul/2025-12110" type="self" id="BDU:2025-12110" title="BDU:2025-12110" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0034</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23149-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23149-8.0/" type="self" id="ROS-20260126-80-0034" title="ROS-20260126-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23149" type="cve" id="CVE-2025-23149" title="CVE-2025-23149" />
			<reference href="https://bdu.fstec.ru/vul/2025-12311" type="self" id="BDU:2025-12311" title="BDU:2025-12311" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0035</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23147-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23147-8.0/" type="self" id="ROS-20260126-80-0035" title="ROS-20260126-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23147" type="cve" id="CVE-2025-23147" title="CVE-2025-23147" />
			<reference href="https://bdu.fstec.ru/vul/2025-12164" type="self" id="BDU:2025-12164" title="BDU:2025-12164" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0036</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23146-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23146-8.0/" type="self" id="ROS-20260126-80-0036" title="ROS-20260126-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23146" type="cve" id="CVE-2025-23146" title="CVE-2025-23146" />
			<reference href="https://bdu.fstec.ru/vul/2025-12165" type="self" id="BDU:2025-12165" title="BDU:2025-12165" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0037</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23145-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23145-8.0/" type="self" id="ROS-20260126-80-0037" title="ROS-20260126-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23145" type="cve" id="CVE-2025-23145" title="CVE-2025-23145" />
			<reference href="https://bdu.fstec.ru/vul/2025-12166" type="self" id="BDU:2025-12166" title="BDU:2025-12166" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0038</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23144-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23144-8.0/" type="self" id="ROS-20260126-80-0038" title="ROS-20260126-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23144" type="cve" id="CVE-2025-23144" title="CVE-2025-23144" />
			<reference href="https://bdu.fstec.ru/vul/2025-12053" type="self" id="BDU:2025-12053" title="BDU:2025-12053" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0039</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23143-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23143-8.0/" type="self" id="ROS-20260126-80-0039" title="ROS-20260126-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23143" type="cve" id="CVE-2025-23143" title="CVE-2025-23143" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0040</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23142-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23142-8.0/" type="self" id="ROS-20260126-80-0040" title="ROS-20260126-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23142" type="cve" id="CVE-2025-23142" title="CVE-2025-23142" />
			<reference href="https://bdu.fstec.ru/vul/2025-12091" type="self" id="BDU:2025-12091" title="BDU:2025-12091" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0041</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23141-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23141-8.0/" type="self" id="ROS-20260126-80-0041" title="ROS-20260126-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23141" type="cve" id="CVE-2025-23141" title="CVE-2025-23141" />
			<reference href="https://bdu.fstec.ru/vul/2025-11982" type="self" id="BDU:2025-11982" title="BDU:2025-11982" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0042</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23140-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23140-8.0/" type="self" id="ROS-20260126-80-0042" title="ROS-20260126-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23140" type="cve" id="CVE-2025-23140" title="CVE-2025-23140" />
			<reference href="https://bdu.fstec.ru/vul/2025-11811" type="self" id="BDU:2025-11811" title="BDU:2025-11811" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0043</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37838-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37838-8.0/" type="self" id="ROS-20260126-80-0043" title="ROS-20260126-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37838" type="cve" id="CVE-2025-37838" title="CVE-2025-37838" />
			<reference href="https://bdu.fstec.ru/vul/2025-12074" type="self" id="BDU:2025-12074" title="BDU:2025-12074" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0044</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-40114-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-40114-8.0/" type="self" id="ROS-20260126-80-0044" title="ROS-20260126-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40114" type="cve" id="CVE-2025-40114" title="CVE-2025-40114" />
			<reference href="https://bdu.fstec.ru/vul/2025-11894" type="self" id="BDU:2025-11894" title="BDU:2025-11894" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0045</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39778-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39778-8.0/" type="self" id="ROS-20260126-80-0045" title="ROS-20260126-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39778" type="cve" id="CVE-2025-39778" title="CVE-2025-39778" />
			<reference href="https://bdu.fstec.ru/vul/2025-11859" type="self" id="BDU:2025-11859" title="BDU:2025-11859" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0046</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39735-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39735-8.0/" type="self" id="ROS-20260126-80-0046" title="ROS-20260126-80-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39735" type="cve" id="CVE-2025-39735" title="CVE-2025-39735" />
			<reference href="https://bdu.fstec.ru/vul/2025-11860" type="self" id="BDU:2025-11860" title="BDU:2025-11860" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0047</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39728-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39728-8.0/" type="self" id="ROS-20260126-80-0047" title="ROS-20260126-80-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39728" type="cve" id="CVE-2025-39728" title="CVE-2025-39728" />
			<reference href="https://bdu.fstec.ru/vul/2025-11895" type="self" id="BDU:2025-11895" title="BDU:2025-11895" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0048</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22079-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22079-8.0/" type="self" id="ROS-20260126-80-0048" title="ROS-20260126-80-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22079" type="cve" id="CVE-2025-22079" title="CVE-2025-22079" />
			<reference href="https://bdu.fstec.ru/vul/2025-11871" type="self" id="BDU:2025-11871" title="BDU:2025-11871" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0049</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37738-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37738-8.0/" type="self" id="ROS-20260126-80-0049" title="ROS-20260126-80-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37738" type="cve" id="CVE-2025-37738" title="CVE-2025-37738" />
			<reference href="https://bdu.fstec.ru/vul/2025-12089" type="self" id="BDU:2025-12089" title="BDU:2025-12089" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0050</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37739-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37739-8.0/" type="self" id="ROS-20260126-80-0050" title="ROS-20260126-80-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37739" type="cve" id="CVE-2025-37739" title="CVE-2025-37739" />
			<reference href="https://bdu.fstec.ru/vul/2025-11896" type="self" id="BDU:2025-11896" title="BDU:2025-11896" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0051</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37740-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37740-8.0/" type="self" id="ROS-20260126-80-0051" title="ROS-20260126-80-0051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37740" type="cve" id="CVE-2025-37740" title="CVE-2025-37740" />
			<reference href="https://bdu.fstec.ru/vul/2025-12004" type="self" id="BDU:2025-12004" title="BDU:2025-12004" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0052</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37741-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37741-8.0/" type="self" id="ROS-20260126-80-0052" title="ROS-20260126-80-0052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37741" type="cve" id="CVE-2025-37741" title="CVE-2025-37741" />
			<reference href="https://bdu.fstec.ru/vul/2025-12343" type="self" id="BDU:2025-12343" title="BDU:2025-12343" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0053</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37742-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37742-8.0/" type="self" id="ROS-20260126-80-0053" title="ROS-20260126-80-0053" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37742" type="cve" id="CVE-2025-37742" title="CVE-2025-37742" />
			<reference href="https://bdu.fstec.ru/vul/2025-12330" type="self" id="BDU:2025-12330" title="BDU:2025-12330" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0054</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37748-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37748-8.0/" type="self" id="ROS-20260126-80-0054" title="ROS-20260126-80-0054" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37748" type="cve" id="CVE-2025-37748" title="CVE-2025-37748" />
			<reference href="https://bdu.fstec.ru/vul/2025-12162" type="self" id="BDU:2025-12162" title="BDU:2025-12162" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0055</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37749-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37749-8.0/" type="self" id="ROS-20260126-80-0055" title="ROS-20260126-80-0055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37749" type="cve" id="CVE-2025-37749" title="CVE-2025-37749" />
			<reference href="https://bdu.fstec.ru/vul/2025-11870" type="self" id="BDU:2025-11870" title="BDU:2025-11870" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0056</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37752-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37752-8.0/" type="self" id="ROS-20260126-80-0056" title="ROS-20260126-80-0056" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37752" type="cve" id="CVE-2025-37752" title="CVE-2025-37752" />
			<reference href="https://bdu.fstec.ru/vul/2025-05411" type="self" id="BDU:2025-05411" title="BDU:2025-05411" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0057</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37754-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37754-8.0/" type="self" id="ROS-20260126-80-0057" title="ROS-20260126-80-0057" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37754" type="cve" id="CVE-2025-37754" title="CVE-2025-37754" />
			<reference href="https://bdu.fstec.ru/vul/2025-12284" type="self" id="BDU:2025-12284" title="BDU:2025-12284" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0058</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37755-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37755-8.0/" type="self" id="ROS-20260126-80-0058" title="ROS-20260126-80-0058" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37755" type="cve" id="CVE-2025-37755" title="CVE-2025-37755" />
			<reference href="https://bdu.fstec.ru/vul/2025-12161" type="self" id="BDU:2025-12161" title="BDU:2025-12161" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0059</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37756-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37756-8.0/" type="self" id="ROS-20260126-80-0059" title="ROS-20260126-80-0059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37756" type="cve" id="CVE-2025-37756" title="CVE-2025-37756" />
			<reference href="https://bdu.fstec.ru/vul/2025-11935" type="self" id="BDU:2025-11935" title="BDU:2025-11935" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0060</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37757-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37757-8.0/" type="self" id="ROS-20260126-80-0060" title="ROS-20260126-80-0060" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37757" type="cve" id="CVE-2025-37757" title="CVE-2025-37757" />
			<reference href="https://bdu.fstec.ru/vul/2025-12036" type="self" id="BDU:2025-12036" title="BDU:2025-12036" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0061</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37758-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37758-8.0/" type="self" id="ROS-20260126-80-0061" title="ROS-20260126-80-0061" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37758" type="cve" id="CVE-2025-37758" title="CVE-2025-37758" />
			<reference href="https://bdu.fstec.ru/vul/2025-12160" type="self" id="BDU:2025-12160" title="BDU:2025-12160" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0062</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37759-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37759-8.0/" type="self" id="ROS-20260126-80-0062" title="ROS-20260126-80-0062" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37759" type="cve" id="CVE-2025-37759" title="CVE-2025-37759" />
			<reference href="https://bdu.fstec.ru/vul/2025-12159" type="self" id="BDU:2025-12159" title="BDU:2025-12159" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0063</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37760-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37760-8.0/" type="self" id="ROS-20260126-80-0063" title="ROS-20260126-80-0063" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37760" type="cve" id="CVE-2025-37760" title="CVE-2025-37760" />
			<reference href="https://bdu.fstec.ru/vul/2025-12293" type="self" id="BDU:2025-12293" title="BDU:2025-12293" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0064</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37761-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37761-8.0/" type="self" id="ROS-20260126-80-0064" title="ROS-20260126-80-0064" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37761" type="cve" id="CVE-2025-37761" title="CVE-2025-37761" />
			<reference href="https://bdu.fstec.ru/vul/2025-11869" type="self" id="BDU:2025-11869" title="BDU:2025-11869" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0065</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37763-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37763-8.0/" type="self" id="ROS-20260126-80-0065" title="ROS-20260126-80-0065" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37763" type="cve" id="CVE-2025-37763" title="CVE-2025-37763" />
			<reference href="https://bdu.fstec.ru/vul/2025-12088" type="self" id="BDU:2025-12088" title="BDU:2025-12088" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0066</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37764-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37764-8.0/" type="self" id="ROS-20260126-80-0066" title="ROS-20260126-80-0066" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37764" type="cve" id="CVE-2025-37764" title="CVE-2025-37764" />
			<reference href="https://bdu.fstec.ru/vul/2025-12035" type="self" id="BDU:2025-12035" title="BDU:2025-12035" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0067</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37765-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37765-8.0/" type="self" id="ROS-20260126-80-0067" title="ROS-20260126-80-0067" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37765" type="cve" id="CVE-2025-37765" title="CVE-2025-37765" />
			<reference href="https://bdu.fstec.ru/vul/2025-12370" type="self" id="BDU:2025-12370" title="BDU:2025-12370" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0068</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37766-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37766-8.0/" type="self" id="ROS-20260126-80-0068" title="ROS-20260126-80-0068" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37766" type="cve" id="CVE-2025-37766" title="CVE-2025-37766" />
			<reference href="https://bdu.fstec.ru/vul/2025-12008" type="self" id="BDU:2025-12008" title="BDU:2025-12008" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0069</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37767-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37767-8.0/" type="self" id="ROS-20260126-80-0069" title="ROS-20260126-80-0069" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37767" type="cve" id="CVE-2025-37767" title="CVE-2025-37767" />
			<reference href="https://bdu.fstec.ru/vul/2025-12012" type="self" id="BDU:2025-12012" title="BDU:2025-12012" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0070</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37768-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37768-8.0/" type="self" id="ROS-20260126-80-0070" title="ROS-20260126-80-0070" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37768" type="cve" id="CVE-2025-37768" title="CVE-2025-37768" />
			<reference href="https://bdu.fstec.ru/vul/2025-12011" type="self" id="BDU:2025-12011" title="BDU:2025-12011" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0071</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37769-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37769-8.0/" type="self" id="ROS-20260126-80-0071" title="ROS-20260126-80-0071" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37769" type="cve" id="CVE-2025-37769" title="CVE-2025-37769" />
			<reference href="https://bdu.fstec.ru/vul/2025-12003" type="self" id="BDU:2025-12003" title="BDU:2025-12003" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0072</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37770-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37770-8.0/" type="self" id="ROS-20260126-80-0072" title="ROS-20260126-80-0072" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37770" type="cve" id="CVE-2025-37770" title="CVE-2025-37770" />
			<reference href="https://bdu.fstec.ru/vul/2025-12010" type="self" id="BDU:2025-12010" title="BDU:2025-12010" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0073</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37771-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37771-8.0/" type="self" id="ROS-20260126-80-0073" title="ROS-20260126-80-0073" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37771" type="cve" id="CVE-2025-37771" title="CVE-2025-37771" />
			<reference href="https://bdu.fstec.ru/vul/2025-12009" type="self" id="BDU:2025-12009" title="BDU:2025-12009" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0074</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37772-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37772-8.0/" type="self" id="ROS-20260126-80-0074" title="ROS-20260126-80-0074" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37772" type="cve" id="CVE-2025-37772" title="CVE-2025-37772" />
			<reference href="https://bdu.fstec.ru/vul/2025-12158" type="self" id="BDU:2025-12158" title="BDU:2025-12158" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0075</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37773-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37773-8.0/" type="self" id="ROS-20260126-80-0075" title="ROS-20260126-80-0075" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37773" type="cve" id="CVE-2025-37773" title="CVE-2025-37773" />
			<reference href="https://bdu.fstec.ru/vul/2025-11978" type="self" id="BDU:2025-11978" title="BDU:2025-11978" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0076</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37774-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37774-8.0/" type="self" id="ROS-20260126-80-0076" title="ROS-20260126-80-0076" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37774" type="cve" id="CVE-2025-37774" title="CVE-2025-37774" />
			<reference href="https://bdu.fstec.ru/vul/2025-12157" type="self" id="BDU:2025-12157" title="BDU:2025-12157" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0077</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость pgadmin4 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в pgadmin4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-pgadmin4-cve-2025-13780-8.0/</description>
               <solution>Установить обновление для пакета(ов) pgadmin4
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-pgadmin4-cve-2025-13780-8.0/" type="self" id="ROS-20260126-80-0077" title="ROS-20260126-80-0077" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13780" type="cve" id="CVE-2025-13780" title="CVE-2025-13780" />
			<reference href="https://bdu.fstec.ru/vul/2025-15881" type="self" id="BDU:2025-15881" title="BDU:2025-15881" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="pgadmin4" epoch="0" version="9.6" release="4.red80" arch="x86_64" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-0:9.6-4.red80.x86_64.rpm</filename>
				</package>
				<package name="pgadmin4-httpd" epoch="0" version="9.6" release="4.red80" arch="x86_64" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-httpd-0:9.6-4.red80.x86_64.rpm</filename>
				</package>
				<package name="pgadmin4-qt" epoch="0" version="9.6" release="4.red80" arch="x86_64" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-qt-0:9.6-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="pgadmin4" epoch="0" version="9.6" release="4.red80" arch="aarch64" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-0:9.6-4.red80.aarch64.rpm</filename>
				</package>
				<package name="pgadmin4-httpd" epoch="0" version="9.6" release="4.red80" arch="aarch64" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-httpd-0:9.6-4.red80.aarch64.rpm</filename>
				</package>
				<package name="pgadmin4-qt" epoch="0" version="9.6" release="4.red80" arch="aarch64" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-qt-0:9.6-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="pgadmin4-doc" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-doc-0:9.6-4.red80.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-cs" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-langpack-cs-0:9.6-4.red80.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-de" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-langpack-de-0:9.6-4.red80.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-es" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-langpack-es-0:9.6-4.red80.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-fr" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-langpack-fr-0:9.6-4.red80.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-it" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-langpack-it-0:9.6-4.red80.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-ja" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-langpack-ja-0:9.6-4.red80.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-ko" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-langpack-ko-0:9.6-4.red80.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-pl" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-langpack-pl-0:9.6-4.red80.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-ru" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-langpack-ru-0:9.6-4.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0078</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37775-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37775-8.0/" type="self" id="ROS-20260126-80-0078" title="ROS-20260126-80-0078" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37775" type="cve" id="CVE-2025-37775" title="CVE-2025-37775" />
			<reference href="https://bdu.fstec.ru/vul/2025-11960" type="self" id="BDU:2025-11960" title="BDU:2025-11960" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0079</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37778-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37778-8.0/" type="self" id="ROS-20260126-80-0079" title="ROS-20260126-80-0079" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37778" type="cve" id="CVE-2025-37778" title="CVE-2025-37778" />
			<reference href="https://bdu.fstec.ru/vul/2025-06312" type="self" id="BDU:2025-06312" title="BDU:2025-06312" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0080</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37780-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37780-8.0/" type="self" id="ROS-20260126-80-0080" title="ROS-20260126-80-0080" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37780" type="cve" id="CVE-2025-37780" title="CVE-2025-37780" />
			<reference href="https://bdu.fstec.ru/vul/2025-11868" type="self" id="BDU:2025-11868" title="BDU:2025-11868" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0081</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37781-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37781-8.0/" type="self" id="ROS-20260126-80-0081" title="ROS-20260126-80-0081" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37781" type="cve" id="CVE-2025-37781" title="CVE-2025-37781" />
			<reference href="https://bdu.fstec.ru/vul/2025-12156" type="self" id="BDU:2025-12156" title="BDU:2025-12156" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0082</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37782-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37782-8.0/" type="self" id="ROS-20260126-80-0082" title="ROS-20260126-80-0082" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37782" type="cve" id="CVE-2025-37782" title="CVE-2025-37782" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0083</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37784-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37784-8.0/" type="self" id="ROS-20260126-80-0083" title="ROS-20260126-80-0083" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37784" type="cve" id="CVE-2025-37784" title="CVE-2025-37784" />
			<reference href="https://bdu.fstec.ru/vul/2025-12155" type="self" id="BDU:2025-12155" title="BDU:2025-12155" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0084</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37787-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37787-8.0/" type="self" id="ROS-20260126-80-0084" title="ROS-20260126-80-0084" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37787" type="cve" id="CVE-2025-37787" title="CVE-2025-37787" />
			<reference href="https://bdu.fstec.ru/vul/2025-12154" type="self" id="BDU:2025-12154" title="BDU:2025-12154" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0085</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37788-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37788-8.0/" type="self" id="ROS-20260126-80-0085" title="ROS-20260126-80-0085" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37788" type="cve" id="CVE-2025-37788" title="CVE-2025-37788" />
			<reference href="https://bdu.fstec.ru/vul/2025-12034" type="self" id="BDU:2025-12034" title="BDU:2025-12034" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0086</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37789-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37789-8.0/" type="self" id="ROS-20260126-80-0086" title="ROS-20260126-80-0086" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37789" type="cve" id="CVE-2025-37789" title="CVE-2025-37789" />
			<reference href="https://bdu.fstec.ru/vul/2025-11934" type="self" id="BDU:2025-11934" title="BDU:2025-11934" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0087</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37790-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37790-8.0/" type="self" id="ROS-20260126-80-0087" title="ROS-20260126-80-0087" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37790" type="cve" id="CVE-2025-37790" title="CVE-2025-37790" />
			<reference href="https://bdu.fstec.ru/vul/2025-12109" type="self" id="BDU:2025-12109" title="BDU:2025-12109" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0088</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37791-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37791-8.0/" type="self" id="ROS-20260126-80-0088" title="ROS-20260126-80-0088" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37791" type="cve" id="CVE-2025-37791" title="CVE-2025-37791" />
			<reference href="https://bdu.fstec.ru/vul/2025-12310" type="self" id="BDU:2025-12310" title="BDU:2025-12310" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0089</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37792-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37792-8.0/" type="self" id="ROS-20260126-80-0089" title="ROS-20260126-80-0089" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37792" type="cve" id="CVE-2025-37792" title="CVE-2025-37792" />
			<reference href="https://bdu.fstec.ru/vul/2025-12153" type="self" id="BDU:2025-12153" title="BDU:2025-12153" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0090</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37793-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37793-8.0/" type="self" id="ROS-20260126-80-0090" title="ROS-20260126-80-0090" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37793" type="cve" id="CVE-2025-37793" title="CVE-2025-37793" />
			<reference href="https://bdu.fstec.ru/vul/2025-12152" type="self" id="BDU:2025-12152" title="BDU:2025-12152" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0091</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37794-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37794-8.0/" type="self" id="ROS-20260126-80-0091" title="ROS-20260126-80-0091" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37794" type="cve" id="CVE-2025-37794" title="CVE-2025-37794" />
			<reference href="https://bdu.fstec.ru/vul/2025-12151" type="self" id="BDU:2025-12151" title="BDU:2025-12151" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0092</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37795-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37795-8.0/" type="self" id="ROS-20260126-80-0092" title="ROS-20260126-80-0092" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37795" type="cve" id="CVE-2025-37795" title="CVE-2025-37795" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260126-80-0093</id>
		<issued date="2026-01-26" />
		<updated date="2026-01-26" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37796-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37796-8.0/" type="self" id="ROS-20260126-80-0093" title="ROS-20260126-80-0093" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37796" type="cve" id="CVE-2025-37796" title="CVE-2025-37796" />
			<reference href="https://bdu.fstec.ru/vul/2025-12108" type="self" id="BDU:2025-12108" title="BDU:2025-12108" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260127-80-0001</id>
		<issued date="2026-01-27" />
		<updated date="2026-01-27" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23163-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23163-8.0/" type="self" id="ROS-20260127-80-0001" title="ROS-20260127-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23163" type="cve" id="CVE-2025-23163" title="CVE-2025-23163" />
			<reference href="https://bdu.fstec.ru/vul/2025-12344" type="self" id="BDU:2025-12344" title="BDU:2025-12344" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-80-0001</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37797-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37797-8.0/" type="self" id="ROS-20260128-80-0001" title="ROS-20260128-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37797" type="cve" id="CVE-2025-37797" title="CVE-2025-37797" />
			<reference href="https://bdu.fstec.ru/vul/2025-12087" type="self" id="BDU:2025-12087" title="BDU:2025-12087" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-80-0002</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37798-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37798-8.0/" type="self" id="ROS-20260128-80-0002" title="ROS-20260128-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37798" type="cve" id="CVE-2025-37798" title="CVE-2025-37798" />
			<reference href="https://bdu.fstec.ru/vul/2025-11933" type="self" id="BDU:2025-11933" title="BDU:2025-11933" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260128-80-0003</id>
		<issued date="2026-01-28" />
		<updated date="2026-01-28" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23148-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-23148-8.0/" type="self" id="ROS-20260128-80-0003" title="ROS-20260128-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23148" type="cve" id="CVE-2025-23148" title="CVE-2025-23148" />
			<reference href="https://bdu.fstec.ru/vul/2025-12163" type="self" id="BDU:2025-12163" title="BDU:2025-12163" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0001</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость openstack-barbican </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openstack-barbican</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openstack-barbican-cve-2022-3100-8.0/</description>
               <solution>Установить обновление для пакета(ов) openstack-barbican
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openstack-barbican-cve-2022-3100-8.0/" type="self" id="ROS-20260129-80-0001" title="ROS-20260129-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3100" type="cve" id="CVE-2022-3100" title="CVE-2022-3100" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="openstack-barbican" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>openstack-barbican-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-api" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>openstack-barbican-api-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-common" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>openstack-barbican-common-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-keystone-listener" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>openstack-barbican-keystone-listener-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-worker" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>openstack-barbican-worker-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="python3-barbican" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>python3-barbican-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="python3-barbican-tests" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>python3-barbican-tests-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0002</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость openstack-barbican </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openstack-barbican</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openstack-barbican-cve-2023-1633-8.0/</description>
               <solution>Установить обновление для пакета(ов) openstack-barbican
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openstack-barbican-cve-2023-1633-8.0/" type="self" id="ROS-20260129-80-0002" title="ROS-20260129-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1633" type="cve" id="CVE-2023-1633" title="CVE-2023-1633" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="openstack-barbican" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>openstack-barbican-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-api" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>openstack-barbican-api-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-common" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>openstack-barbican-common-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-keystone-listener" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>openstack-barbican-keystone-listener-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-worker" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>openstack-barbican-worker-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="python3-barbican" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>python3-barbican-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="python3-barbican-tests" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>python3-barbican-tests-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0003</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость openstack-barbican </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openstack-barbican</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openstack-barbican-cve-2023-1636-8.0/</description>
               <solution>Установить обновление для пакета(ов) openstack-barbican
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openstack-barbican-cve-2023-1636-8.0/" type="self" id="ROS-20260129-80-0003" title="ROS-20260129-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1636" type="cve" id="CVE-2023-1636" title="CVE-2023-1636" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="openstack-barbican" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>openstack-barbican-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-api" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>openstack-barbican-api-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-common" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>openstack-barbican-common-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-keystone-listener" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>openstack-barbican-keystone-listener-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="openstack-barbican-worker" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>openstack-barbican-worker-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="python3-barbican" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>python3-barbican-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="python3-barbican-tests" epoch="0" version="13.0.0" release="4.red80" arch="noarch" src="openstack-barbican-13.0.0-4.red80.src.rpm">
					<filename>python3-barbican-tests-0:13.0.0-4.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0004</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость samba </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в samba</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-samba-cve-2018-14628-8.0/</description>
               <solution>Установить обновление для пакета(ов) samba
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-samba-cve-2018-14628-8.0/" type="self" id="ROS-20260129-80-0004" title="ROS-20260129-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14628" type="cve" id="CVE-2018-14628" title="CVE-2018-14628" />
			<reference href="https://bdu.fstec.ru/vul/2025-03903" type="self" id="BDU:2025-03903" title="BDU:2025-03903" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="ctdb" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>ctdb-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="ctdb-ceph-mutex" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>ctdb-ceph-mutex-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="ctdb-etcd-mutex" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>ctdb-etcd-mutex-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="ctdb-pcp-pmda" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>ctdb-pcp-pmda-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="libnetapi" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>libnetapi-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="libnetapi-devel" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>libnetapi-devel-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="libsmbclient" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>libsmbclient-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="libsmbclient-devel" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>libsmbclient-devel-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="libwbclient" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>libwbclient-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="libwbclient-devel" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>libwbclient-devel-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-samba" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>python3-samba-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-samba-dc" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>python3-samba-dc-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-samba-devel" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>python3-samba-devel-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-samba-test" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>python3-samba-test-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-client" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-client-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-client-libs" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-client-libs-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-common-libs" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-common-libs-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-common-tools" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-common-tools-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-dc" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-dc-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-dc-bind-dlz" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-dc-bind-dlz-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-dc-libs" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-dc-libs-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-dcerpc" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-dcerpc-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-devel" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-devel-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-gpupdate" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-gpupdate-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-krb5-printing" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-krb5-printing-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-ldb-ldap-modules" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-ldb-ldap-modules-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-libs" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-libs-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-test" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-test-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-test-libs" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-test-libs-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-tools" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-tools-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-usershares" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-usershares-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-vfs-cephfs" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-vfs-cephfs-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-vfs-glusterfs" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-vfs-glusterfs-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-vfs-iouring" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-vfs-iouring-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-winbind" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-winbind-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-winbind-clients" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-winbind-clients-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-winbind-krb5-locator" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-winbind-krb5-locator-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-winbind-modules" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-winbind-modules-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
				<package name="samba-winexe" epoch="0" version="4.19.9" release="9m.red80" arch="x86_64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-winexe-0:4.19.9-9m.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="ctdb" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>ctdb-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="ctdb-ceph-mutex" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>ctdb-ceph-mutex-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="ctdb-etcd-mutex" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>ctdb-etcd-mutex-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="ctdb-pcp-pmda" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>ctdb-pcp-pmda-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="libnetapi" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>libnetapi-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="libnetapi-devel" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>libnetapi-devel-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="libsmbclient" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>libsmbclient-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="libsmbclient-devel" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>libsmbclient-devel-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="libwbclient" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>libwbclient-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="libwbclient-devel" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>libwbclient-devel-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-samba" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>python3-samba-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-samba-dc" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>python3-samba-dc-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-samba-devel" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>python3-samba-devel-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-samba-test" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>python3-samba-test-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-client" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-client-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-client-libs" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-client-libs-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-common-libs" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-common-libs-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-common-tools" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-common-tools-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-dc" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-dc-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-dc-bind-dlz" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-dc-bind-dlz-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-dc-libs" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-dc-libs-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-dcerpc" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-dcerpc-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-devel" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-devel-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-gpupdate" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-gpupdate-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-krb5-printing" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-krb5-printing-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-ldb-ldap-modules" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-ldb-ldap-modules-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-libs" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-libs-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-test" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-test-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-test-libs" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-test-libs-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-tools" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-tools-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-usershares" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-usershares-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-vfs-cephfs" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-vfs-cephfs-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-vfs-glusterfs" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-vfs-glusterfs-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-vfs-iouring" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-vfs-iouring-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-winbind" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-winbind-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-winbind-clients" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-winbind-clients-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-winbind-krb5-locator" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-winbind-krb5-locator-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-winbind-modules" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-winbind-modules-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
				<package name="samba-winexe" epoch="0" version="4.19.9" release="9m.red80" arch="aarch64" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-winexe-0:4.19.9-9m.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="samba-common" epoch="0" version="4.19.9" release="9m.red80" arch="noarch" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-common-0:4.19.9-9m.red80.noarch.rpm</filename>
				</package>
				<package name="samba-dc-provision" epoch="0" version="4.19.9" release="9m.red80" arch="noarch" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-dc-provision-0:4.19.9-9m.red80.noarch.rpm</filename>
				</package>
				<package name="samba-pidl" epoch="0" version="4.19.9" release="9m.red80" arch="noarch" src="samba-4.19.9-9m.red80.src.rpm">
					<filename>samba-pidl-0:4.19.9-9m.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0005</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-6035-8.0/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-6035-8.0/" type="self" id="ROS-20260129-80-0005" title="ROS-20260129-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6035" type="cve" id="CVE-2025-6035" title="CVE-2025-6035" />
			<reference href="https://bdu.fstec.ru/vul/2025-10732" type="self" id="BDU:2025-10732" title="BDU:2025-10732" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gimp" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gimp" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0006</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость bluez </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в bluez</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-bluez-cve-2023-51589-8.0/</description>
               <solution>Установить обновление для пакета(ов) bluez
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-bluez-cve-2023-51589-8.0/" type="self" id="ROS-20260129-80-0006" title="ROS-20260129-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51589" type="cve" id="CVE-2023-51589" title="CVE-2023-51589" />
			<reference href="https://bdu.fstec.ru/vul/2025-16168" type="self" id="BDU:2025-16168" title="BDU:2025-16168" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="bluez" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-cups" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-cups-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-deprecated" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-deprecated-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-hid2hci" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-hid2hci-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-libs" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-libs-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-libs-devel" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-libs-devel-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-mesh" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-mesh-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-obexd" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-obexd-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="bluez" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-cups" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-cups-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-deprecated" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-deprecated-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-hid2hci" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-hid2hci-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-libs" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-libs-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-libs-devel" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-libs-devel-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-mesh" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-mesh-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-obexd" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-obexd-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0007</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость bluez </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в bluez</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-bluez-cve-2023-51592-8.0/</description>
               <solution>Установить обновление для пакета(ов) bluez
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-bluez-cve-2023-51592-8.0/" type="self" id="ROS-20260129-80-0007" title="ROS-20260129-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51592" type="cve" id="CVE-2023-51592" title="CVE-2023-51592" />
			<reference href="https://bdu.fstec.ru/vul/2025-16169" type="self" id="BDU:2025-16169" title="BDU:2025-16169" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="bluez" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-cups" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-cups-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-deprecated" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-deprecated-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-hid2hci" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-hid2hci-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-libs" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-libs-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-libs-devel" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-libs-devel-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-mesh" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-mesh-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-obexd" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-obexd-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="bluez" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-cups" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-cups-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-deprecated" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-deprecated-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-hid2hci" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-hid2hci-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-libs" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-libs-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-libs-devel" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-libs-devel-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-mesh" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-mesh-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-obexd" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-obexd-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0008</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость bluez </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в bluez</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-bluez-cve-2023-51594-8.0/</description>
               <solution>Установить обновление для пакета(ов) bluez
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-bluez-cve-2023-51594-8.0/" type="self" id="ROS-20260129-80-0008" title="ROS-20260129-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51594" type="cve" id="CVE-2023-51594" title="CVE-2023-51594" />
			<reference href="https://bdu.fstec.ru/vul/2025-16170" type="self" id="BDU:2025-16170" title="BDU:2025-16170" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="bluez" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-cups" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-cups-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-deprecated" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-deprecated-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-hid2hci" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-hid2hci-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-libs" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-libs-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-libs-devel" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-libs-devel-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-mesh" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-mesh-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
				<package name="bluez-obexd" epoch="0" version="5.84" release="1.red80" arch="x86_64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-obexd-0:5.84-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="bluez" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-cups" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-cups-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-deprecated" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-deprecated-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-hid2hci" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-hid2hci-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-libs" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-libs-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-libs-devel" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-libs-devel-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-mesh" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-mesh-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
				<package name="bluez-obexd" epoch="0" version="5.84" release="1.red80" arch="aarch64" src="bluez-5.84-1.red80.src.rpm">
					<filename>bluez-obexd-0:5.84-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0009</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python3-13-cve-2025-6069-8.0/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python3-13-cve-2025-6069-8.0/" type="self" id="ROS-20260129-80-0009" title="ROS-20260129-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6069" type="cve" id="CVE-2025-6069" title="CVE-2025-6069" />
			<reference href="https://bdu.fstec.ru/vul/2025-11082" type="self" id="BDU:2025-11082" title="BDU:2025-11082" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="python3.13" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-debug-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-devel-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-freethreading-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-idle-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-libs-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-test-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-tkinter-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="python3.13" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-debug-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-devel-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-freethreading-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-idle-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-libs-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-test-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-tkinter-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0010</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python3-13-cve-2025-8194-8.0/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python3-13-cve-2025-8194-8.0/" type="self" id="ROS-20260129-80-0010" title="ROS-20260129-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8194" type="cve" id="CVE-2025-8194" title="CVE-2025-8194" />
			<reference href="https://bdu.fstec.ru/vul/2025-09687" type="self" id="BDU:2025-09687" title="BDU:2025-09687" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="python3.13" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-debug-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-devel-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-freethreading-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-idle-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-libs-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-test-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-tkinter-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="python3.13" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-debug-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-devel-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-freethreading-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-idle-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-libs-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-test-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-tkinter-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0011</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость rust </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rust</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-rust-cve-2025-11233-8.0/</description>
               <solution>Установить обновление для пакета(ов) rust
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-rust-cve-2025-11233-8.0/" type="self" id="ROS-20260129-80-0011" title="ROS-20260129-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11233" type="cve" id="CVE-2025-11233" title="CVE-2025-11233" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="cargo" epoch="0" version="1.91.1" release="3.red80" arch="x86_64" src="rust-1.91.1-3.red80.src.rpm">
					<filename>cargo-0:1.91.1-3.red80.x86_64.rpm</filename>
				</package>
				<package name="clippy" epoch="0" version="1.91.1" release="3.red80" arch="x86_64" src="rust-1.91.1-3.red80.src.rpm">
					<filename>clippy-0:1.91.1-3.red80.x86_64.rpm</filename>
				</package>
				<package name="rust" epoch="0" version="1.91.1" release="3.red80" arch="x86_64" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rust-0:1.91.1-3.red80.x86_64.rpm</filename>
				</package>
				<package name="rust-analyzer" epoch="0" version="1.91.1" release="3.red80" arch="x86_64" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rust-analyzer-0:1.91.1-3.red80.x86_64.rpm</filename>
				</package>
				<package name="rust-doc" epoch="0" version="1.91.1" release="3.red80" arch="x86_64" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rust-doc-0:1.91.1-3.red80.x86_64.rpm</filename>
				</package>
				<package name="rust-std-static" epoch="0" version="1.91.1" release="3.red80" arch="x86_64" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rust-std-static-0:1.91.1-3.red80.x86_64.rpm</filename>
				</package>
				<package name="rust-std-static-x86_64-unknown-none" epoch="0" version="1.91.1" release="3.red80" arch="x86_64" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rust-std-static-x86_64-unknown-none-0:1.91.1-3.red80.x86_64.rpm</filename>
				</package>
				<package name="rust-std-static-x86_64-unknown-uefi" epoch="0" version="1.91.1" release="3.red80" arch="x86_64" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rust-std-static-x86_64-unknown-uefi-0:1.91.1-3.red80.x86_64.rpm</filename>
				</package>
				<package name="rustfmt" epoch="0" version="1.91.1" release="3.red80" arch="x86_64" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rustfmt-0:1.91.1-3.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="cargo" epoch="0" version="1.91.1" release="3.red80" arch="aarch64" src="rust-1.91.1-3.red80.src.rpm">
					<filename>cargo-0:1.91.1-3.red80.aarch64.rpm</filename>
				</package>
				<package name="clippy" epoch="0" version="1.91.1" release="3.red80" arch="aarch64" src="rust-1.91.1-3.red80.src.rpm">
					<filename>clippy-0:1.91.1-3.red80.aarch64.rpm</filename>
				</package>
				<package name="rust" epoch="0" version="1.91.1" release="3.red80" arch="aarch64" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rust-0:1.91.1-3.red80.aarch64.rpm</filename>
				</package>
				<package name="rust-analyzer" epoch="0" version="1.91.1" release="3.red80" arch="aarch64" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rust-analyzer-0:1.91.1-3.red80.aarch64.rpm</filename>
				</package>
				<package name="rust-doc" epoch="0" version="1.91.1" release="3.red80" arch="aarch64" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rust-doc-0:1.91.1-3.red80.aarch64.rpm</filename>
				</package>
				<package name="rust-std-static" epoch="0" version="1.91.1" release="3.red80" arch="aarch64" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rust-std-static-0:1.91.1-3.red80.aarch64.rpm</filename>
				</package>
				<package name="rust-std-static-aarch64-unknown-none-softfloat" epoch="0" version="1.91.1" release="3.red80" arch="aarch64" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rust-std-static-aarch64-unknown-none-softfloat-0:1.91.1-3.red80.aarch64.rpm</filename>
				</package>
				<package name="rust-std-static-aarch64-unknown-uefi" epoch="0" version="1.91.1" release="3.red80" arch="aarch64" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rust-std-static-aarch64-unknown-uefi-0:1.91.1-3.red80.aarch64.rpm</filename>
				</package>
				<package name="rustfmt" epoch="0" version="1.91.1" release="3.red80" arch="aarch64" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rustfmt-0:1.91.1-3.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="rust-debugger-common" epoch="0" version="1.91.1" release="3.red80" arch="noarch" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rust-debugger-common-0:1.91.1-3.red80.noarch.rpm</filename>
				</package>
				<package name="rust-gdb" epoch="0" version="1.91.1" release="3.red80" arch="noarch" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rust-gdb-0:1.91.1-3.red80.noarch.rpm</filename>
				</package>
				<package name="rust-lldb" epoch="0" version="1.91.1" release="3.red80" arch="noarch" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rust-lldb-0:1.91.1-3.red80.noarch.rpm</filename>
				</package>
				<package name="rust-src" epoch="0" version="1.91.1" release="3.red80" arch="noarch" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rust-src-0:1.91.1-3.red80.noarch.rpm</filename>
				</package>
				<package name="rust-toolset" epoch="0" version="1.91.1" release="3.red80" arch="noarch" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rust-toolset-0:1.91.1-3.red80.noarch.rpm</filename>
				</package>
				<package name="rust-toolset-srpm-macros" epoch="0" version="1.91.1" release="3.red80" arch="noarch" src="rust-1.91.1-3.red80.src.rpm">
					<filename>rust-toolset-srpm-macros-0:1.91.1-3.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0012</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-10921-8.0/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-10921-8.0/" type="self" id="ROS-20260129-80-0012" title="ROS-20260129-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10921" type="cve" id="CVE-2025-10921" title="CVE-2025-10921" />
			<reference href="https://bdu.fstec.ru/vul/2025-16065" type="self" id="BDU:2025-16065" title="BDU:2025-16065" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gimp" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gimp" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0013</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость python-ldap </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-ldap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-ldap-cve-2025-61911-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-ldap
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-ldap-cve-2025-61911-8.0/" type="self" id="ROS-20260129-80-0013" title="ROS-20260129-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61911" type="cve" id="CVE-2025-61911" title="CVE-2025-61911" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="python3-ldap" epoch="0" version="3.4.5" release="1.red80" arch="x86_64" src="python-ldap-3.4.5-1.red80.src.rpm">
					<filename>python3-ldap-0:3.4.5-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="python3-ldap" epoch="0" version="3.4.5" release="1.red80" arch="aarch64" src="python-ldap-3.4.5-1.red80.src.rpm">
					<filename>python3-ldap-0:3.4.5-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python-ldap-doc" epoch="0" version="3.4.5" release="1.red80" arch="noarch" src="python-ldap-3.4.5-1.red80.src.rpm">
					<filename>python-ldap-doc-0:3.4.5-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0014</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость python-ldap </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-ldap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-ldap-cve-2025-61912-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-ldap
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-ldap-cve-2025-61912-8.0/" type="self" id="ROS-20260129-80-0014" title="ROS-20260129-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61912" type="cve" id="CVE-2025-61912" title="CVE-2025-61912" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="python3-ldap" epoch="0" version="3.4.5" release="1.red80" arch="x86_64" src="python-ldap-3.4.5-1.red80.src.rpm">
					<filename>python3-ldap-0:3.4.5-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="python3-ldap" epoch="0" version="3.4.5" release="1.red80" arch="aarch64" src="python-ldap-3.4.5-1.red80.src.rpm">
					<filename>python3-ldap-0:3.4.5-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python-ldap-doc" epoch="0" version="3.4.5" release="1.red80" arch="noarch" src="python-ldap-3.4.5-1.red80.src.rpm">
					<filename>python-ldap-doc-0:3.4.5-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0015</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость libxslt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в libxslt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libxslt-cve-2025-11731-8.0/</description>
               <solution>Установить обновление для пакета(ов) libxslt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libxslt-cve-2025-11731-8.0/" type="self" id="ROS-20260129-80-0015" title="ROS-20260129-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11731" type="cve" id="CVE-2025-11731" title="CVE-2025-11731" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libxslt" epoch="0" version="1.1.43" release="4.red80" arch="x86_64" src="libxslt-1.1.43-4.red80.src.rpm">
					<filename>libxslt-0:1.1.43-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libxslt-devel" epoch="0" version="1.1.43" release="4.red80" arch="x86_64" src="libxslt-1.1.43-4.red80.src.rpm">
					<filename>libxslt-devel-0:1.1.43-4.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-libxslt" epoch="0" version="1.1.43" release="4.red80" arch="x86_64" src="libxslt-1.1.43-4.red80.src.rpm">
					<filename>python3-libxslt-0:1.1.43-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libxslt" epoch="0" version="1.1.43" release="4.red80" arch="aarch64" src="libxslt-1.1.43-4.red80.src.rpm">
					<filename>libxslt-0:1.1.43-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libxslt-devel" epoch="0" version="1.1.43" release="4.red80" arch="aarch64" src="libxslt-1.1.43-4.red80.src.rpm">
					<filename>libxslt-devel-0:1.1.43-4.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-libxslt" epoch="0" version="1.1.43" release="4.red80" arch="aarch64" src="libxslt-1.1.43-4.red80.src.rpm">
					<filename>python3-libxslt-0:1.1.43-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0016</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость ImageMagick </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в ImageMagick</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-imagemagick-cve-2025-62594-8.0/</description>
               <solution>Установить обновление для пакета(ов) ImageMagick
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-imagemagick-cve-2025-62594-8.0/" type="self" id="ROS-20260129-80-0016" title="ROS-20260129-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62594" type="cve" id="CVE-2025-62594" title="CVE-2025-62594" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="ImageMagick" epoch="1" version="7.1.2.3" release="4.red80" arch="x86_64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-1:7.1.2.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-c++" epoch="1" version="7.1.2.3" release="4.red80" arch="x86_64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-c++-1:7.1.2.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-c++-devel" epoch="1" version="7.1.2.3" release="4.red80" arch="x86_64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-c++-devel-1:7.1.2.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-devel" epoch="1" version="7.1.2.3" release="4.red80" arch="x86_64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-devel-1:7.1.2.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-djvu" epoch="1" version="7.1.2.3" release="4.red80" arch="x86_64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-djvu-1:7.1.2.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-doc" epoch="1" version="7.1.2.3" release="4.red80" arch="x86_64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-doc-1:7.1.2.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-heic" epoch="1" version="7.1.2.3" release="4.red80" arch="x86_64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-heic-1:7.1.2.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-libs" epoch="1" version="7.1.2.3" release="4.red80" arch="x86_64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-libs-1:7.1.2.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="ImageMagick-perl" epoch="1" version="7.1.2.3" release="4.red80" arch="x86_64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-perl-1:7.1.2.3-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="ImageMagick" epoch="1" version="7.1.2.3" release="4.red80" arch="aarch64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-1:7.1.2.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-c++" epoch="1" version="7.1.2.3" release="4.red80" arch="aarch64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-c++-1:7.1.2.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-c++-devel" epoch="1" version="7.1.2.3" release="4.red80" arch="aarch64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-c++-devel-1:7.1.2.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-devel" epoch="1" version="7.1.2.3" release="4.red80" arch="aarch64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-devel-1:7.1.2.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-djvu" epoch="1" version="7.1.2.3" release="4.red80" arch="aarch64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-djvu-1:7.1.2.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-doc" epoch="1" version="7.1.2.3" release="4.red80" arch="aarch64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-doc-1:7.1.2.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-heic" epoch="1" version="7.1.2.3" release="4.red80" arch="aarch64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-heic-1:7.1.2.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-libs" epoch="1" version="7.1.2.3" release="4.red80" arch="aarch64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-libs-1:7.1.2.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="ImageMagick-perl" epoch="1" version="7.1.2.3" release="4.red80" arch="aarch64" src="ImageMagick-7.1.2.3-4.red80.src.rpm">
					<filename>ImageMagick-perl-1:7.1.2.3-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0017</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-10922-8.0/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-10922-8.0/" type="self" id="ROS-20260129-80-0017" title="ROS-20260129-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10922" type="cve" id="CVE-2025-10922" title="CVE-2025-10922" />
			<reference href="https://bdu.fstec.ru/vul/2025-16064" type="self" id="BDU:2025-16064" title="BDU:2025-16064" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gimp" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.6" release="1.red80" arch="x86_64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gimp" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.6" release="1.red80" arch="aarch64" src="gimp-3.0.6-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0018</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость haproxy </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в haproxy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-haproxy-cve-2025-11230-8.0/</description>
               <solution>Установить обновление для пакета(ов) haproxy
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-haproxy-cve-2025-11230-8.0/" type="self" id="ROS-20260129-80-0018" title="ROS-20260129-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11230" type="cve" id="CVE-2025-11230" title="CVE-2025-11230" />
			<reference href="https://bdu.fstec.ru/vul/2025-13169" type="self" id="BDU:2025-13169" title="BDU:2025-13169" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="haproxy" epoch="0" version="3.2.7" release="1.red80" arch="x86_64" src="haproxy-3.2.7-1.red80.src.rpm">
					<filename>haproxy-0:3.2.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="haproxy" epoch="0" version="3.2.7" release="1.red80" arch="aarch64" src="haproxy-3.2.7-1.red80.src.rpm">
					<filename>haproxy-0:3.2.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0019</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость python-kdcproxy </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-kdcproxy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-kdcproxy-cve-2025-59089-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-kdcproxy
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-kdcproxy-cve-2025-59089-8.0/" type="self" id="ROS-20260129-80-0019" title="ROS-20260129-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59089" type="cve" id="CVE-2025-59089" title="CVE-2025-59089" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python3-kdcproxy" epoch="0" version="1.1.0" release="1.red80" arch="noarch" src="python-kdcproxy-1.1.0-1.red80.src.rpm">
					<filename>python3-kdcproxy-0:1.1.0-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0020</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость python-kdcproxy </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-kdcproxy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-kdcproxy-cve-2025-59088-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-kdcproxy
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-kdcproxy-cve-2025-59088-8.0/" type="self" id="ROS-20260129-80-0020" title="ROS-20260129-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59088" type="cve" id="CVE-2025-59088" title="CVE-2025-59088" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python3-kdcproxy" epoch="0" version="1.1.0" release="1.red80" arch="noarch" src="python-kdcproxy-1.1.0-1.red80.src.rpm">
					<filename>python3-kdcproxy-0:1.1.0-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0021</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql13 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql13-cve-2025-12817-8.0/</description>
               <solution>Установить обновление для пакета(ов) postgresql13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql13-cve-2025-12817-8.0/" type="self" id="ROS-20260129-80-0021" title="ROS-20260129-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12817" type="cve" id="CVE-2025-12817" title="CVE-2025-12817" />
			<reference href="https://bdu.fstec.ru/vul/2025-14083" type="self" id="BDU:2025-14083" title="BDU:2025-14083" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="postgresql13" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-contrib" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-contrib-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-devel" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-devel-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-docs" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-docs-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-libs" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-libs-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-llvmjit" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-llvmjit-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-plperl" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-plperl-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-plpython3" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-plpython3-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-pltcl" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-pltcl-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-server" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-server-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-test" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-test-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="postgresql13" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-contrib" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-contrib-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-devel" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-devel-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-docs" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-docs-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-libs" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-libs-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-llvmjit" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-llvmjit-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-plperl" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-plperl-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-plpython3" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-plpython3-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-pltcl" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-pltcl-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-server" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-server-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-test" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-test-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0022</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql-1c </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql-1c-cve-2025-12817-8.0/</description>
               <solution>Установить обновление для пакета(ов) postgresql-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql-1c-cve-2025-12817-8.0/" type="self" id="ROS-20260129-80-0022" title="ROS-20260129-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12817" type="cve" id="CVE-2025-12817" title="CVE-2025-12817" />
			<reference href="https://bdu.fstec.ru/vul/2025-14083" type="self" id="BDU:2025-14083" title="BDU:2025-14083" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="postgresql-1c" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-contrib" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-contrib-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-devel" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-devel-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-docs" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-docs-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-libs" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-libs-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-llvmjit" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-llvmjit-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-plperl" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-plperl-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-plpython3" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-plpython3-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-pltcl" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-pltcl-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-server" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-server-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-test" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-test-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="postgresql-1c" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-contrib" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-contrib-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-devel" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-devel-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-docs" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-docs-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-libs" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-libs-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-llvmjit" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-llvmjit-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-plperl" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-plperl-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-plpython3" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-plpython3-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-pltcl" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-pltcl-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-server" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-server-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-test" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-test-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0023</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql14 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql14</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql14-cve-2025-12817-8.0/</description>
               <solution>Установить обновление для пакета(ов) postgresql14
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql14-cve-2025-12817-8.0/" type="self" id="ROS-20260129-80-0023" title="ROS-20260129-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12817" type="cve" id="CVE-2025-12817" title="CVE-2025-12817" />
			<reference href="https://bdu.fstec.ru/vul/2025-14083" type="self" id="BDU:2025-14083" title="BDU:2025-14083" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="postgresql14" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-contrib" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-contrib-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-devel" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-devel-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-docs" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-docs-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-libs" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-libs-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-llvmjit" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-llvmjit-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-plperl" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-plperl-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-plpython3" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-plpython3-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-pltcl" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-pltcl-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-server" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-server-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-test" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-test-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="postgresql14" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-contrib" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-contrib-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-devel" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-devel-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-docs" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-docs-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-libs" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-libs-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-llvmjit" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-llvmjit-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-plperl" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-plperl-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-plpython3" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-plpython3-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-pltcl" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-pltcl-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-server" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-server-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-test" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-test-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0024</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql15-1c </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql15-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql15-1c-cve-2025-12817-8.0/</description>
               <solution>Установить обновление для пакета(ов) postgresql15-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql15-1c-cve-2025-12817-8.0/" type="self" id="ROS-20260129-80-0024" title="ROS-20260129-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12817" type="cve" id="CVE-2025-12817" title="CVE-2025-12817" />
			<reference href="https://bdu.fstec.ru/vul/2025-14083" type="self" id="BDU:2025-14083" title="BDU:2025-14083" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="postgresql15-1c" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-contrib" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-contrib-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-devel" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-devel-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-docs" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-docs-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-libs" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-libs-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-llvmjit" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-llvmjit-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plperl" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-plperl-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plpython3" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-plpython3-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-pltcl" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-pltcl-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-server" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-server-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-test" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-test-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="postgresql15-1c" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-contrib" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-contrib-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-devel" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-devel-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-docs" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-docs-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-libs" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-libs-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-llvmjit" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-llvmjit-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plperl" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-plperl-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plpython3" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-plpython3-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-pltcl" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-pltcl-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-server" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-server-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-test" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-test-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0025</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql15 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql15-cve-2025-12817-8.0/</description>
               <solution>Установить обновление для пакета(ов) postgresql15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql15-cve-2025-12817-8.0/" type="self" id="ROS-20260129-80-0025" title="ROS-20260129-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12817" type="cve" id="CVE-2025-12817" title="CVE-2025-12817" />
			<reference href="https://bdu.fstec.ru/vul/2025-14083" type="self" id="BDU:2025-14083" title="BDU:2025-14083" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="postgresql15" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-contrib" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-contrib-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-devel" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-devel-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-docs" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-docs-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-libs" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-libs-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-llvmjit" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-llvmjit-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-plperl" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-plperl-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-plpython3" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-plpython3-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-pltcl" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-pltcl-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-server" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-server-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-test" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-test-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="postgresql15" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-contrib" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-contrib-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-devel" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-devel-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-docs" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-docs-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-libs" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-libs-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-llvmjit" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-llvmjit-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-plperl" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-plperl-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-plpython3" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-plpython3-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-pltcl" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-pltcl-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-server" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-server-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-test" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-test-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0026</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql16 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql16</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql16-cve-2025-12817-8.0/</description>
               <solution>Установить обновление для пакета(ов) postgresql16
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql16-cve-2025-12817-8.0/" type="self" id="ROS-20260129-80-0026" title="ROS-20260129-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12817" type="cve" id="CVE-2025-12817" title="CVE-2025-12817" />
			<reference href="https://bdu.fstec.ru/vul/2025-14083" type="self" id="BDU:2025-14083" title="BDU:2025-14083" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="postgresql16" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-contrib" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-contrib-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-devel" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-devel-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-docs" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-docs-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-libs" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-libs-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-llvmjit" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-llvmjit-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-plperl" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-plperl-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-plpython3" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-plpython3-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-pltcl" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-pltcl-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-server" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-server-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-test" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-test-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="postgresql16" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-contrib" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-contrib-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-devel" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-devel-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-docs" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-docs-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-libs" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-libs-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-llvmjit" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-llvmjit-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-plperl" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-plperl-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-plpython3" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-plpython3-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-pltcl" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-pltcl-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-server" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-server-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-test" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-test-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0027</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql-cve-2025-12817-8.0/</description>
               <solution>Установить обновление для пакета(ов) postgresql
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql-cve-2025-12817-8.0/" type="self" id="ROS-20260129-80-0027" title="ROS-20260129-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12817" type="cve" id="CVE-2025-12817" title="CVE-2025-12817" />
			<reference href="https://bdu.fstec.ru/vul/2025-14083" type="self" id="BDU:2025-14083" title="BDU:2025-14083" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="postgresql" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-contrib" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-contrib-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-docs" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-docs-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-llvmjit" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-llvmjit-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-plperl" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-plperl-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-plpython3" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-plpython3-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-pltcl" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-pltcl-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-private-devel" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-private-devel-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-private-libs" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-private-libs-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-server" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-server-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-server-devel" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-server-devel-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-static" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-static-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-test" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-test-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-upgrade" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-upgrade-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-upgrade-devel" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-upgrade-devel-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="postgresql" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-contrib" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-contrib-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-docs" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-docs-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-llvmjit" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-llvmjit-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-plperl" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-plperl-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-plpython3" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-plpython3-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-pltcl" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-pltcl-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-private-devel" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-private-devel-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-private-libs" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-private-libs-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-server" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-server-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-server-devel" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-server-devel-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-static" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-static-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-test" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-test-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-upgrade" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-upgrade-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-upgrade-devel" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-upgrade-devel-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="postgresql-test-rpm-macros" epoch="0" version="16.11" release="1.red80" arch="noarch" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-test-rpm-macros-0:16.11-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0028</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql17-1c </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql17-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql17-1c-cve-2025-12817-8.0/</description>
               <solution>Установить обновление для пакета(ов) postgresql17-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql17-1c-cve-2025-12817-8.0/" type="self" id="ROS-20260129-80-0028" title="ROS-20260129-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12817" type="cve" id="CVE-2025-12817" title="CVE-2025-12817" />
			<reference href="https://bdu.fstec.ru/vul/2025-14083" type="self" id="BDU:2025-14083" title="BDU:2025-14083" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="postgresql17-1c" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-contrib" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-contrib-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-devel" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-devel-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-docs" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-docs-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-libs" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-libs-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-llvmjit" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-llvmjit-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plperl" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-plperl-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plpython3" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-plpython3-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-pltcl" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-pltcl-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-server" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-server-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-test" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-test-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="postgresql17-1c" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-contrib" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-contrib-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-devel" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-devel-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-docs" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-docs-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-libs" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-libs-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-llvmjit" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-llvmjit-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plperl" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-plperl-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plpython3" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-plpython3-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-pltcl" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-pltcl-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-server" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-server-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-test" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-test-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0029</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql17 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в postgresql17</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql17-cve-2025-12817-8.0/</description>
               <solution>Установить обновление для пакета(ов) postgresql17
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql17-cve-2025-12817-8.0/" type="self" id="ROS-20260129-80-0029" title="ROS-20260129-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12817" type="cve" id="CVE-2025-12817" title="CVE-2025-12817" />
			<reference href="https://bdu.fstec.ru/vul/2025-14083" type="self" id="BDU:2025-14083" title="BDU:2025-14083" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="postgresql17" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-contrib" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-contrib-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-devel" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-devel-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-docs" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-docs-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-libs" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-libs-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-llvmjit" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-llvmjit-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-plperl" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-plperl-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-plpython3" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-plpython3-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-pltcl" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-pltcl-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-server" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-server-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-test" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-test-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="postgresql17" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-contrib" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-contrib-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-devel" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-devel-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-docs" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-docs-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-libs" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-libs-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-llvmjit" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-llvmjit-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-plperl" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-plperl-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-plpython3" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-plpython3-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-pltcl" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-pltcl-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-server" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-server-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-test" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-test-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0030</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql13 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql13-cve-2025-12818-8.0/</description>
               <solution>Установить обновление для пакета(ов) postgresql13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql13-cve-2025-12818-8.0/" type="self" id="ROS-20260129-80-0030" title="ROS-20260129-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12818" type="cve" id="CVE-2025-12818" title="CVE-2025-12818" />
			<reference href="https://bdu.fstec.ru/vul/2025-13962" type="self" id="BDU:2025-13962" title="BDU:2025-13962" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="postgresql13" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-contrib" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-contrib-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-devel" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-devel-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-docs" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-docs-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-libs" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-libs-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-llvmjit" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-llvmjit-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-plperl" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-plperl-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-plpython3" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-plpython3-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-pltcl" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-pltcl-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-server" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-server-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql13-test" epoch="0" version="13.23" release="1.red80" arch="x86_64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-test-0:13.23-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="postgresql13" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-contrib" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-contrib-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-devel" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-devel-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-docs" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-docs-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-libs" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-libs-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-llvmjit" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-llvmjit-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-plperl" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-plperl-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-plpython3" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-plpython3-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-pltcl" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-pltcl-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-server" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-server-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql13-test" epoch="0" version="13.23" release="1.red80" arch="aarch64" src="postgresql13-13.23-1.red80.src.rpm">
					<filename>postgresql13-test-0:13.23-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0031</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql14 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql14</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql14-cve-2025-12818-8.0/</description>
               <solution>Установить обновление для пакета(ов) postgresql14
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql14-cve-2025-12818-8.0/" type="self" id="ROS-20260129-80-0031" title="ROS-20260129-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12818" type="cve" id="CVE-2025-12818" title="CVE-2025-12818" />
			<reference href="https://bdu.fstec.ru/vul/2025-13962" type="self" id="BDU:2025-13962" title="BDU:2025-13962" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="postgresql14" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-contrib" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-contrib-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-devel" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-devel-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-docs" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-docs-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-libs" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-libs-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-llvmjit" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-llvmjit-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-plperl" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-plperl-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-plpython3" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-plpython3-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-pltcl" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-pltcl-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-server" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-server-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql14-test" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-test-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="postgresql14" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-contrib" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-contrib-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-devel" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-devel-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-docs" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-docs-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-libs" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-libs-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-llvmjit" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-llvmjit-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-plperl" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-plperl-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-plpython3" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-plpython3-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-pltcl" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-pltcl-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-server" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-server-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql14-test" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql14-14.20-1.red80.src.rpm">
					<filename>postgresql14-test-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0032</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql-1c </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql-1c-cve-2025-12818-8.0/</description>
               <solution>Установить обновление для пакета(ов) postgresql-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql-1c-cve-2025-12818-8.0/" type="self" id="ROS-20260129-80-0032" title="ROS-20260129-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12818" type="cve" id="CVE-2025-12818" title="CVE-2025-12818" />
			<reference href="https://bdu.fstec.ru/vul/2025-13962" type="self" id="BDU:2025-13962" title="BDU:2025-13962" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="postgresql-1c" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-contrib" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-contrib-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-devel" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-devel-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-docs" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-docs-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-libs" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-libs-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-llvmjit" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-llvmjit-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-plperl" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-plperl-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-plpython3" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-plpython3-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-pltcl" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-pltcl-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-server" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-server-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-1c-test" epoch="0" version="14.20" release="1.red80" arch="x86_64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-test-0:14.20-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="postgresql-1c" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-contrib" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-contrib-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-devel" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-devel-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-docs" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-docs-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-libs" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-libs-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-llvmjit" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-llvmjit-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-plperl" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-plperl-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-plpython3" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-plpython3-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-pltcl" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-pltcl-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-server" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-server-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-1c-test" epoch="0" version="14.20" release="1.red80" arch="aarch64" src="postgresql-1c-14.20-1.red80.src.rpm">
					<filename>postgresql-1c-test-0:14.20-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0033</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql15 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql15-cve-2025-12818-8.0/</description>
               <solution>Установить обновление для пакета(ов) postgresql15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql15-cve-2025-12818-8.0/" type="self" id="ROS-20260129-80-0033" title="ROS-20260129-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12818" type="cve" id="CVE-2025-12818" title="CVE-2025-12818" />
			<reference href="https://bdu.fstec.ru/vul/2025-13962" type="self" id="BDU:2025-13962" title="BDU:2025-13962" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="postgresql15" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-contrib" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-contrib-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-devel" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-devel-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-docs" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-docs-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-libs" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-libs-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-llvmjit" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-llvmjit-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-plperl" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-plperl-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-plpython3" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-plpython3-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-pltcl" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-pltcl-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-server" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-server-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-test" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-test-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="postgresql15" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-contrib" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-contrib-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-devel" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-devel-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-docs" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-docs-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-libs" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-libs-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-llvmjit" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-llvmjit-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-plperl" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-plperl-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-plpython3" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-plpython3-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-pltcl" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-pltcl-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-server" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-server-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-test" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-15.15-1.red80.src.rpm">
					<filename>postgresql15-test-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0034</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql15-1c </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql15-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql15-1c-cve-2025-12818-8.0/</description>
               <solution>Установить обновление для пакета(ов) postgresql15-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql15-1c-cve-2025-12818-8.0/" type="self" id="ROS-20260129-80-0034" title="ROS-20260129-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12818" type="cve" id="CVE-2025-12818" title="CVE-2025-12818" />
			<reference href="https://bdu.fstec.ru/vul/2025-13962" type="self" id="BDU:2025-13962" title="BDU:2025-13962" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="postgresql15-1c" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-contrib" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-contrib-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-devel" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-devel-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-docs" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-docs-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-libs" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-libs-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-llvmjit" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-llvmjit-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plperl" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-plperl-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plpython3" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-plpython3-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-pltcl" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-pltcl-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-server" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-server-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql15-1c-test" epoch="0" version="15.15" release="1.red80" arch="x86_64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-test-0:15.15-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="postgresql15-1c" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-contrib" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-contrib-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-devel" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-devel-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-docs" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-docs-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-libs" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-libs-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-llvmjit" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-llvmjit-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plperl" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-plperl-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-plpython3" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-plpython3-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-pltcl" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-pltcl-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-server" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-server-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql15-1c-test" epoch="0" version="15.15" release="1.red80" arch="aarch64" src="postgresql15-1c-15.15-1.red80.src.rpm">
					<filename>postgresql15-1c-test-0:15.15-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0035</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql16 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql16</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql16-cve-2025-12818-8.0/</description>
               <solution>Установить обновление для пакета(ов) postgresql16
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql16-cve-2025-12818-8.0/" type="self" id="ROS-20260129-80-0035" title="ROS-20260129-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12818" type="cve" id="CVE-2025-12818" title="CVE-2025-12818" />
			<reference href="https://bdu.fstec.ru/vul/2025-13962" type="self" id="BDU:2025-13962" title="BDU:2025-13962" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="postgresql16" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-contrib" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-contrib-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-devel" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-devel-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-docs" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-docs-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-libs" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-libs-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-llvmjit" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-llvmjit-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-plperl" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-plperl-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-plpython3" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-plpython3-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-pltcl" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-pltcl-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-server" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-server-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql16-test" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-test-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="postgresql16" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-contrib" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-contrib-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-devel" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-devel-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-docs" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-docs-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-libs" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-libs-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-llvmjit" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-llvmjit-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-plperl" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-plperl-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-plpython3" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-plpython3-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-pltcl" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-pltcl-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-server" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-server-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql16-test" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql16-16.11-1.red80.src.rpm">
					<filename>postgresql16-test-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0036</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql17 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql17</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql17-cve-2025-12818-8.0/</description>
               <solution>Установить обновление для пакета(ов) postgresql17
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql17-cve-2025-12818-8.0/" type="self" id="ROS-20260129-80-0036" title="ROS-20260129-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12818" type="cve" id="CVE-2025-12818" title="CVE-2025-12818" />
			<reference href="https://bdu.fstec.ru/vul/2025-13962" type="self" id="BDU:2025-13962" title="BDU:2025-13962" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="postgresql17" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-contrib" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-contrib-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-devel" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-devel-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-docs" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-docs-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-libs" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-libs-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-llvmjit" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-llvmjit-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-plperl" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-plperl-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-plpython3" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-plpython3-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-pltcl" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-pltcl-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-server" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-server-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-test" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-test-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="postgresql17" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-contrib" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-contrib-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-devel" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-devel-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-docs" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-docs-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-libs" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-libs-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-llvmjit" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-llvmjit-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-plperl" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-plperl-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-plpython3" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-plpython3-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-pltcl" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-pltcl-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-server" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-server-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-test" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-17.7-1.red80.src.rpm">
					<filename>postgresql17-test-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0037</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql-cve-2025-12818-8.0/</description>
               <solution>Установить обновление для пакета(ов) postgresql
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql-cve-2025-12818-8.0/" type="self" id="ROS-20260129-80-0037" title="ROS-20260129-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12818" type="cve" id="CVE-2025-12818" title="CVE-2025-12818" />
			<reference href="https://bdu.fstec.ru/vul/2025-13962" type="self" id="BDU:2025-13962" title="BDU:2025-13962" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="postgresql" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-contrib" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-contrib-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-docs" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-docs-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-llvmjit" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-llvmjit-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-plperl" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-plperl-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-plpython3" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-plpython3-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-pltcl" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-pltcl-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-private-devel" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-private-devel-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-private-libs" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-private-libs-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-server" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-server-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-server-devel" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-server-devel-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-static" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-static-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-test" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-test-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-upgrade" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-upgrade-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql-upgrade-devel" epoch="0" version="16.11" release="1.red80" arch="x86_64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-upgrade-devel-0:16.11-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="postgresql" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-contrib" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-contrib-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-docs" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-docs-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-llvmjit" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-llvmjit-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-plperl" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-plperl-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-plpython3" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-plpython3-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-pltcl" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-pltcl-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-private-devel" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-private-devel-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-private-libs" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-private-libs-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-server" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-server-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-server-devel" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-server-devel-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-static" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-static-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-test" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-test-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-upgrade" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-upgrade-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql-upgrade-devel" epoch="0" version="16.11" release="1.red80" arch="aarch64" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-upgrade-devel-0:16.11-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="postgresql-test-rpm-macros" epoch="0" version="16.11" release="1.red80" arch="noarch" src="postgresql-16.11-1.red80.src.rpm">
					<filename>postgresql-test-rpm-macros-0:16.11-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0038</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость postgresql17-1c </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в postgresql17-1c</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql17-1c-cve-2025-12818-8.0/</description>
               <solution>Установить обновление для пакета(ов) postgresql17-1c
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-postgresql17-1c-cve-2025-12818-8.0/" type="self" id="ROS-20260129-80-0038" title="ROS-20260129-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12818" type="cve" id="CVE-2025-12818" title="CVE-2025-12818" />
			<reference href="https://bdu.fstec.ru/vul/2025-13962" type="self" id="BDU:2025-13962" title="BDU:2025-13962" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="postgresql17-1c" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-contrib" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-contrib-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-devel" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-devel-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-docs" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-docs-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-libs" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-libs-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-llvmjit" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-llvmjit-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plperl" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-plperl-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plpython3" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-plpython3-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-pltcl" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-pltcl-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-server" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-server-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="postgresql17-1c-test" epoch="0" version="17.7" release="1.red80" arch="x86_64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-test-0:17.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="postgresql17-1c" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-contrib" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-contrib-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-devel" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-devel-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-docs" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-docs-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-libs" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-libs-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-llvmjit" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-llvmjit-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plperl" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-plperl-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-plpython3" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-plpython3-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-pltcl" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-pltcl-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-server" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-server-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="postgresql17-1c-test" epoch="0" version="17.7" release="1.red80" arch="aarch64" src="postgresql17-1c-17.7-1.red80.src.rpm">
					<filename>postgresql17-1c-test-0:17.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0039</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-django-cve-2025-13372-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-django-cve-2025-13372-8.0/" type="self" id="ROS-20260129-80-0039" title="ROS-20260129-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13372" type="cve" id="CVE-2025-13372" title="CVE-2025-13372" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.27" release="1.red80" arch="noarch" src="python-django-4.2.27-1.red80.src.rpm">
					<filename>python-django-bash-completion-0:4.2.27-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.27" release="1.red80" arch="noarch" src="python-django-4.2.27-1.red80.src.rpm">
					<filename>python3-django-0:4.2.27-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.27" release="1.red80" arch="noarch" src="python-django-4.2.27-1.red80.src.rpm">
					<filename>python3-django-doc-0:4.2.27-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0040</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость python-django5 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-django5</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-django5-cve-2025-13372-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-django5
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-django5-cve-2025-13372-8.0/" type="self" id="ROS-20260129-80-0040" title="ROS-20260129-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13372" type="cve" id="CVE-2025-13372" title="CVE-2025-13372" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python3-django5" epoch="0" version="5.2.9" release="1.red80" arch="noarch" src="python-django5-5.2.9-1.red80.src.rpm">
					<filename>python3-django5-0:5.2.9-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-django5-bash-completion" epoch="0" version="5.2.9" release="1.red80" arch="noarch" src="python-django5-5.2.9-1.red80.src.rpm">
					<filename>python3-django5-bash-completion-0:5.2.9-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-django5-doc" epoch="0" version="5.2.9" release="1.red80" arch="noarch" src="python-django5-5.2.9-1.red80.src.rpm">
					<filename>python3-django5-doc-0:5.2.9-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0041</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость nextcloud </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nextcloud-cve-2025-66552-8.0/</description>
               <solution>Установить обновление для пакета(ов) nextcloud
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nextcloud-cve-2025-66552-8.0/" type="self" id="ROS-20260129-80-0041" title="ROS-20260129-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66552" type="cve" id="CVE-2025-66552" title="CVE-2025-66552" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="nextcloud" epoch="0" version="32.0.3" release="2.red80" arch="noarch" src="nextcloud-32.0.3-2.red80.src.rpm">
					<filename>nextcloud-0:32.0.3-2.red80.noarch.rpm</filename>
				</package>
				<package name="nextcloud-httpd" epoch="0" version="32.0.3" release="2.red80" arch="noarch" src="nextcloud-32.0.3-2.red80.src.rpm">
					<filename>nextcloud-httpd-0:32.0.3-2.red80.noarch.rpm</filename>
				</package>
				<package name="nextcloud-mysql" epoch="0" version="32.0.3" release="2.red80" arch="noarch" src="nextcloud-32.0.3-2.red80.src.rpm">
					<filename>nextcloud-mysql-0:32.0.3-2.red80.noarch.rpm</filename>
				</package>
				<package name="nextcloud-nginx" epoch="0" version="32.0.3" release="2.red80" arch="noarch" src="nextcloud-32.0.3-2.red80.src.rpm">
					<filename>nextcloud-nginx-0:32.0.3-2.red80.noarch.rpm</filename>
				</package>
				<package name="nextcloud-postgresql" epoch="0" version="32.0.3" release="2.red80" arch="noarch" src="nextcloud-32.0.3-2.red80.src.rpm">
					<filename>nextcloud-postgresql-0:32.0.3-2.red80.noarch.rpm</filename>
				</package>
				<package name="nextcloud-sqlite" epoch="0" version="32.0.3" release="2.red80" arch="noarch" src="nextcloud-32.0.3-2.red80.src.rpm">
					<filename>nextcloud-sqlite-0:32.0.3-2.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0042</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость nextcloud </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nextcloud-cve-2025-66510-8.0/</description>
               <solution>Установить обновление для пакета(ов) nextcloud
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nextcloud-cve-2025-66510-8.0/" type="self" id="ROS-20260129-80-0042" title="ROS-20260129-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66510" type="cve" id="CVE-2025-66510" title="CVE-2025-66510" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="nextcloud" epoch="0" version="32.0.3" release="3.red80" arch="noarch" src="nextcloud-32.0.3-3.red80.src.rpm">
					<filename>nextcloud-0:32.0.3-3.red80.noarch.rpm</filename>
				</package>
				<package name="nextcloud-httpd" epoch="0" version="32.0.3" release="3.red80" arch="noarch" src="nextcloud-32.0.3-3.red80.src.rpm">
					<filename>nextcloud-httpd-0:32.0.3-3.red80.noarch.rpm</filename>
				</package>
				<package name="nextcloud-mysql" epoch="0" version="32.0.3" release="3.red80" arch="noarch" src="nextcloud-32.0.3-3.red80.src.rpm">
					<filename>nextcloud-mysql-0:32.0.3-3.red80.noarch.rpm</filename>
				</package>
				<package name="nextcloud-nginx" epoch="0" version="32.0.3" release="3.red80" arch="noarch" src="nextcloud-32.0.3-3.red80.src.rpm">
					<filename>nextcloud-nginx-0:32.0.3-3.red80.noarch.rpm</filename>
				</package>
				<package name="nextcloud-postgresql" epoch="0" version="32.0.3" release="3.red80" arch="noarch" src="nextcloud-32.0.3-3.red80.src.rpm">
					<filename>nextcloud-postgresql-0:32.0.3-3.red80.noarch.rpm</filename>
				</package>
				<package name="nextcloud-sqlite" epoch="0" version="32.0.3" release="3.red80" arch="noarch" src="nextcloud-32.0.3-3.red80.src.rpm">
					<filename>nextcloud-sqlite-0:32.0.3-3.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0043</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость nextcloud </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nextcloud-cve-2025-66547-8.0/</description>
               <solution>Установить обновление для пакета(ов) nextcloud
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nextcloud-cve-2025-66547-8.0/" type="self" id="ROS-20260129-80-0043" title="ROS-20260129-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66547" type="cve" id="CVE-2025-66547" title="CVE-2025-66547" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="nextcloud" epoch="0" version="32.0.3" release="3.red80" arch="noarch" src="nextcloud-32.0.3-3.red80.src.rpm">
					<filename>nextcloud-0:32.0.3-3.red80.noarch.rpm</filename>
				</package>
				<package name="nextcloud-httpd" epoch="0" version="32.0.3" release="3.red80" arch="noarch" src="nextcloud-32.0.3-3.red80.src.rpm">
					<filename>nextcloud-httpd-0:32.0.3-3.red80.noarch.rpm</filename>
				</package>
				<package name="nextcloud-mysql" epoch="0" version="32.0.3" release="3.red80" arch="noarch" src="nextcloud-32.0.3-3.red80.src.rpm">
					<filename>nextcloud-mysql-0:32.0.3-3.red80.noarch.rpm</filename>
				</package>
				<package name="nextcloud-nginx" epoch="0" version="32.0.3" release="3.red80" arch="noarch" src="nextcloud-32.0.3-3.red80.src.rpm">
					<filename>nextcloud-nginx-0:32.0.3-3.red80.noarch.rpm</filename>
				</package>
				<package name="nextcloud-postgresql" epoch="0" version="32.0.3" release="3.red80" arch="noarch" src="nextcloud-32.0.3-3.red80.src.rpm">
					<filename>nextcloud-postgresql-0:32.0.3-3.red80.noarch.rpm</filename>
				</package>
				<package name="nextcloud-sqlite" epoch="0" version="32.0.3" release="3.red80" arch="noarch" src="nextcloud-32.0.3-3.red80.src.rpm">
					<filename>nextcloud-sqlite-0:32.0.3-3.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0044</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость nextcloud-app-calendar </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud-app-calendar</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nextcloud-app-calendar-cve-2025-66550-8.0/</description>
               <solution>Установить обновление для пакета(ов) nextcloud-app-calendar
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nextcloud-app-calendar-cve-2025-66550-8.0/" type="self" id="ROS-20260129-80-0044" title="ROS-20260129-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66550" type="cve" id="CVE-2025-66550" title="CVE-2025-66550" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="nextcloud-app-calendar" epoch="0" version="6.1.2" release="1.red80" arch="noarch" src="nextcloud-app-calendar-6.1.2-1.red80.src.rpm">
					<filename>nextcloud-app-calendar-0:6.1.2-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0045</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость nextcloud-app-calendar </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud-app-calendar</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nextcloud-app-calendar-cve-2025-66511-8.0/</description>
               <solution>Установить обновление для пакета(ов) nextcloud-app-calendar
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nextcloud-app-calendar-cve-2025-66511-8.0/" type="self" id="ROS-20260129-80-0045" title="ROS-20260129-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66511" type="cve" id="CVE-2025-66511" title="CVE-2025-66511" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="nextcloud-app-calendar" epoch="0" version="6.1.2" release="1.red80" arch="noarch" src="nextcloud-app-calendar-6.1.2-1.red80.src.rpm">
					<filename>nextcloud-app-calendar-0:6.1.2-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0046</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость nextcloud-app-contacts </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud-app-contacts</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nextcloud-app-contacts-cve-2025-66554-8.0/</description>
               <solution>Установить обновление для пакета(ов) nextcloud-app-contacts
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nextcloud-app-contacts-cve-2025-66554-8.0/" type="self" id="ROS-20260129-80-0046" title="ROS-20260129-80-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66554" type="cve" id="CVE-2025-66554" title="CVE-2025-66554" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="nextcloud-app-contacts" epoch="0" version="7.3.9" release="1.red80" arch="noarch" src="nextcloud-app-contacts-7.3.9-1.red80.src.rpm">
					<filename>nextcloud-app-contacts-0:7.3.9-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0047</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-14331-8.0/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-14331-8.0/" type="self" id="ROS-20260129-80-0047" title="ROS-20260129-80-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14331" type="cve" id="CVE-2025-14331" title="CVE-2025-14331" />
			<reference href="https://bdu.fstec.ru/vul/2025-16360" type="self" id="BDU:2025-16360" title="BDU:2025-16360" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="firefox" epoch="0" version="115.31.0" release="1.red80" arch="x86_64" src="firefox-115.31.0-1.red80.src.rpm">
					<filename>firefox-0:115.31.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="firefox" epoch="0" version="115.31.0" release="1.red80" arch="aarch64" src="firefox-115.31.0-1.red80.src.rpm">
					<filename>firefox-0:115.31.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0048</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-14322-8.0/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-14322-8.0/" type="self" id="ROS-20260129-80-0048" title="ROS-20260129-80-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14322" type="cve" id="CVE-2025-14322" title="CVE-2025-14322" />
			<reference href="https://bdu.fstec.ru/vul/2025-15639" type="self" id="BDU:2025-15639" title="BDU:2025-15639" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="firefox" epoch="0" version="115.31.0" release="1.red80" arch="x86_64" src="firefox-115.31.0-1.red80.src.rpm">
					<filename>firefox-0:115.31.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="firefox" epoch="0" version="115.31.0" release="1.red80" arch="aarch64" src="firefox-115.31.0-1.red80.src.rpm">
					<filename>firefox-0:115.31.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0049</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-14323-8.0/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-14323-8.0/" type="self" id="ROS-20260129-80-0049" title="ROS-20260129-80-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14323" type="cve" id="CVE-2025-14323" title="CVE-2025-14323" />
			<reference href="https://bdu.fstec.ru/vul/2025-15641" type="self" id="BDU:2025-15641" title="BDU:2025-15641" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="firefox" epoch="0" version="115.31.0" release="1.red80" arch="x86_64" src="firefox-115.31.0-1.red80.src.rpm">
					<filename>firefox-0:115.31.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="firefox" epoch="0" version="115.31.0" release="1.red80" arch="aarch64" src="firefox-115.31.0-1.red80.src.rpm">
					<filename>firefox-0:115.31.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0050</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-14324-8.0/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-14324-8.0/" type="self" id="ROS-20260129-80-0050" title="ROS-20260129-80-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14324" type="cve" id="CVE-2025-14324" title="CVE-2025-14324" />
			<reference href="https://bdu.fstec.ru/vul/2025-15640" type="self" id="BDU:2025-15640" title="BDU:2025-15640" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="firefox" epoch="0" version="115.31.0" release="1.red80" arch="x86_64" src="firefox-115.31.0-1.red80.src.rpm">
					<filename>firefox-0:115.31.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="firefox" epoch="0" version="115.31.0" release="1.red80" arch="aarch64" src="firefox-115.31.0-1.red80.src.rpm">
					<filename>firefox-0:115.31.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0051</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость mariadb </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в mariadb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mariadb-cve-2025-13699-8.0/</description>
               <solution>Установить обновление для пакета(ов) mariadb
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mariadb-cve-2025-13699-8.0/" type="self" id="ROS-20260129-80-0051" title="ROS-20260129-80-0051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13699" type="cve" id="CVE-2025-13699" title="CVE-2025-13699" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="mariadb" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-backup" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-backup-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-common" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-common-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-connect-engine" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-connect-engine-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-cracklib-password-check" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-cracklib-password-check-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-devel" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-devel-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-embedded" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-embedded-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-embedded-devel" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-embedded-devel-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-errmsg" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-errmsg-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-gssapi-server" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-gssapi-server-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-oqgraph-engine" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-oqgraph-engine-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-rocksdb-engine" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-rocksdb-engine-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-s3-engine" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-s3-engine-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-server" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-server-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-server-galera" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-server-galera-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-server-utils" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-server-utils-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-sphinx-engine" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-sphinx-engine-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-test" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-test-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="mariadb" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-backup" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-backup-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-common" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-common-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-connect-engine" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-connect-engine-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-cracklib-password-check" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-cracklib-password-check-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-devel" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-devel-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-embedded" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-embedded-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-embedded-devel" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-embedded-devel-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-errmsg" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-errmsg-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-gssapi-server" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-gssapi-server-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-oqgraph-engine" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-oqgraph-engine-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-s3-engine" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-s3-engine-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-server" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-server-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-server-galera" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-server-galera-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-server-utils" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-server-utils-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-sphinx-engine" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-sphinx-engine-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-test" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-test-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0052</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость mariadb10.6 </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в mariadb10.6</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mariadb10-6-cve-2025-13699-8.0/</description>
               <solution>Установить обновление для пакета(ов) mariadb10.6
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mariadb10-6-cve-2025-13699-8.0/" type="self" id="ROS-20260129-80-0052" title="ROS-20260129-80-0052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13699" type="cve" id="CVE-2025-13699" title="CVE-2025-13699" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="mariadb10.6" epoch="3" version="10.6.24" release="1.red80" arch="x86_64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-3:10.6.24-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-backup" epoch="3" version="10.6.24" release="1.red80" arch="x86_64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-backup-3:10.6.24-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-common" epoch="3" version="10.6.24" release="1.red80" arch="x86_64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-common-3:10.6.24-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-connect-engine" epoch="3" version="10.6.24" release="1.red80" arch="x86_64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-connect-engine-3:10.6.24-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-cracklib-password-check" epoch="3" version="10.6.24" release="1.red80" arch="x86_64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-cracklib-password-check-3:10.6.24-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-devel" epoch="3" version="10.6.24" release="1.red80" arch="x86_64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-devel-3:10.6.24-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-embedded" epoch="3" version="10.6.24" release="1.red80" arch="x86_64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-embedded-3:10.6.24-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-embedded-devel" epoch="3" version="10.6.24" release="1.red80" arch="x86_64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-embedded-devel-3:10.6.24-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-errmsg" epoch="3" version="10.6.24" release="1.red80" arch="x86_64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-errmsg-3:10.6.24-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-gssapi-server" epoch="3" version="10.6.24" release="1.red80" arch="x86_64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-gssapi-server-3:10.6.24-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-oqgraph-engine" epoch="3" version="10.6.24" release="1.red80" arch="x86_64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-oqgraph-engine-3:10.6.24-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-rocksdb-engine" epoch="3" version="10.6.24" release="1.red80" arch="x86_64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-rocksdb-engine-3:10.6.24-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-s3-engine" epoch="3" version="10.6.24" release="1.red80" arch="x86_64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-s3-engine-3:10.6.24-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-server" epoch="3" version="10.6.24" release="1.red80" arch="x86_64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-server-3:10.6.24-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-server-galera" epoch="3" version="10.6.24" release="1.red80" arch="x86_64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-server-galera-3:10.6.24-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-server-utils" epoch="3" version="10.6.24" release="1.red80" arch="x86_64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-server-utils-3:10.6.24-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-sphinx-engine" epoch="3" version="10.6.24" release="1.red80" arch="x86_64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-sphinx-engine-3:10.6.24-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb10.6-test" epoch="3" version="10.6.24" release="1.red80" arch="x86_64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-test-3:10.6.24-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="mariadb10.6" epoch="3" version="10.6.24" release="1.red80" arch="aarch64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-3:10.6.24-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb10.6-backup" epoch="3" version="10.6.24" release="1.red80" arch="aarch64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-backup-3:10.6.24-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb10.6-common" epoch="3" version="10.6.24" release="1.red80" arch="aarch64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-common-3:10.6.24-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb10.6-connect-engine" epoch="3" version="10.6.24" release="1.red80" arch="aarch64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-connect-engine-3:10.6.24-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb10.6-cracklib-password-check" epoch="3" version="10.6.24" release="1.red80" arch="aarch64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-cracklib-password-check-3:10.6.24-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb10.6-devel" epoch="3" version="10.6.24" release="1.red80" arch="aarch64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-devel-3:10.6.24-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb10.6-embedded" epoch="3" version="10.6.24" release="1.red80" arch="aarch64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-embedded-3:10.6.24-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb10.6-embedded-devel" epoch="3" version="10.6.24" release="1.red80" arch="aarch64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-embedded-devel-3:10.6.24-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb10.6-errmsg" epoch="3" version="10.6.24" release="1.red80" arch="aarch64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-errmsg-3:10.6.24-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb10.6-gssapi-server" epoch="3" version="10.6.24" release="1.red80" arch="aarch64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-gssapi-server-3:10.6.24-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb10.6-oqgraph-engine" epoch="3" version="10.6.24" release="1.red80" arch="aarch64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-oqgraph-engine-3:10.6.24-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb10.6-s3-engine" epoch="3" version="10.6.24" release="1.red80" arch="aarch64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-s3-engine-3:10.6.24-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb10.6-server" epoch="3" version="10.6.24" release="1.red80" arch="aarch64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-server-3:10.6.24-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb10.6-server-galera" epoch="3" version="10.6.24" release="1.red80" arch="aarch64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-server-galera-3:10.6.24-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb10.6-server-utils" epoch="3" version="10.6.24" release="1.red80" arch="aarch64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-server-utils-3:10.6.24-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb10.6-sphinx-engine" epoch="3" version="10.6.24" release="1.red80" arch="aarch64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-sphinx-engine-3:10.6.24-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb10.6-test" epoch="3" version="10.6.24" release="1.red80" arch="aarch64" src="mariadb10.6-10.6.24-1.red80.src.rpm">
					<filename>mariadb10.6-test-3:10.6.24-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0053</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость mariadb11.4 </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в mariadb11.4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mariadb11-4-cve-2025-13699-8.0/</description>
               <solution>Установить обновление для пакета(ов) mariadb11.4
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mariadb11-4-cve-2025-13699-8.0/" type="self" id="ROS-20260129-80-0053" title="ROS-20260129-80-0053" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13699" type="cve" id="CVE-2025-13699" title="CVE-2025-13699" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="mariadb11.4" epoch="3" version="11.4.9" release="1.red80" arch="x86_64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-3:11.4.9-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-backup" epoch="3" version="11.4.9" release="1.red80" arch="x86_64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-backup-3:11.4.9-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-common" epoch="3" version="11.4.9" release="1.red80" arch="x86_64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-common-3:11.4.9-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-connect-engine" epoch="3" version="11.4.9" release="1.red80" arch="x86_64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-connect-engine-3:11.4.9-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-cracklib-password-check" epoch="3" version="11.4.9" release="1.red80" arch="x86_64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-cracklib-password-check-3:11.4.9-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-devel" epoch="3" version="11.4.9" release="1.red80" arch="x86_64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-devel-3:11.4.9-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-embedded" epoch="3" version="11.4.9" release="1.red80" arch="x86_64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-embedded-3:11.4.9-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-embedded-devel" epoch="3" version="11.4.9" release="1.red80" arch="x86_64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-embedded-devel-3:11.4.9-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-errmsg" epoch="3" version="11.4.9" release="1.red80" arch="x86_64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-errmsg-3:11.4.9-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-gssapi-server" epoch="3" version="11.4.9" release="1.red80" arch="x86_64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-gssapi-server-3:11.4.9-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-oqgraph-engine" epoch="3" version="11.4.9" release="1.red80" arch="x86_64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-oqgraph-engine-3:11.4.9-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-rocksdb-engine" epoch="3" version="11.4.9" release="1.red80" arch="x86_64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-rocksdb-engine-3:11.4.9-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-s3-engine" epoch="3" version="11.4.9" release="1.red80" arch="x86_64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-s3-engine-3:11.4.9-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-server" epoch="3" version="11.4.9" release="1.red80" arch="x86_64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-server-3:11.4.9-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-server-galera" epoch="3" version="11.4.9" release="1.red80" arch="x86_64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-server-galera-3:11.4.9-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-server-utils" epoch="3" version="11.4.9" release="1.red80" arch="x86_64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-server-utils-3:11.4.9-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-sphinx-engine" epoch="3" version="11.4.9" release="1.red80" arch="x86_64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-sphinx-engine-3:11.4.9-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.4-test" epoch="3" version="11.4.9" release="1.red80" arch="x86_64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-test-3:11.4.9-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="mariadb11.4" epoch="3" version="11.4.9" release="1.red80" arch="aarch64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-3:11.4.9-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.4-backup" epoch="3" version="11.4.9" release="1.red80" arch="aarch64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-backup-3:11.4.9-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.4-common" epoch="3" version="11.4.9" release="1.red80" arch="aarch64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-common-3:11.4.9-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.4-connect-engine" epoch="3" version="11.4.9" release="1.red80" arch="aarch64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-connect-engine-3:11.4.9-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.4-cracklib-password-check" epoch="3" version="11.4.9" release="1.red80" arch="aarch64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-cracklib-password-check-3:11.4.9-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.4-devel" epoch="3" version="11.4.9" release="1.red80" arch="aarch64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-devel-3:11.4.9-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.4-embedded" epoch="3" version="11.4.9" release="1.red80" arch="aarch64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-embedded-3:11.4.9-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.4-embedded-devel" epoch="3" version="11.4.9" release="1.red80" arch="aarch64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-embedded-devel-3:11.4.9-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.4-errmsg" epoch="3" version="11.4.9" release="1.red80" arch="aarch64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-errmsg-3:11.4.9-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.4-gssapi-server" epoch="3" version="11.4.9" release="1.red80" arch="aarch64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-gssapi-server-3:11.4.9-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.4-oqgraph-engine" epoch="3" version="11.4.9" release="1.red80" arch="aarch64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-oqgraph-engine-3:11.4.9-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.4-s3-engine" epoch="3" version="11.4.9" release="1.red80" arch="aarch64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-s3-engine-3:11.4.9-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.4-server" epoch="3" version="11.4.9" release="1.red80" arch="aarch64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-server-3:11.4.9-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.4-server-galera" epoch="3" version="11.4.9" release="1.red80" arch="aarch64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-server-galera-3:11.4.9-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.4-server-utils" epoch="3" version="11.4.9" release="1.red80" arch="aarch64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-server-utils-3:11.4.9-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.4-sphinx-engine" epoch="3" version="11.4.9" release="1.red80" arch="aarch64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-sphinx-engine-3:11.4.9-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.4-test" epoch="3" version="11.4.9" release="1.red80" arch="aarch64" src="mariadb11.4-11.4.9-1.red80.src.rpm">
					<filename>mariadb11.4-test-3:11.4.9-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0054</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость mariadb11.8 </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в mariadb11.8</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mariadb11-8-cve-2025-13699-8.0/</description>
               <solution>Установить обновление для пакета(ов) mariadb11.8
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mariadb11-8-cve-2025-13699-8.0/" type="self" id="ROS-20260129-80-0054" title="ROS-20260129-80-0054" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13699" type="cve" id="CVE-2025-13699" title="CVE-2025-13699" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="mariadb11.8" epoch="3" version="11.8.5" release="1.red80" arch="x86_64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-3:11.8.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-backup" epoch="3" version="11.8.5" release="1.red80" arch="x86_64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-backup-3:11.8.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-common" epoch="3" version="11.8.5" release="1.red80" arch="x86_64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-common-3:11.8.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-connect-engine" epoch="3" version="11.8.5" release="1.red80" arch="x86_64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-connect-engine-3:11.8.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-cracklib-password-check" epoch="3" version="11.8.5" release="1.red80" arch="x86_64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-cracklib-password-check-3:11.8.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-devel" epoch="3" version="11.8.5" release="1.red80" arch="x86_64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-devel-3:11.8.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-embedded" epoch="3" version="11.8.5" release="1.red80" arch="x86_64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-embedded-3:11.8.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-embedded-devel" epoch="3" version="11.8.5" release="1.red80" arch="x86_64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-embedded-devel-3:11.8.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-errmsg" epoch="3" version="11.8.5" release="1.red80" arch="x86_64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-errmsg-3:11.8.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-gssapi-server" epoch="3" version="11.8.5" release="1.red80" arch="x86_64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-gssapi-server-3:11.8.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-oqgraph-engine" epoch="3" version="11.8.5" release="1.red80" arch="x86_64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-oqgraph-engine-3:11.8.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-rocksdb-engine" epoch="3" version="11.8.5" release="1.red80" arch="x86_64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-rocksdb-engine-3:11.8.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-s3-engine" epoch="3" version="11.8.5" release="1.red80" arch="x86_64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-s3-engine-3:11.8.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-server" epoch="3" version="11.8.5" release="1.red80" arch="x86_64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-server-3:11.8.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-server-galera" epoch="3" version="11.8.5" release="1.red80" arch="x86_64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-server-galera-3:11.8.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-server-utils" epoch="3" version="11.8.5" release="1.red80" arch="x86_64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-server-utils-3:11.8.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-sphinx-engine" epoch="3" version="11.8.5" release="1.red80" arch="x86_64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-sphinx-engine-3:11.8.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb11.8-test" epoch="3" version="11.8.5" release="1.red80" arch="x86_64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-test-3:11.8.5-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="mariadb11.8" epoch="3" version="11.8.5" release="1.red80" arch="aarch64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-3:11.8.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.8-backup" epoch="3" version="11.8.5" release="1.red80" arch="aarch64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-backup-3:11.8.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.8-common" epoch="3" version="11.8.5" release="1.red80" arch="aarch64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-common-3:11.8.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.8-connect-engine" epoch="3" version="11.8.5" release="1.red80" arch="aarch64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-connect-engine-3:11.8.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.8-cracklib-password-check" epoch="3" version="11.8.5" release="1.red80" arch="aarch64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-cracklib-password-check-3:11.8.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.8-devel" epoch="3" version="11.8.5" release="1.red80" arch="aarch64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-devel-3:11.8.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.8-embedded" epoch="3" version="11.8.5" release="1.red80" arch="aarch64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-embedded-3:11.8.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.8-embedded-devel" epoch="3" version="11.8.5" release="1.red80" arch="aarch64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-embedded-devel-3:11.8.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.8-errmsg" epoch="3" version="11.8.5" release="1.red80" arch="aarch64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-errmsg-3:11.8.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.8-gssapi-server" epoch="3" version="11.8.5" release="1.red80" arch="aarch64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-gssapi-server-3:11.8.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.8-oqgraph-engine" epoch="3" version="11.8.5" release="1.red80" arch="aarch64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-oqgraph-engine-3:11.8.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.8-s3-engine" epoch="3" version="11.8.5" release="1.red80" arch="aarch64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-s3-engine-3:11.8.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.8-server" epoch="3" version="11.8.5" release="1.red80" arch="aarch64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-server-3:11.8.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.8-server-galera" epoch="3" version="11.8.5" release="1.red80" arch="aarch64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-server-galera-3:11.8.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.8-server-utils" epoch="3" version="11.8.5" release="1.red80" arch="aarch64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-server-utils-3:11.8.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.8-sphinx-engine" epoch="3" version="11.8.5" release="1.red80" arch="aarch64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-sphinx-engine-3:11.8.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb11.8-test" epoch="3" version="11.8.5" release="1.red80" arch="aarch64" src="mariadb11.8-11.8.5-1.red80.src.rpm">
					<filename>mariadb11.8-test-3:11.8.5-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0055</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0628-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0628-8.0/" type="self" id="ROS-20260129-80-0055" title="ROS-20260129-80-0055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0628" type="cve" id="CVE-2026-0628" title="CVE-2026-0628" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.192" release="1.red80" arch="x86_64" src="chromium-143.0.7499.192-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.192-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.192" release="1.red80" arch="x86_64" src="chromium-143.0.7499.192-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.192-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.192" release="1.red80" arch="x86_64" src="chromium-143.0.7499.192-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.192-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.192" release="1.red80" arch="aarch64" src="chromium-143.0.7499.192-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.192-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.192" release="1.red80" arch="aarch64" src="chromium-143.0.7499.192-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.192-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.192" release="1.red80" arch="aarch64" src="chromium-143.0.7499.192-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.192-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0056</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-14765-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-14765-8.0/" type="self" id="ROS-20260129-80-0056" title="ROS-20260129-80-0056" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14765" type="cve" id="CVE-2025-14765" title="CVE-2025-14765" />
			<reference href="https://bdu.fstec.ru/vul/2025-16319" type="self" id="BDU:2025-16319" title="BDU:2025-16319" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.192" release="1.red80" arch="x86_64" src="chromium-143.0.7499.192-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.192-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.192" release="1.red80" arch="x86_64" src="chromium-143.0.7499.192-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.192-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.192" release="1.red80" arch="x86_64" src="chromium-143.0.7499.192-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.192-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.192" release="1.red80" arch="aarch64" src="chromium-143.0.7499.192-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.192-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.192" release="1.red80" arch="aarch64" src="chromium-143.0.7499.192-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.192-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.192" release="1.red80" arch="aarch64" src="chromium-143.0.7499.192-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.192-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0057</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-14766-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2025-14766-8.0/" type="self" id="ROS-20260129-80-0057" title="ROS-20260129-80-0057" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14766" type="cve" id="CVE-2025-14766" title="CVE-2025-14766" />
			<reference href="https://bdu.fstec.ru/vul/2025-16320" type="self" id="BDU:2025-16320" title="BDU:2025-16320" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.192" release="1.red80" arch="x86_64" src="chromium-143.0.7499.192-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.192-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.192" release="1.red80" arch="x86_64" src="chromium-143.0.7499.192-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.192-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.192" release="1.red80" arch="x86_64" src="chromium-143.0.7499.192-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.192-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="143.0.7499.192" release="1.red80" arch="aarch64" src="chromium-143.0.7499.192-1.red80.src.rpm">
					<filename>chromedriver-0:143.0.7499.192-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="143.0.7499.192" release="1.red80" arch="aarch64" src="chromium-143.0.7499.192-1.red80.src.rpm">
					<filename>chromium-0:143.0.7499.192-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="143.0.7499.192" release="1.red80" arch="aarch64" src="chromium-143.0.7499.192-1.red80.src.rpm">
					<filename>chromium-common-0:143.0.7499.192-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0058</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость portainer-ce </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в portainer-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-portainer-ce-cve-2025-47914-8.0/</description>
               <solution>Установить обновление для пакета(ов) portainer-ce
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-portainer-ce-cve-2025-47914-8.0/" type="self" id="ROS-20260129-80-0058" title="ROS-20260129-80-0058" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47914" type="cve" id="CVE-2025-47914" title="CVE-2025-47914" />
			<reference href="https://bdu.fstec.ru/vul/2025-14682" type="self" id="BDU:2025-14682" title="BDU:2025-14682" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="portainer-ce" epoch="0" version="2.33.6" release="1.red80" arch="x86_64" src="portainer-ce-2.33.6-1.red80.src.rpm">
					<filename>portainer-ce-0:2.33.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="portainer-ce-agent" epoch="0" version="2.33.6" release="1.red80" arch="x86_64" src="portainer-ce-2.33.6-1.red80.src.rpm">
					<filename>portainer-ce-agent-0:2.33.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="portainer-ce" epoch="0" version="2.33.6" release="1.red80" arch="aarch64" src="portainer-ce-2.33.6-1.red80.src.rpm">
					<filename>portainer-ce-0:2.33.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="portainer-ce-agent" epoch="0" version="2.33.6" release="1.red80" arch="aarch64" src="portainer-ce-2.33.6-1.red80.src.rpm">
					<filename>portainer-ce-agent-0:2.33.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0059</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость portainer-ce </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в portainer-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-portainer-ce-cve-2025-61727-8.0/</description>
               <solution>Установить обновление для пакета(ов) portainer-ce
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-portainer-ce-cve-2025-61727-8.0/" type="self" id="ROS-20260129-80-0059" title="ROS-20260129-80-0059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61727" type="cve" id="CVE-2025-61727" title="CVE-2025-61727" />
			<reference href="https://bdu.fstec.ru/vul/2026-00268" type="self" id="BDU:2026-00268" title="BDU:2026-00268" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="portainer-ce" epoch="0" version="2.33.6" release="1.red80" arch="x86_64" src="portainer-ce-2.33.6-1.red80.src.rpm">
					<filename>portainer-ce-0:2.33.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="portainer-ce-agent" epoch="0" version="2.33.6" release="1.red80" arch="x86_64" src="portainer-ce-2.33.6-1.red80.src.rpm">
					<filename>portainer-ce-agent-0:2.33.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="portainer-ce" epoch="0" version="2.33.6" release="1.red80" arch="aarch64" src="portainer-ce-2.33.6-1.red80.src.rpm">
					<filename>portainer-ce-0:2.33.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="portainer-ce-agent" epoch="0" version="2.33.6" release="1.red80" arch="aarch64" src="portainer-ce-2.33.6-1.red80.src.rpm">
					<filename>portainer-ce-agent-0:2.33.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0060</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость portainer-ce </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в portainer-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-portainer-ce-cve-2025-61729-8.0/</description>
               <solution>Установить обновление для пакета(ов) portainer-ce
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-portainer-ce-cve-2025-61729-8.0/" type="self" id="ROS-20260129-80-0060" title="ROS-20260129-80-0060" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61729" type="cve" id="CVE-2025-61729" title="CVE-2025-61729" />
			<reference href="https://bdu.fstec.ru/vul/2025-16242" type="self" id="BDU:2025-16242" title="BDU:2025-16242" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="portainer-ce" epoch="0" version="2.33.6" release="1.red80" arch="x86_64" src="portainer-ce-2.33.6-1.red80.src.rpm">
					<filename>portainer-ce-0:2.33.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="portainer-ce-agent" epoch="0" version="2.33.6" release="1.red80" arch="x86_64" src="portainer-ce-2.33.6-1.red80.src.rpm">
					<filename>portainer-ce-agent-0:2.33.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="portainer-ce" epoch="0" version="2.33.6" release="1.red80" arch="aarch64" src="portainer-ce-2.33.6-1.red80.src.rpm">
					<filename>portainer-ce-0:2.33.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="portainer-ce-agent" epoch="0" version="2.33.6" release="1.red80" arch="aarch64" src="portainer-ce-2.33.6-1.red80.src.rpm">
					<filename>portainer-ce-agent-0:2.33.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0061</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-curl-cve-2025-15224-8.0/</description>
               <solution>Установить обновление для пакета(ов) curl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-curl-cve-2025-15224-8.0/" type="self" id="ROS-20260129-80-0061" title="ROS-20260129-80-0061" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15224" type="cve" id="CVE-2025-15224" title="CVE-2025-15224" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="curl" epoch="0" version="8.0.1" release="15.red80" arch="x86_64" src="curl-8.0.1-15.red80.src.rpm">
					<filename>curl-0:8.0.1-15.red80.x86_64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="8.0.1" release="15.red80" arch="x86_64" src="curl-8.0.1-15.red80.src.rpm">
					<filename>libcurl-0:8.0.1-15.red80.x86_64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="8.0.1" release="15.red80" arch="x86_64" src="curl-8.0.1-15.red80.src.rpm">
					<filename>libcurl-devel-0:8.0.1-15.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="curl" epoch="0" version="8.0.1" release="15.red80" arch="aarch64" src="curl-8.0.1-15.red80.src.rpm">
					<filename>curl-0:8.0.1-15.red80.aarch64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="8.0.1" release="15.red80" arch="aarch64" src="curl-8.0.1-15.red80.src.rpm">
					<filename>libcurl-0:8.0.1-15.red80.aarch64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="8.0.1" release="15.red80" arch="aarch64" src="curl-8.0.1-15.red80.src.rpm">
					<filename>libcurl-devel-0:8.0.1-15.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0062</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-curl-cve-2025-14524-8.0/</description>
               <solution>Установить обновление для пакета(ов) curl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-curl-cve-2025-14524-8.0/" type="self" id="ROS-20260129-80-0062" title="ROS-20260129-80-0062" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14524" type="cve" id="CVE-2025-14524" title="CVE-2025-14524" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="curl" epoch="0" version="8.0.1" release="15.red80" arch="x86_64" src="curl-8.0.1-15.red80.src.rpm">
					<filename>curl-0:8.0.1-15.red80.x86_64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="8.0.1" release="15.red80" arch="x86_64" src="curl-8.0.1-15.red80.src.rpm">
					<filename>libcurl-0:8.0.1-15.red80.x86_64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="8.0.1" release="15.red80" arch="x86_64" src="curl-8.0.1-15.red80.src.rpm">
					<filename>libcurl-devel-0:8.0.1-15.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="curl" epoch="0" version="8.0.1" release="15.red80" arch="aarch64" src="curl-8.0.1-15.red80.src.rpm">
					<filename>curl-0:8.0.1-15.red80.aarch64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="8.0.1" release="15.red80" arch="aarch64" src="curl-8.0.1-15.red80.src.rpm">
					<filename>libcurl-0:8.0.1-15.red80.aarch64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="8.0.1" release="15.red80" arch="aarch64" src="curl-8.0.1-15.red80.src.rpm">
					<filename>libcurl-devel-0:8.0.1-15.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0063</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-curl-cve-2025-15079-8.0/</description>
               <solution>Установить обновление для пакета(ов) curl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-curl-cve-2025-15079-8.0/" type="self" id="ROS-20260129-80-0063" title="ROS-20260129-80-0063" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15079" type="cve" id="CVE-2025-15079" title="CVE-2025-15079" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="curl" epoch="0" version="8.0.1" release="15.red80" arch="x86_64" src="curl-8.0.1-15.red80.src.rpm">
					<filename>curl-0:8.0.1-15.red80.x86_64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="8.0.1" release="15.red80" arch="x86_64" src="curl-8.0.1-15.red80.src.rpm">
					<filename>libcurl-0:8.0.1-15.red80.x86_64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="8.0.1" release="15.red80" arch="x86_64" src="curl-8.0.1-15.red80.src.rpm">
					<filename>libcurl-devel-0:8.0.1-15.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="curl" epoch="0" version="8.0.1" release="15.red80" arch="aarch64" src="curl-8.0.1-15.red80.src.rpm">
					<filename>curl-0:8.0.1-15.red80.aarch64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="8.0.1" release="15.red80" arch="aarch64" src="curl-8.0.1-15.red80.src.rpm">
					<filename>libcurl-0:8.0.1-15.red80.aarch64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="8.0.1" release="15.red80" arch="aarch64" src="curl-8.0.1-15.red80.src.rpm">
					<filename>libcurl-devel-0:8.0.1-15.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0064</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2026-0877-8.0/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2026-0877-8.0/" type="self" id="ROS-20260129-80-0064" title="ROS-20260129-80-0064" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0877" type="cve" id="CVE-2026-0877" title="CVE-2026-0877" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="firefox" epoch="0" version="115.32.0" release="1.red80" arch="x86_64" src="firefox-115.32.0-1.red80.src.rpm">
					<filename>firefox-0:115.32.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="firefox" epoch="0" version="115.32.0" release="1.red80" arch="aarch64" src="firefox-115.32.0-1.red80.src.rpm">
					<filename>firefox-0:115.32.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0065</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2026-0879-8.0/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2026-0879-8.0/" type="self" id="ROS-20260129-80-0065" title="ROS-20260129-80-0065" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0879" type="cve" id="CVE-2026-0879" title="CVE-2026-0879" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="firefox" epoch="0" version="115.32.0" release="1.red80" arch="x86_64" src="firefox-115.32.0-1.red80.src.rpm">
					<filename>firefox-0:115.32.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="firefox" epoch="0" version="115.32.0" release="1.red80" arch="aarch64" src="firefox-115.32.0-1.red80.src.rpm">
					<filename>firefox-0:115.32.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0066</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2026-0880-8.0/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2026-0880-8.0/" type="self" id="ROS-20260129-80-0066" title="ROS-20260129-80-0066" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0880" type="cve" id="CVE-2026-0880" title="CVE-2026-0880" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="firefox" epoch="0" version="115.32.0" release="1.red80" arch="x86_64" src="firefox-115.32.0-1.red80.src.rpm">
					<filename>firefox-0:115.32.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="firefox" epoch="0" version="115.32.0" release="1.red80" arch="aarch64" src="firefox-115.32.0-1.red80.src.rpm">
					<filename>firefox-0:115.32.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0067</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2026-0882-8.0/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2026-0882-8.0/" type="self" id="ROS-20260129-80-0067" title="ROS-20260129-80-0067" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0882" type="cve" id="CVE-2026-0882" title="CVE-2026-0882" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="firefox" epoch="0" version="115.32.0" release="1.red80" arch="x86_64" src="firefox-115.32.0-1.red80.src.rpm">
					<filename>firefox-0:115.32.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="firefox" epoch="0" version="115.32.0" release="1.red80" arch="aarch64" src="firefox-115.32.0-1.red80.src.rpm">
					<filename>firefox-0:115.32.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0068</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2026-0886-8.0/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2026-0886-8.0/" type="self" id="ROS-20260129-80-0068" title="ROS-20260129-80-0068" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0886" type="cve" id="CVE-2026-0886" title="CVE-2026-0886" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="firefox" epoch="0" version="115.32.0" release="1.red80" arch="x86_64" src="firefox-115.32.0-1.red80.src.rpm">
					<filename>firefox-0:115.32.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="firefox" epoch="0" version="115.32.0" release="1.red80" arch="aarch64" src="firefox-115.32.0-1.red80.src.rpm">
					<filename>firefox-0:115.32.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0069</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость dotnet6.0 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet6.0</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-dotnet6-0-cve-2023-44487-8.0/</description>
               <solution>Установить обновление для пакета(ов) dotnet6.0
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-dotnet6-0-cve-2023-44487-8.0/" type="self" id="ROS-20260129-80-0069" title="ROS-20260129-80-0069" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="aspnetcore-runtime-6.0" epoch="0" version="6.0.35" release="1.red80" arch="x86_64" src="dotnet6.0-6.0.135-1.red80.src.rpm">
					<filename>aspnetcore-runtime-6.0-0:6.0.35-1.red80.x86_64.rpm</filename>
				</package>
				<package name="aspnetcore-targeting-pack-6.0" epoch="0" version="6.0.35" release="1.red80" arch="x86_64" src="dotnet6.0-6.0.135-1.red80.src.rpm">
					<filename>aspnetcore-targeting-pack-6.0-0:6.0.35-1.red80.x86_64.rpm</filename>
				</package>
				<package name="dotnet-apphost-pack-6.0" epoch="0" version="6.0.35" release="1.red80" arch="x86_64" src="dotnet6.0-6.0.135-1.red80.src.rpm">
					<filename>dotnet-apphost-pack-6.0-0:6.0.35-1.red80.x86_64.rpm</filename>
				</package>
				<package name="dotnet-hostfxr-6.0" epoch="0" version="6.0.35" release="1.red80" arch="x86_64" src="dotnet6.0-6.0.135-1.red80.src.rpm">
					<filename>dotnet-hostfxr-6.0-0:6.0.35-1.red80.x86_64.rpm</filename>
				</package>
				<package name="dotnet-runtime-6.0" epoch="0" version="6.0.35" release="1.red80" arch="x86_64" src="dotnet6.0-6.0.135-1.red80.src.rpm">
					<filename>dotnet-runtime-6.0-0:6.0.35-1.red80.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-6.0" epoch="0" version="6.0.135" release="1.red80" arch="x86_64" src="dotnet6.0-6.0.135-1.red80.src.rpm">
					<filename>dotnet-sdk-6.0-0:6.0.135-1.red80.x86_64.rpm</filename>
				</package>
				<package name="dotnet-targeting-pack-6.0" epoch="0" version="6.0.35" release="1.red80" arch="x86_64" src="dotnet6.0-6.0.135-1.red80.src.rpm">
					<filename>dotnet-targeting-pack-6.0-0:6.0.35-1.red80.x86_64.rpm</filename>
				</package>
				<package name="dotnet-templates-6.0" epoch="0" version="6.0.135" release="1.red80" arch="x86_64" src="dotnet6.0-6.0.135-1.red80.src.rpm">
					<filename>dotnet-templates-6.0-0:6.0.135-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="aspnetcore-runtime-6.0" epoch="0" version="6.0.35" release="1.red80" arch="aarch64" src="dotnet6.0-6.0.135-1.red80.src.rpm">
					<filename>aspnetcore-runtime-6.0-0:6.0.35-1.red80.aarch64.rpm</filename>
				</package>
				<package name="aspnetcore-targeting-pack-6.0" epoch="0" version="6.0.35" release="1.red80" arch="aarch64" src="dotnet6.0-6.0.135-1.red80.src.rpm">
					<filename>aspnetcore-targeting-pack-6.0-0:6.0.35-1.red80.aarch64.rpm</filename>
				</package>
				<package name="dotnet-apphost-pack-6.0" epoch="0" version="6.0.35" release="1.red80" arch="aarch64" src="dotnet6.0-6.0.135-1.red80.src.rpm">
					<filename>dotnet-apphost-pack-6.0-0:6.0.35-1.red80.aarch64.rpm</filename>
				</package>
				<package name="dotnet-hostfxr-6.0" epoch="0" version="6.0.35" release="1.red80" arch="aarch64" src="dotnet6.0-6.0.135-1.red80.src.rpm">
					<filename>dotnet-hostfxr-6.0-0:6.0.35-1.red80.aarch64.rpm</filename>
				</package>
				<package name="dotnet-runtime-6.0" epoch="0" version="6.0.35" release="1.red80" arch="aarch64" src="dotnet6.0-6.0.135-1.red80.src.rpm">
					<filename>dotnet-runtime-6.0-0:6.0.35-1.red80.aarch64.rpm</filename>
				</package>
				<package name="dotnet-sdk-6.0" epoch="0" version="6.0.135" release="1.red80" arch="aarch64" src="dotnet6.0-6.0.135-1.red80.src.rpm">
					<filename>dotnet-sdk-6.0-0:6.0.135-1.red80.aarch64.rpm</filename>
				</package>
				<package name="dotnet-targeting-pack-6.0" epoch="0" version="6.0.35" release="1.red80" arch="aarch64" src="dotnet6.0-6.0.135-1.red80.src.rpm">
					<filename>dotnet-targeting-pack-6.0-0:6.0.35-1.red80.aarch64.rpm</filename>
				</package>
				<package name="dotnet-templates-6.0" epoch="0" version="6.0.135" release="1.red80" arch="aarch64" src="dotnet6.0-6.0.135-1.red80.src.rpm">
					<filename>dotnet-templates-6.0-0:6.0.135-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0070</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость dotnet7.0 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet7.0</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-dotnet7-0-cve-2023-44487-8.0/</description>
               <solution>Установить обновление для пакета(ов) dotnet7.0
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-dotnet7-0-cve-2023-44487-8.0/" type="self" id="ROS-20260129-80-0070" title="ROS-20260129-80-0070" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="aspnetcore-runtime-7.0" epoch="0" version="7.0.20" release="1.red80" arch="x86_64" src="dotnet7.0-7.0.120-1.red80.src.rpm">
					<filename>aspnetcore-runtime-7.0-0:7.0.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="aspnetcore-targeting-pack-7.0" epoch="0" version="7.0.20" release="1.red80" arch="x86_64" src="dotnet7.0-7.0.120-1.red80.src.rpm">
					<filename>aspnetcore-targeting-pack-7.0-0:7.0.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="dotnet-apphost-pack-7.0" epoch="0" version="7.0.20" release="1.red80" arch="x86_64" src="dotnet7.0-7.0.120-1.red80.src.rpm">
					<filename>dotnet-apphost-pack-7.0-0:7.0.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="dotnet-hostfxr-7.0" epoch="0" version="7.0.20" release="1.red80" arch="x86_64" src="dotnet7.0-7.0.120-1.red80.src.rpm">
					<filename>dotnet-hostfxr-7.0-0:7.0.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="dotnet-runtime-7.0" epoch="0" version="7.0.20" release="1.red80" arch="x86_64" src="dotnet7.0-7.0.120-1.red80.src.rpm">
					<filename>dotnet-runtime-7.0-0:7.0.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="dotnet-sdk-7.0" epoch="0" version="7.0.120" release="1.red80" arch="x86_64" src="dotnet7.0-7.0.120-1.red80.src.rpm">
					<filename>dotnet-sdk-7.0-0:7.0.120-1.red80.x86_64.rpm</filename>
				</package>
				<package name="dotnet-targeting-pack-7.0" epoch="0" version="7.0.20" release="1.red80" arch="x86_64" src="dotnet7.0-7.0.120-1.red80.src.rpm">
					<filename>dotnet-targeting-pack-7.0-0:7.0.20-1.red80.x86_64.rpm</filename>
				</package>
				<package name="dotnet-templates-7.0" epoch="0" version="7.0.120" release="1.red80" arch="x86_64" src="dotnet7.0-7.0.120-1.red80.src.rpm">
					<filename>dotnet-templates-7.0-0:7.0.120-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="aspnetcore-runtime-7.0" epoch="0" version="7.0.20" release="1.red80" arch="aarch64" src="dotnet7.0-7.0.120-1.red80.src.rpm">
					<filename>aspnetcore-runtime-7.0-0:7.0.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="aspnetcore-targeting-pack-7.0" epoch="0" version="7.0.20" release="1.red80" arch="aarch64" src="dotnet7.0-7.0.120-1.red80.src.rpm">
					<filename>aspnetcore-targeting-pack-7.0-0:7.0.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="dotnet-apphost-pack-7.0" epoch="0" version="7.0.20" release="1.red80" arch="aarch64" src="dotnet7.0-7.0.120-1.red80.src.rpm">
					<filename>dotnet-apphost-pack-7.0-0:7.0.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="dotnet-hostfxr-7.0" epoch="0" version="7.0.20" release="1.red80" arch="aarch64" src="dotnet7.0-7.0.120-1.red80.src.rpm">
					<filename>dotnet-hostfxr-7.0-0:7.0.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="dotnet-runtime-7.0" epoch="0" version="7.0.20" release="1.red80" arch="aarch64" src="dotnet7.0-7.0.120-1.red80.src.rpm">
					<filename>dotnet-runtime-7.0-0:7.0.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="dotnet-sdk-7.0" epoch="0" version="7.0.120" release="1.red80" arch="aarch64" src="dotnet7.0-7.0.120-1.red80.src.rpm">
					<filename>dotnet-sdk-7.0-0:7.0.120-1.red80.aarch64.rpm</filename>
				</package>
				<package name="dotnet-targeting-pack-7.0" epoch="0" version="7.0.20" release="1.red80" arch="aarch64" src="dotnet7.0-7.0.120-1.red80.src.rpm">
					<filename>dotnet-targeting-pack-7.0-0:7.0.20-1.red80.aarch64.rpm</filename>
				</package>
				<package name="dotnet-templates-7.0" epoch="0" version="7.0.120" release="1.red80" arch="aarch64" src="dotnet7.0-7.0.120-1.red80.src.rpm">
					<filename>dotnet-templates-7.0-0:7.0.120-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0071</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость dotnet8.0 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в dotnet8.0</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-dotnet8-0-cve-2023-44487-8.0/</description>
               <solution>Установить обновление для пакета(ов) dotnet8.0
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-dotnet8-0-cve-2023-44487-8.0/" type="self" id="ROS-20260129-80-0071" title="ROS-20260129-80-0071" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="dotnet" epoch="0" version="8.0.117" release="1.red80" arch="x86_64" src="dotnet8.0-8.0.117-1.red80.src.rpm">
					<filename>dotnet-0:8.0.117-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="dotnet" epoch="0" version="8.0.117" release="1.red80" arch="aarch64" src="dotnet8.0-8.0.117-1.red80.src.rpm">
					<filename>dotnet-0:8.0.117-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0072</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость etcd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в etcd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-etcd-cve-2023-44487-8.0/</description>
               <solution>Установить обновление для пакета(ов) etcd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-etcd-cve-2023-44487-8.0/" type="self" id="ROS-20260129-80-0072" title="ROS-20260129-80-0072" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="etcd" epoch="0" version="3.5.15" release="1.red80" arch="x86_64" src="etcd-3.5.15-1.red80.src.rpm">
					<filename>etcd-0:3.5.15-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="etcd" epoch="0" version="3.5.15" release="1.red80" arch="aarch64" src="etcd-3.5.15-1.red80.src.rpm">
					<filename>etcd-0:3.5.15-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="golang-etcd-devel" epoch="0" version="3.5.15" release="1.red80" arch="noarch" src="etcd-3.5.15-1.red80.src.rpm">
					<filename>golang-etcd-devel-0:3.5.15-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0073</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость rclone </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в rclone</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-rclone-cve-2025-61729-8.0/</description>
               <solution>Установить обновление для пакета(ов) rclone
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-rclone-cve-2025-61729-8.0/" type="self" id="ROS-20260129-80-0073" title="ROS-20260129-80-0073" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61729" type="cve" id="CVE-2025-61729" title="CVE-2025-61729" />
			<reference href="https://bdu.fstec.ru/vul/2025-16242" type="self" id="BDU:2025-16242" title="BDU:2025-16242" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="rclone" epoch="0" version="1.72.1" release="1.red80" arch="x86_64" src="rclone-1.72.1-1.red80.src.rpm">
					<filename>rclone-0:1.72.1-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="rclone" epoch="0" version="1.72.1" release="1.red80" arch="aarch64" src="rclone-1.72.1-1.red80.src.rpm">
					<filename>rclone-0:1.72.1-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0074</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость rclone </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rclone</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-rclone-cve-2025-58181-8.0/</description>
               <solution>Установить обновление для пакета(ов) rclone
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-rclone-cve-2025-58181-8.0/" type="self" id="ROS-20260129-80-0074" title="ROS-20260129-80-0074" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58181" type="cve" id="CVE-2025-58181" title="CVE-2025-58181" />
			<reference href="https://bdu.fstec.ru/vul/2025-14688" type="self" id="BDU:2025-14688" title="BDU:2025-14688" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="rclone" epoch="0" version="1.72.1" release="1.red80" arch="x86_64" src="rclone-1.72.1-1.red80.src.rpm">
					<filename>rclone-0:1.72.1-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="rclone" epoch="0" version="1.72.1" release="1.red80" arch="aarch64" src="rclone-1.72.1-1.red80.src.rpm">
					<filename>rclone-0:1.72.1-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0075</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2025-12657-8.0/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2025-12657-8.0/" type="self" id="ROS-20260129-80-0075" title="ROS-20260129-80-0075" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12657" type="cve" id="CVE-2025-12657" title="CVE-2025-12657" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="mongodb-org" epoch="0" version="7.0.26" release="1.red80" arch="x86_64" src="mongodb-org-7.0.26-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.26-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.26" release="1.red80" arch="x86_64" src="mongodb-org-7.0.26-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.26-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.26" release="1.red80" arch="x86_64" src="mongodb-org-7.0.26-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.26-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.26" release="1.red80" arch="x86_64" src="mongodb-org-7.0.26-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.26-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="mongodb-org" epoch="0" version="7.0.26" release="1.red80" arch="aarch64" src="mongodb-org-7.0.26-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.26-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.26" release="1.red80" arch="aarch64" src="mongodb-org-7.0.26-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.26-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.26" release="1.red80" arch="aarch64" src="mongodb-org-7.0.26-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.26-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.26" release="1.red80" arch="aarch64" src="mongodb-org-7.0.26-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.26-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0076</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2025-68938-8.0/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2025-68938-8.0/" type="self" id="ROS-20260129-80-0076" title="ROS-20260129-80-0076" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68938" type="cve" id="CVE-2025-68938" title="CVE-2025-68938" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gitea" epoch="0" version="1.25.3" release="1.red80" arch="x86_64" src="gitea-1.25.3-1.red80.src.rpm">
					<filename>gitea-0:1.25.3-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gitea" epoch="0" version="1.25.3" release="1.red80" arch="aarch64" src="gitea-1.25.3-1.red80.src.rpm">
					<filename>gitea-0:1.25.3-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="gitea-docs" epoch="0" version="1.25.3" release="1.red80" arch="noarch" src="gitea-1.25.3-1.red80.src.rpm">
					<filename>gitea-docs-0:1.25.3-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.3" release="1.red80" arch="noarch" src="gitea-1.25.3-1.red80.src.rpm">
					<filename>gitea-fish-completion-0:1.25.3-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.3" release="1.red80" arch="noarch" src="gitea-1.25.3-1.red80.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.3-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260129-80-0077</id>
		<issued date="2026-01-29" />
		<updated date="2026-01-29" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2025-69413-8.0/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2025-69413-8.0/" type="self" id="ROS-20260129-80-0077" title="ROS-20260129-80-0077" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69413" type="cve" id="CVE-2025-69413" title="CVE-2025-69413" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gitea" epoch="0" version="1.25.3" release="1.red80" arch="x86_64" src="gitea-1.25.3-1.red80.src.rpm">
					<filename>gitea-0:1.25.3-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gitea" epoch="0" version="1.25.3" release="1.red80" arch="aarch64" src="gitea-1.25.3-1.red80.src.rpm">
					<filename>gitea-0:1.25.3-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="gitea-docs" epoch="0" version="1.25.3" release="1.red80" arch="noarch" src="gitea-1.25.3-1.red80.src.rpm">
					<filename>gitea-docs-0:1.25.3-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.3" release="1.red80" arch="noarch" src="gitea-1.25.3-1.red80.src.rpm">
					<filename>gitea-fish-completion-0:1.25.3-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.3" release="1.red80" arch="noarch" src="gitea-1.25.3-1.red80.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.3-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0001</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37799-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37799-8.0/" type="self" id="ROS-20260202-80-0001" title="ROS-20260202-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37799" type="cve" id="CVE-2025-37799" title="CVE-2025-37799" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0002</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37801-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37801-8.0/" type="self" id="ROS-20260202-80-0002" title="ROS-20260202-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37801" type="cve" id="CVE-2025-37801" title="CVE-2025-37801" />
			<reference href="https://bdu.fstec.ru/vul/2025-09837" type="self" id="BDU:2025-09837" title="BDU:2025-09837" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0003</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37805-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37805-8.0/" type="self" id="ROS-20260202-80-0003" title="ROS-20260202-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37805" type="cve" id="CVE-2025-37805" title="CVE-2025-37805" />
			<reference href="https://bdu.fstec.ru/vul/2025-10603" type="self" id="BDU:2025-10603" title="BDU:2025-10603" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0004</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37808-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37808-8.0/" type="self" id="ROS-20260202-80-0004" title="ROS-20260202-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37808" type="cve" id="CVE-2025-37808" title="CVE-2025-37808" />
			<reference href="https://bdu.fstec.ru/vul/2025-10758" type="self" id="BDU:2025-10758" title="BDU:2025-10758" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0005</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37809-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37809-8.0/" type="self" id="ROS-20260202-80-0005" title="ROS-20260202-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37809" type="cve" id="CVE-2025-37809" title="CVE-2025-37809" />
			<reference href="https://bdu.fstec.ru/vul/2025-10605" type="self" id="BDU:2025-10605" title="BDU:2025-10605" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0006</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37810-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37810-8.0/" type="self" id="ROS-20260202-80-0006" title="ROS-20260202-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37810" type="cve" id="CVE-2025-37810" title="CVE-2025-37810" />
			<reference href="https://bdu.fstec.ru/vul/2025-10599" type="self" id="BDU:2025-10599" title="BDU:2025-10599" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0007</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37811-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37811-8.0/" type="self" id="ROS-20260202-80-0007" title="ROS-20260202-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37811" type="cve" id="CVE-2025-37811" title="CVE-2025-37811" />
			<reference href="https://bdu.fstec.ru/vul/2025-10606" type="self" id="BDU:2025-10606" title="BDU:2025-10606" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0008</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37812-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37812-8.0/" type="self" id="ROS-20260202-80-0008" title="ROS-20260202-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37812" type="cve" id="CVE-2025-37812" title="CVE-2025-37812" />
			<reference href="https://bdu.fstec.ru/vul/2025-10608" type="self" id="BDU:2025-10608" title="BDU:2025-10608" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0009</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37813-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37813-8.0/" type="self" id="ROS-20260202-80-0009" title="ROS-20260202-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37813" type="cve" id="CVE-2025-37813" title="CVE-2025-37813" />
			<reference href="https://bdu.fstec.ru/vul/2025-10607" type="self" id="BDU:2025-10607" title="BDU:2025-10607" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0010</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37814-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37814-8.0/" type="self" id="ROS-20260202-80-0010" title="ROS-20260202-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37814" type="cve" id="CVE-2025-37814" title="CVE-2025-37814" />
			<reference href="https://bdu.fstec.ru/vul/2025-11763" type="self" id="BDU:2025-11763" title="BDU:2025-11763" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0011</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37815-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37815-8.0/" type="self" id="ROS-20260202-80-0011" title="ROS-20260202-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37815" type="cve" id="CVE-2025-37815" title="CVE-2025-37815" />
			<reference href="https://bdu.fstec.ru/vul/2025-11798" type="self" id="BDU:2025-11798" title="BDU:2025-11798" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0012</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37816-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37816-8.0/" type="self" id="ROS-20260202-80-0012" title="ROS-20260202-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37816" type="cve" id="CVE-2025-37816" title="CVE-2025-37816" />
			<reference href="https://bdu.fstec.ru/vul/2025-11840" type="self" id="BDU:2025-11840" title="BDU:2025-11840" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0013</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37817-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37817-8.0/" type="self" id="ROS-20260202-80-0013" title="ROS-20260202-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37817" type="cve" id="CVE-2025-37817" title="CVE-2025-37817" />
			<reference href="https://bdu.fstec.ru/vul/2025-12062" type="self" id="BDU:2025-12062" title="BDU:2025-12062" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0014</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37818-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37818-8.0/" type="self" id="ROS-20260202-80-0014" title="ROS-20260202-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37818" type="cve" id="CVE-2025-37818" title="CVE-2025-37818" />
			<reference href="https://bdu.fstec.ru/vul/2025-12023" type="self" id="BDU:2025-12023" title="BDU:2025-12023" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0015</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37819-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37819-8.0/" type="self" id="ROS-20260202-80-0015" title="ROS-20260202-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37819" type="cve" id="CVE-2025-37819" title="CVE-2025-37819" />
			<reference href="https://bdu.fstec.ru/vul/2025-12086" type="self" id="BDU:2025-12086" title="BDU:2025-12086" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0016</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37821-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37821-8.0/" type="self" id="ROS-20260202-80-0016" title="ROS-20260202-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37821" type="cve" id="CVE-2025-37821" title="CVE-2025-37821" />
			<reference href="https://bdu.fstec.ru/vul/2025-11974" type="self" id="BDU:2025-11974" title="BDU:2025-11974" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0017</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37823-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37823-8.0/" type="self" id="ROS-20260202-80-0017" title="ROS-20260202-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37823" type="cve" id="CVE-2025-37823" title="CVE-2025-37823" />
			<reference href="https://bdu.fstec.ru/vul/2025-12085" type="self" id="BDU:2025-12085" title="BDU:2025-12085" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0018</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37824-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37824-8.0/" type="self" id="ROS-20260202-80-0018" title="ROS-20260202-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37824" type="cve" id="CVE-2025-37824" title="CVE-2025-37824" />
			<reference href="https://bdu.fstec.ru/vul/2025-12149" type="self" id="BDU:2025-12149" title="BDU:2025-12149" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0019</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37826-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37826-8.0/" type="self" id="ROS-20260202-80-0019" title="ROS-20260202-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37826" type="cve" id="CVE-2025-37826" title="CVE-2025-37826" />
			<reference href="https://bdu.fstec.ru/vul/2025-12148" type="self" id="BDU:2025-12148" title="BDU:2025-12148" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0020</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37827-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37827-8.0/" type="self" id="ROS-20260202-80-0020" title="ROS-20260202-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37827" type="cve" id="CVE-2025-37827" title="CVE-2025-37827" />
			<reference href="https://bdu.fstec.ru/vul/2025-12147" type="self" id="BDU:2025-12147" title="BDU:2025-12147" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0021</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37828-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37828-8.0/" type="self" id="ROS-20260202-80-0021" title="ROS-20260202-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37828" type="cve" id="CVE-2025-37828" title="CVE-2025-37828" />
			<reference href="https://bdu.fstec.ru/vul/2025-12146" type="self" id="BDU:2025-12146" title="BDU:2025-12146" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0022</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37829-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37829-8.0/" type="self" id="ROS-20260202-80-0022" title="ROS-20260202-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37829" type="cve" id="CVE-2025-37829" title="CVE-2025-37829" />
			<reference href="https://bdu.fstec.ru/vul/2025-12145" type="self" id="BDU:2025-12145" title="BDU:2025-12145" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0023</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37830-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37830-8.0/" type="self" id="ROS-20260202-80-0023" title="ROS-20260202-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37830" type="cve" id="CVE-2025-37830" title="CVE-2025-37830" />
			<reference href="https://bdu.fstec.ru/vul/2025-12144" type="self" id="BDU:2025-12144" title="BDU:2025-12144" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0024</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37831-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37831-8.0/" type="self" id="ROS-20260202-80-0024" title="ROS-20260202-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37831" type="cve" id="CVE-2025-37831" title="CVE-2025-37831" />
			<reference href="https://bdu.fstec.ru/vul/2025-12143" type="self" id="BDU:2025-12143" title="BDU:2025-12143" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0025</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37832-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37832-8.0/" type="self" id="ROS-20260202-80-0025" title="ROS-20260202-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37832" type="cve" id="CVE-2025-37832" title="CVE-2025-37832" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0026</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37835-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37835-8.0/" type="self" id="ROS-20260202-80-0026" title="ROS-20260202-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37835" type="cve" id="CVE-2025-37835" title="CVE-2025-37835" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0027</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37836-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37836-8.0/" type="self" id="ROS-20260202-80-0027" title="ROS-20260202-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37836" type="cve" id="CVE-2025-37836" title="CVE-2025-37836" />
			<reference href="https://bdu.fstec.ru/vul/2025-12061" type="self" id="BDU:2025-12061" title="BDU:2025-12061" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0028</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37837-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37837-8.0/" type="self" id="ROS-20260202-80-0028" title="ROS-20260202-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37837" type="cve" id="CVE-2025-37837" title="CVE-2025-37837" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0029</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37839-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37839-8.0/" type="self" id="ROS-20260202-80-0029" title="ROS-20260202-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37839" type="cve" id="CVE-2025-37839" title="CVE-2025-37839" />
			<reference href="https://bdu.fstec.ru/vul/2025-12278" type="self" id="BDU:2025-12278" title="BDU:2025-12278" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0030</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37840-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37840-8.0/" type="self" id="ROS-20260202-80-0030" title="ROS-20260202-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37840" type="cve" id="CVE-2025-37840" title="CVE-2025-37840" />
			<reference href="https://bdu.fstec.ru/vul/2025-12329" type="self" id="BDU:2025-12329" title="BDU:2025-12329" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0031</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37841-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37841-8.0/" type="self" id="ROS-20260202-80-0031" title="ROS-20260202-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37841" type="cve" id="CVE-2025-37841" title="CVE-2025-37841" />
			<reference href="https://bdu.fstec.ru/vul/2025-12142" type="self" id="BDU:2025-12142" title="BDU:2025-12142" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0032</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37843-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37843-8.0/" type="self" id="ROS-20260202-80-0032" title="ROS-20260202-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37843" type="cve" id="CVE-2025-37843" title="CVE-2025-37843" />
			<reference href="https://bdu.fstec.ru/vul/2025-12342" type="self" id="BDU:2025-12342" title="BDU:2025-12342" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0033</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37844-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37844-8.0/" type="self" id="ROS-20260202-80-0033" title="ROS-20260202-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37844" type="cve" id="CVE-2025-37844" title="CVE-2025-37844" />
			<reference href="https://bdu.fstec.ru/vul/2025-12141" type="self" id="BDU:2025-12141" title="BDU:2025-12141" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0034</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37845-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37845-8.0/" type="self" id="ROS-20260202-80-0034" title="ROS-20260202-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37845" type="cve" id="CVE-2025-37845" title="CVE-2025-37845" />
			<reference href="https://bdu.fstec.ru/vul/2025-12073" type="self" id="BDU:2025-12073" title="BDU:2025-12073" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0035</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37846-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37846-8.0/" type="self" id="ROS-20260202-80-0035" title="ROS-20260202-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37846" type="cve" id="CVE-2025-37846" title="CVE-2025-37846" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0036</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37847-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37847-8.0/" type="self" id="ROS-20260202-80-0036" title="ROS-20260202-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37847" type="cve" id="CVE-2025-37847" title="CVE-2025-37847" />
			<reference href="https://bdu.fstec.ru/vul/2025-12341" type="self" id="BDU:2025-12341" title="BDU:2025-12341" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0037</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37848-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37848-8.0/" type="self" id="ROS-20260202-80-0037" title="ROS-20260202-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37848" type="cve" id="CVE-2025-37848" title="CVE-2025-37848" />
			<reference href="https://bdu.fstec.ru/vul/2025-12340" type="self" id="BDU:2025-12340" title="BDU:2025-12340" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0038</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37849-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37849-8.0/" type="self" id="ROS-20260202-80-0038" title="ROS-20260202-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37849" type="cve" id="CVE-2025-37849" title="CVE-2025-37849" />
			<reference href="https://bdu.fstec.ru/vul/2025-12072" type="self" id="BDU:2025-12072" title="BDU:2025-12072" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0039</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37850-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37850-8.0/" type="self" id="ROS-20260202-80-0039" title="ROS-20260202-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37850" type="cve" id="CVE-2025-37850" title="CVE-2025-37850" />
			<reference href="https://bdu.fstec.ru/vul/2025-12002" type="self" id="BDU:2025-12002" title="BDU:2025-12002" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0040</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37851-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37851-8.0/" type="self" id="ROS-20260202-80-0040" title="ROS-20260202-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37851" type="cve" id="CVE-2025-37851" title="CVE-2025-37851" />
			<reference href="https://bdu.fstec.ru/vul/2025-12246" type="self" id="BDU:2025-12246" title="BDU:2025-12246" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0041</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37852-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37852-8.0/" type="self" id="ROS-20260202-80-0041" title="ROS-20260202-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37852" type="cve" id="CVE-2025-37852" title="CVE-2025-37852" />
			<reference href="https://bdu.fstec.ru/vul/2025-12140" type="self" id="BDU:2025-12140" title="BDU:2025-12140" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0042</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37854-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37854-8.0/" type="self" id="ROS-20260202-80-0042" title="ROS-20260202-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37854" type="cve" id="CVE-2025-37854" title="CVE-2025-37854" />
			<reference href="https://bdu.fstec.ru/vul/2025-12071" type="self" id="BDU:2025-12071" title="BDU:2025-12071" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0043</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37857-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37857-8.0/" type="self" id="ROS-20260202-80-0043" title="ROS-20260202-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37857" type="cve" id="CVE-2025-37857" title="CVE-2025-37857" />
			<reference href="https://bdu.fstec.ru/vul/2025-11867" type="self" id="BDU:2025-11867" title="BDU:2025-11867" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0044</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37858-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37858-8.0/" type="self" id="ROS-20260202-80-0044" title="ROS-20260202-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37858" type="cve" id="CVE-2025-37858" title="CVE-2025-37858" />
			<reference href="https://bdu.fstec.ru/vul/2025-11932" type="self" id="BDU:2025-11932" title="BDU:2025-11932" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0045</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37859-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37859-8.0/" type="self" id="ROS-20260202-80-0045" title="ROS-20260202-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37859" type="cve" id="CVE-2025-37859" title="CVE-2025-37859" />
			<reference href="https://bdu.fstec.ru/vul/2025-12353" type="self" id="BDU:2025-12353" title="BDU:2025-12353" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0046</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37862-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37862-8.0/" type="self" id="ROS-20260202-80-0046" title="ROS-20260202-80-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37862" type="cve" id="CVE-2025-37862" title="CVE-2025-37862" />
			<reference href="https://bdu.fstec.ru/vul/2025-12139" type="self" id="BDU:2025-12139" title="BDU:2025-12139" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0047</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37863-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37863-8.0/" type="self" id="ROS-20260202-80-0047" title="ROS-20260202-80-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37863" type="cve" id="CVE-2025-37863" title="CVE-2025-37863" />
			<reference href="https://bdu.fstec.ru/vul/2025-11931" type="self" id="BDU:2025-11931" title="BDU:2025-11931" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0048</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37865-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37865-8.0/" type="self" id="ROS-20260202-80-0048" title="ROS-20260202-80-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37865" type="cve" id="CVE-2025-37865" title="CVE-2025-37865" />
			<reference href="https://bdu.fstec.ru/vul/2025-12275" type="self" id="BDU:2025-12275" title="BDU:2025-12275" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0049</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37867-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37867-8.0/" type="self" id="ROS-20260202-80-0049" title="ROS-20260202-80-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37867" type="cve" id="CVE-2025-37867" title="CVE-2025-37867" />
			<reference href="https://bdu.fstec.ru/vul/2025-12285" type="self" id="BDU:2025-12285" title="BDU:2025-12285" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0050</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37868-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37868-8.0/" type="self" id="ROS-20260202-80-0050" title="ROS-20260202-80-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37868" type="cve" id="CVE-2025-37868" title="CVE-2025-37868" />
			<reference href="https://bdu.fstec.ru/vul/2025-12339" type="self" id="BDU:2025-12339" title="BDU:2025-12339" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0051</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37869-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37869-8.0/" type="self" id="ROS-20260202-80-0051" title="ROS-20260202-80-0051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37869" type="cve" id="CVE-2025-37869" title="CVE-2025-37869" />
			<reference href="https://bdu.fstec.ru/vul/2025-12070" type="self" id="BDU:2025-12070" title="BDU:2025-12070" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0052</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37872-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37872-8.0/" type="self" id="ROS-20260202-80-0052" title="ROS-20260202-80-0052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37872" type="cve" id="CVE-2025-37872" title="CVE-2025-37872" />
			<reference href="https://bdu.fstec.ru/vul/2025-12060" type="self" id="BDU:2025-12060" title="BDU:2025-12060" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0053</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37873-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37873-8.0/" type="self" id="ROS-20260202-80-0053" title="ROS-20260202-80-0053" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37873" type="cve" id="CVE-2025-37873" title="CVE-2025-37873" />
			<reference href="https://bdu.fstec.ru/vul/2025-11797" type="self" id="BDU:2025-11797" title="BDU:2025-11797" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0054</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37874-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37874-8.0/" type="self" id="ROS-20260202-80-0054" title="ROS-20260202-80-0054" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37874" type="cve" id="CVE-2025-37874" title="CVE-2025-37874" />
			<reference href="https://bdu.fstec.ru/vul/2025-12059" type="self" id="BDU:2025-12059" title="BDU:2025-12059" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0055</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37875-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37875-8.0/" type="self" id="ROS-20260202-80-0055" title="ROS-20260202-80-0055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37875" type="cve" id="CVE-2025-37875" title="CVE-2025-37875" />
			<reference href="https://bdu.fstec.ru/vul/2025-12138" type="self" id="BDU:2025-12138" title="BDU:2025-12138" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0056</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37879-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37879-8.0/" type="self" id="ROS-20260202-80-0056" title="ROS-20260202-80-0056" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37879" type="cve" id="CVE-2025-37879" title="CVE-2025-37879" />
			<reference href="https://bdu.fstec.ru/vul/2025-12137" type="self" id="BDU:2025-12137" title="BDU:2025-12137" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0057</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37881-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37881-8.0/" type="self" id="ROS-20260202-80-0057" title="ROS-20260202-80-0057" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37881" type="cve" id="CVE-2025-37881" title="CVE-2025-37881" />
			<reference href="https://bdu.fstec.ru/vul/2025-12136" type="self" id="BDU:2025-12136" title="BDU:2025-12136" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0058</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37883-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37883-8.0/" type="self" id="ROS-20260202-80-0058" title="ROS-20260202-80-0058" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37883" type="cve" id="CVE-2025-37883" title="CVE-2025-37883" />
			<reference href="https://bdu.fstec.ru/vul/2025-11906" type="self" id="BDU:2025-11906" title="BDU:2025-11906" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0059</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37884-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37884-8.0/" type="self" id="ROS-20260202-80-0059" title="ROS-20260202-80-0059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37884" type="cve" id="CVE-2025-37884" title="CVE-2025-37884" />
			<reference href="https://bdu.fstec.ru/vul/2025-12338" type="self" id="BDU:2025-12338" title="BDU:2025-12338" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0060</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37885-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37885-8.0/" type="self" id="ROS-20260202-80-0060" title="ROS-20260202-80-0060" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37885" type="cve" id="CVE-2025-37885" title="CVE-2025-37885" />
			<reference href="https://bdu.fstec.ru/vul/2025-12069" type="self" id="BDU:2025-12069" title="BDU:2025-12069" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0061</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37886-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37886-8.0/" type="self" id="ROS-20260202-80-0061" title="ROS-20260202-80-0061" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37886" type="cve" id="CVE-2025-37886" title="CVE-2025-37886" />
			<reference href="https://bdu.fstec.ru/vul/2025-11852" type="self" id="BDU:2025-11852" title="BDU:2025-11852" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0062</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37887-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37887-8.0/" type="self" id="ROS-20260202-80-0062" title="ROS-20260202-80-0062" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37887" type="cve" id="CVE-2025-37887" title="CVE-2025-37887" />
			<reference href="https://bdu.fstec.ru/vul/2025-12244" type="self" id="BDU:2025-12244" title="BDU:2025-12244" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0063</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37888-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37888-8.0/" type="self" id="ROS-20260202-80-0063" title="ROS-20260202-80-0063" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37888" type="cve" id="CVE-2025-37888" title="CVE-2025-37888" />
			<reference href="https://bdu.fstec.ru/vul/2025-12135" type="self" id="BDU:2025-12135" title="BDU:2025-12135" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260202-80-0064</id>
		<issued date="2026-02-02" />
		<updated date="2026-02-02" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2023-53145-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2023-53145-8.0/" type="self" id="ROS-20260202-80-0064" title="ROS-20260202-80-0064" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53145" type="cve" id="CVE-2023-53145" title="CVE-2023-53145" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0001</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37820-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37820-8.0/" type="self" id="ROS-20260203-80-0001" title="ROS-20260203-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37820" type="cve" id="CVE-2025-37820" title="CVE-2025-37820" />
			<reference href="https://bdu.fstec.ru/vul/2025-12150" type="self" id="BDU:2025-12150" title="BDU:2025-12150" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0002</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37924-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37924-8.0/" type="self" id="ROS-20260203-80-0002" title="ROS-20260203-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37924" type="cve" id="CVE-2025-37924" title="CVE-2025-37924" />
			<reference href="https://bdu.fstec.ru/vul/2025-12068" type="self" id="BDU:2025-12068" title="BDU:2025-12068" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0003</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37923-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37923-8.0/" type="self" id="ROS-20260203-80-0003" title="ROS-20260203-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37923" type="cve" id="CVE-2025-37923" title="CVE-2025-37923" />
			<reference href="https://bdu.fstec.ru/vul/2025-11866" type="self" id="BDU:2025-11866" title="BDU:2025-11866" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0004</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37922-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37922-8.0/" type="self" id="ROS-20260203-80-0004" title="ROS-20260203-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37922" type="cve" id="CVE-2025-37922" title="CVE-2025-37922" />
			<reference href="https://bdu.fstec.ru/vul/2025-12131" type="self" id="BDU:2025-12131" title="BDU:2025-12131" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0005</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37921-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37921-8.0/" type="self" id="ROS-20260203-80-0005" title="ROS-20260203-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37921" type="cve" id="CVE-2025-37921" title="CVE-2025-37921" />
			<reference href="https://bdu.fstec.ru/vul/2025-11830" type="self" id="BDU:2025-11830" title="BDU:2025-11830" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0006</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37919-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37919-8.0/" type="self" id="ROS-20260203-80-0006" title="ROS-20260203-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37919" type="cve" id="CVE-2025-37919" title="CVE-2025-37919" />
			<reference href="https://bdu.fstec.ru/vul/2025-12132" type="self" id="BDU:2025-12132" title="BDU:2025-12132" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0007</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37918-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37918-8.0/" type="self" id="ROS-20260203-80-0007" title="ROS-20260203-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37918" type="cve" id="CVE-2025-37918" title="CVE-2025-37918" />
			<reference href="https://bdu.fstec.ru/vul/2025-12133" type="self" id="BDU:2025-12133" title="BDU:2025-12133" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0008</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37917-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37917-8.0/" type="self" id="ROS-20260203-80-0008" title="ROS-20260203-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37917" type="cve" id="CVE-2025-37917" title="CVE-2025-37917" />
			<reference href="https://bdu.fstec.ru/vul/2025-12273" type="self" id="BDU:2025-12273" title="BDU:2025-12273" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0009</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37916-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37916-8.0/" type="self" id="ROS-20260203-80-0009" title="ROS-20260203-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37916" type="cve" id="CVE-2025-37916" title="CVE-2025-37916" />
			<reference href="https://bdu.fstec.ru/vul/2025-11814" type="self" id="BDU:2025-11814" title="BDU:2025-11814" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0010</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37915-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37915-8.0/" type="self" id="ROS-20260203-80-0010" title="ROS-20260203-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37915" type="cve" id="CVE-2025-37915" title="CVE-2025-37915" />
			<reference href="https://bdu.fstec.ru/vul/2025-11998" type="self" id="BDU:2025-11998" title="BDU:2025-11998" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0011</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37914-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37914-8.0/" type="self" id="ROS-20260203-80-0011" title="ROS-20260203-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37914" type="cve" id="CVE-2025-37914" title="CVE-2025-37914" />
			<reference href="https://bdu.fstec.ru/vul/2025-11857" type="self" id="BDU:2025-11857" title="BDU:2025-11857" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0012</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37913-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37913-8.0/" type="self" id="ROS-20260203-80-0012" title="ROS-20260203-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37913" type="cve" id="CVE-2025-37913" title="CVE-2025-37913" />
			<reference href="https://bdu.fstec.ru/vul/2025-11999" type="self" id="BDU:2025-11999" title="BDU:2025-11999" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0013</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37912-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37912-8.0/" type="self" id="ROS-20260203-80-0013" title="ROS-20260203-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37912" type="cve" id="CVE-2025-37912" title="CVE-2025-37912" />
			<reference href="https://bdu.fstec.ru/vul/2025-12134" type="self" id="BDU:2025-12134" title="BDU:2025-12134" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0014</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37911-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37911-8.0/" type="self" id="ROS-20260203-80-0014" title="ROS-20260203-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37911" type="cve" id="CVE-2025-37911" title="CVE-2025-37911" />
			<reference href="https://bdu.fstec.ru/vul/2025-11815" type="self" id="BDU:2025-11815" title="BDU:2025-11815" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0015</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37910-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37910-8.0/" type="self" id="ROS-20260203-80-0015" title="ROS-20260203-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37910" type="cve" id="CVE-2025-37910" title="CVE-2025-37910" />
			<reference href="https://bdu.fstec.ru/vul/2025-12328" type="self" id="BDU:2025-12328" title="BDU:2025-12328" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0016</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37909-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37909-8.0/" type="self" id="ROS-20260203-80-0016" title="ROS-20260203-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37909" type="cve" id="CVE-2025-37909" title="CVE-2025-37909" />
			<reference href="https://bdu.fstec.ru/vul/2025-12033" type="self" id="BDU:2025-12033" title="BDU:2025-12033" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0017</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37908-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37908-8.0/" type="self" id="ROS-20260203-80-0017" title="ROS-20260203-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37908" type="cve" id="CVE-2025-37908" title="CVE-2025-37908" />
			<reference href="https://bdu.fstec.ru/vul/2025-12292" type="self" id="BDU:2025-12292" title="BDU:2025-12292" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0018</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37905-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37905-8.0/" type="self" id="ROS-20260203-80-0018" title="ROS-20260203-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37905" type="cve" id="CVE-2025-37905" title="CVE-2025-37905" />
			<reference href="https://bdu.fstec.ru/vul/2025-12367" type="self" id="BDU:2025-12367" title="BDU:2025-12367" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0019</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37903-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37903-8.0/" type="self" id="ROS-20260203-80-0019" title="ROS-20260203-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37903" type="cve" id="CVE-2025-37903" title="CVE-2025-37903" />
			<reference href="https://bdu.fstec.ru/vul/2025-12368" type="self" id="BDU:2025-12368" title="BDU:2025-12368" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0020</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37927-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37927-8.0/" type="self" id="ROS-20260203-80-0020" title="ROS-20260203-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37927" type="cve" id="CVE-2025-37927" title="CVE-2025-37927" />
			<reference href="https://bdu.fstec.ru/vul/2025-11924" type="self" id="BDU:2025-11924" title="BDU:2025-11924" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0021</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37928-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37928-8.0/" type="self" id="ROS-20260203-80-0021" title="ROS-20260203-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37928" type="cve" id="CVE-2025-37928" title="CVE-2025-37928" />
			<reference href="https://bdu.fstec.ru/vul/2025-11838" type="self" id="BDU:2025-11838" title="BDU:2025-11838" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0022</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37930-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37930-8.0/" type="self" id="ROS-20260203-80-0022" title="ROS-20260203-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37930" type="cve" id="CVE-2025-37930" title="CVE-2025-37930" />
			<reference href="https://bdu.fstec.ru/vul/2025-11829" type="self" id="BDU:2025-11829" title="BDU:2025-11829" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0023</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37931-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37931-8.0/" type="self" id="ROS-20260203-80-0023" title="ROS-20260203-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37931" type="cve" id="CVE-2025-37931" title="CVE-2025-37931" />
			<reference href="https://bdu.fstec.ru/vul/2025-15159" type="self" id="BDU:2025-15159" title="BDU:2025-15159" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0024</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37932-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37932-8.0/" type="self" id="ROS-20260203-80-0024" title="ROS-20260203-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37932" type="cve" id="CVE-2025-37932" title="CVE-2025-37932" />
			<reference href="https://bdu.fstec.ru/vul/2025-11828" type="self" id="BDU:2025-11828" title="BDU:2025-11828" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0025</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37933-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37933-8.0/" type="self" id="ROS-20260203-80-0025" title="ROS-20260203-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37933" type="cve" id="CVE-2025-37933" title="CVE-2025-37933" />
			<reference href="https://bdu.fstec.ru/vul/2025-11902" type="self" id="BDU:2025-11902" title="BDU:2025-11902" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0026</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37934-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37934-8.0/" type="self" id="ROS-20260203-80-0026" title="ROS-20260203-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37934" type="cve" id="CVE-2025-37934" title="CVE-2025-37934" />
			<reference href="https://bdu.fstec.ru/vul/2025-12327" type="self" id="BDU:2025-12327" title="BDU:2025-12327" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0027</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37935-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37935-8.0/" type="self" id="ROS-20260203-80-0027" title="ROS-20260203-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37935" type="cve" id="CVE-2025-37935" title="CVE-2025-37935" />
			<reference href="https://bdu.fstec.ru/vul/2025-11989" type="self" id="BDU:2025-11989" title="BDU:2025-11989" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0028</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37936-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37936-8.0/" type="self" id="ROS-20260203-80-0028" title="ROS-20260203-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37936" type="cve" id="CVE-2025-37936" title="CVE-2025-37936" />
			<reference href="https://bdu.fstec.ru/vul/2025-12130" type="self" id="BDU:2025-12130" title="BDU:2025-12130" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0029</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37937-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37937-8.0/" type="self" id="ROS-20260203-80-0029" title="ROS-20260203-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37937" type="cve" id="CVE-2025-37937" title="CVE-2025-37937" />
			<reference href="https://bdu.fstec.ru/vul/2025-12001" type="self" id="BDU:2025-12001" title="BDU:2025-12001" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0030</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37938-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37938-8.0/" type="self" id="ROS-20260203-80-0030" title="ROS-20260203-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37938" type="cve" id="CVE-2025-37938" title="CVE-2025-37938" />
			<reference href="https://bdu.fstec.ru/vul/2025-12129" type="self" id="BDU:2025-12129" title="BDU:2025-12129" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0031</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37940-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37940-8.0/" type="self" id="ROS-20260203-80-0031" title="ROS-20260203-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37940" type="cve" id="CVE-2025-37940" title="CVE-2025-37940" />
			<reference href="https://bdu.fstec.ru/vul/2025-12352" type="self" id="BDU:2025-12352" title="BDU:2025-12352" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0032</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37941-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37941-8.0/" type="self" id="ROS-20260203-80-0032" title="ROS-20260203-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37941" type="cve" id="CVE-2025-37941" title="CVE-2025-37941" />
			<reference href="https://bdu.fstec.ru/vul/2025-11795" type="self" id="BDU:2025-11795" title="BDU:2025-11795" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0033</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37948-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37948-8.0/" type="self" id="ROS-20260203-80-0033" title="ROS-20260203-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37948" type="cve" id="CVE-2025-37948" title="CVE-2025-37948" />
			<reference href="https://bdu.fstec.ru/vul/2025-11929" type="self" id="BDU:2025-11929" title="BDU:2025-11929" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0034</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37949-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37949-8.0/" type="self" id="ROS-20260203-80-0034" title="ROS-20260203-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37949" type="cve" id="CVE-2025-37949" title="CVE-2025-37949" />
			<reference href="https://bdu.fstec.ru/vul/2025-12256" type="self" id="BDU:2025-12256" title="BDU:2025-12256" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0035</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37951-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37951-8.0/" type="self" id="ROS-20260203-80-0035" title="ROS-20260203-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37951" type="cve" id="CVE-2025-37951" title="CVE-2025-37951" />
			<reference href="https://bdu.fstec.ru/vul/2025-12032" type="self" id="BDU:2025-12032" title="BDU:2025-12032" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0036</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37955-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37955-8.0/" type="self" id="ROS-20260203-80-0036" title="ROS-20260203-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37955" type="cve" id="CVE-2025-37955" title="CVE-2025-37955" />
			<reference href="https://bdu.fstec.ru/vul/2025-12031" type="self" id="BDU:2025-12031" title="BDU:2025-12031" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0037</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37958-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37958-8.0/" type="self" id="ROS-20260203-80-0037" title="ROS-20260203-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37958" type="cve" id="CVE-2025-37958" title="CVE-2025-37958" />
			<reference href="https://bdu.fstec.ru/vul/2025-14979" type="self" id="BDU:2025-14979" title="BDU:2025-14979" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0038</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37959-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37959-8.0/" type="self" id="ROS-20260203-80-0038" title="ROS-20260203-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37959" type="cve" id="CVE-2025-37959" title="CVE-2025-37959" />
			<reference href="https://bdu.fstec.ru/vul/2025-12272" type="self" id="BDU:2025-12272" title="BDU:2025-12272" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0039</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37960-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37960-8.0/" type="self" id="ROS-20260203-80-0039" title="ROS-20260203-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37960" type="cve" id="CVE-2025-37960" title="CVE-2025-37960" />
			<reference href="https://bdu.fstec.ru/vul/2025-12291" type="self" id="BDU:2025-12291" title="BDU:2025-12291" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0040</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37961-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37961-8.0/" type="self" id="ROS-20260203-80-0040" title="ROS-20260203-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37961" type="cve" id="CVE-2025-37961" title="CVE-2025-37961" />
			<reference href="https://bdu.fstec.ru/vul/2025-11793" type="self" id="BDU:2025-11793" title="BDU:2025-11793" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0041</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37963-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37963-8.0/" type="self" id="ROS-20260203-80-0041" title="ROS-20260203-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37963" type="cve" id="CVE-2025-37963" title="CVE-2025-37963" />
			<reference href="https://bdu.fstec.ru/vul/2025-11928" type="self" id="BDU:2025-11928" title="BDU:2025-11928" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0042</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37964-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37964-8.0/" type="self" id="ROS-20260203-80-0042" title="ROS-20260203-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37964" type="cve" id="CVE-2025-37964" title="CVE-2025-37964" />
			<reference href="https://bdu.fstec.ru/vul/2025-12020" type="self" id="BDU:2025-12020" title="BDU:2025-12020" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0043</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37967-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37967-8.0/" type="self" id="ROS-20260203-80-0043" title="ROS-20260203-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37967" type="cve" id="CVE-2025-37967" title="CVE-2025-37967" />
			<reference href="https://bdu.fstec.ru/vul/2025-12336" type="self" id="BDU:2025-12336" title="BDU:2025-12336" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0044</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37968-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37968-8.0/" type="self" id="ROS-20260203-80-0044" title="ROS-20260203-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37968" type="cve" id="CVE-2025-37968" title="CVE-2025-37968" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0045</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37969-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37969-8.0/" type="self" id="ROS-20260203-80-0045" title="ROS-20260203-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37969" type="cve" id="CVE-2025-37969" title="CVE-2025-37969" />
			<reference href="https://bdu.fstec.ru/vul/2025-12351" type="self" id="BDU:2025-12351" title="BDU:2025-12351" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0046</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37970-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37970-8.0/" type="self" id="ROS-20260203-80-0046" title="ROS-20260203-80-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37970" type="cve" id="CVE-2025-37970" title="CVE-2025-37970" />
			<reference href="https://bdu.fstec.ru/vul/2025-12350" type="self" id="BDU:2025-12350" title="BDU:2025-12350" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0047</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37971-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37971-8.0/" type="self" id="ROS-20260203-80-0047" title="ROS-20260203-80-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37971" type="cve" id="CVE-2025-37971" title="CVE-2025-37971" />
			<reference href="https://bdu.fstec.ru/vul/2025-12127" type="self" id="BDU:2025-12127" title="BDU:2025-12127" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0048</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37972-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37972-8.0/" type="self" id="ROS-20260203-80-0048" title="ROS-20260203-80-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37972" type="cve" id="CVE-2025-37972" title="CVE-2025-37972" />
			<reference href="https://bdu.fstec.ru/vul/2025-12126" type="self" id="BDU:2025-12126" title="BDU:2025-12126" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0049</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37973-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37973-8.0/" type="self" id="ROS-20260203-80-0049" title="ROS-20260203-80-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37973" type="cve" id="CVE-2025-37973" title="CVE-2025-37973" />
			<reference href="https://bdu.fstec.ru/vul/2025-11864" type="self" id="BDU:2025-11864" title="BDU:2025-11864" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0050</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37974-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37974-8.0/" type="self" id="ROS-20260203-80-0050" title="ROS-20260203-80-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37974" type="cve" id="CVE-2025-37974" title="CVE-2025-37974" />
			<reference href="https://bdu.fstec.ru/vul/2025-12125" type="self" id="BDU:2025-12125" title="BDU:2025-12125" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0051</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37975-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37975-8.0/" type="self" id="ROS-20260203-80-0051" title="ROS-20260203-80-0051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37975" type="cve" id="CVE-2025-37975" title="CVE-2025-37975" />
			<reference href="https://bdu.fstec.ru/vul/2025-11863" type="self" id="BDU:2025-11863" title="BDU:2025-11863" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0052</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37978-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37978-8.0/" type="self" id="ROS-20260203-80-0052" title="ROS-20260203-80-0052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37978" type="cve" id="CVE-2025-37978" title="CVE-2025-37978" />
			<reference href="https://bdu.fstec.ru/vul/2025-11837" type="self" id="BDU:2025-11837" title="BDU:2025-11837" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0053</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37979-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37979-8.0/" type="self" id="ROS-20260203-80-0053" title="ROS-20260203-80-0053" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37979" type="cve" id="CVE-2025-37979" title="CVE-2025-37979" />
			<reference href="https://bdu.fstec.ru/vul/2025-11836" type="self" id="BDU:2025-11836" title="BDU:2025-11836" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0054</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37981-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37981-8.0/" type="self" id="ROS-20260203-80-0054" title="ROS-20260203-80-0054" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37981" type="cve" id="CVE-2025-37981" title="CVE-2025-37981" />
			<reference href="https://bdu.fstec.ru/vul/2025-11812" type="self" id="BDU:2025-11812" title="BDU:2025-11812" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0055</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37982-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37982-8.0/" type="self" id="ROS-20260203-80-0055" title="ROS-20260203-80-0055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37982" type="cve" id="CVE-2025-37982" title="CVE-2025-37982" />
			<reference href="https://bdu.fstec.ru/vul/2025-12029" type="self" id="BDU:2025-12029" title="BDU:2025-12029" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0056</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37983-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37983-8.0/" type="self" id="ROS-20260203-80-0056" title="ROS-20260203-80-0056" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37983" type="cve" id="CVE-2025-37983" title="CVE-2025-37983" />
			<reference href="https://bdu.fstec.ru/vul/2025-12290" type="self" id="BDU:2025-12290" title="BDU:2025-12290" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0057</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37985-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37985-8.0/" type="self" id="ROS-20260203-80-0057" title="ROS-20260203-80-0057" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37985" type="cve" id="CVE-2025-37985" title="CVE-2025-37985" />
			<reference href="https://bdu.fstec.ru/vul/2025-12335" type="self" id="BDU:2025-12335" title="BDU:2025-12335" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0058</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37986-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37986-8.0/" type="self" id="ROS-20260203-80-0058" title="ROS-20260203-80-0058" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37986" type="cve" id="CVE-2025-37986" title="CVE-2025-37986" />
			<reference href="https://bdu.fstec.ru/vul/2025-12015" type="self" id="BDU:2025-12015" title="BDU:2025-12015" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0059</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37987-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37987-8.0/" type="self" id="ROS-20260203-80-0059" title="ROS-20260203-80-0059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37987" type="cve" id="CVE-2025-37987" title="CVE-2025-37987" />
			<reference href="https://bdu.fstec.ru/vul/2025-11791" type="self" id="BDU:2025-11791" title="BDU:2025-11791" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0060</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37988-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37988-8.0/" type="self" id="ROS-20260203-80-0060" title="ROS-20260203-80-0060" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37988" type="cve" id="CVE-2025-37988" title="CVE-2025-37988" />
			<reference href="https://bdu.fstec.ru/vul/2025-12366" type="self" id="BDU:2025-12366" title="BDU:2025-12366" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0061</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37989-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37989-8.0/" type="self" id="ROS-20260203-80-0061" title="ROS-20260203-80-0061" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37989" type="cve" id="CVE-2025-37989" title="CVE-2025-37989" />
			<reference href="https://bdu.fstec.ru/vul/2025-12028" type="self" id="BDU:2025-12028" title="BDU:2025-12028" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0062</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37990-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37990-8.0/" type="self" id="ROS-20260203-80-0062" title="ROS-20260203-80-0062" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37990" type="cve" id="CVE-2025-37990" title="CVE-2025-37990" />
			<reference href="https://bdu.fstec.ru/vul/2025-12333" type="self" id="BDU:2025-12333" title="BDU:2025-12333" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0063</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37991-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37991-8.0/" type="self" id="ROS-20260203-80-0063" title="ROS-20260203-80-0063" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37991" type="cve" id="CVE-2025-37991" title="CVE-2025-37991" />
			<reference href="https://bdu.fstec.ru/vul/2025-11790" type="self" id="BDU:2025-11790" title="BDU:2025-11790" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0064</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37992-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37992-8.0/" type="self" id="ROS-20260203-80-0064" title="ROS-20260203-80-0064" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37992" type="cve" id="CVE-2025-37992" title="CVE-2025-37992" />
			<reference href="https://bdu.fstec.ru/vul/2025-12124" type="self" id="BDU:2025-12124" title="BDU:2025-12124" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0065</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37993-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37993-8.0/" type="self" id="ROS-20260203-80-0065" title="ROS-20260203-80-0065" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37993" type="cve" id="CVE-2025-37993" title="CVE-2025-37993" />
			<reference href="https://bdu.fstec.ru/vul/2025-12242" type="self" id="BDU:2025-12242" title="BDU:2025-12242" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0066</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37994-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37994-8.0/" type="self" id="ROS-20260203-80-0066" title="ROS-20260203-80-0066" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37994" type="cve" id="CVE-2025-37994" title="CVE-2025-37994" />
			<reference href="https://bdu.fstec.ru/vul/2025-12123" type="self" id="BDU:2025-12123" title="BDU:2025-12123" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0067</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37995-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37995-8.0/" type="self" id="ROS-20260203-80-0067" title="ROS-20260203-80-0067" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37995" type="cve" id="CVE-2025-37995" title="CVE-2025-37995" />
			<reference href="https://bdu.fstec.ru/vul/2025-12334" type="self" id="BDU:2025-12334" title="BDU:2025-12334" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260203-80-0068</id>
		<issued date="2026-02-03" />
		<updated date="2026-02-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37997-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37997-8.0/" type="self" id="ROS-20260203-80-0068" title="ROS-20260203-80-0068" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37997" type="cve" id="CVE-2025-37997" title="CVE-2025-37997" />
			<reference href="https://bdu.fstec.ru/vul/2025-11988" type="self" id="BDU:2025-11988" title="BDU:2025-11988" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0001</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38004-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38004-8.0/" type="self" id="ROS-20260205-80-0001" title="ROS-20260205-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38004" type="cve" id="CVE-2025-38004" title="CVE-2025-38004" />
			<reference href="https://bdu.fstec.ru/vul/2025-11862" type="self" id="BDU:2025-11862" title="BDU:2025-11862" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0002</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38005-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38005-8.0/" type="self" id="ROS-20260205-80-0002" title="ROS-20260205-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38005" type="cve" id="CVE-2025-38005" title="CVE-2025-38005" />
			<reference href="https://bdu.fstec.ru/vul/2025-12014" type="self" id="BDU:2025-12014" title="BDU:2025-12014" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0003</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38007-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38007-8.0/" type="self" id="ROS-20260205-80-0003" title="ROS-20260205-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38007" type="cve" id="CVE-2025-38007" title="CVE-2025-38007" />
			<reference href="https://bdu.fstec.ru/vul/2025-09038" type="self" id="BDU:2025-09038" title="BDU:2025-09038" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0004</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38008-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38008-8.0/" type="self" id="ROS-20260205-80-0004" title="ROS-20260205-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38008" type="cve" id="CVE-2025-38008" title="CVE-2025-38008" />
			<reference href="https://bdu.fstec.ru/vul/2025-09040" type="self" id="BDU:2025-09040" title="BDU:2025-09040" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0005</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38009-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38009-8.0/" type="self" id="ROS-20260205-80-0005" title="ROS-20260205-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38009" type="cve" id="CVE-2025-38009" title="CVE-2025-38009" />
			<reference href="https://bdu.fstec.ru/vul/2025-09039" type="self" id="BDU:2025-09039" title="BDU:2025-09039" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0006</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38010-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38010-8.0/" type="self" id="ROS-20260205-80-0006" title="ROS-20260205-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38010" type="cve" id="CVE-2025-38010" title="CVE-2025-38010" />
			<reference href="https://bdu.fstec.ru/vul/2025-09044" type="self" id="BDU:2025-09044" title="BDU:2025-09044" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0007</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38012-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38012-8.0/" type="self" id="ROS-20260205-80-0007" title="ROS-20260205-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38012" type="cve" id="CVE-2025-38012" title="CVE-2025-38012" />
			<reference href="https://bdu.fstec.ru/vul/2025-09036" type="self" id="BDU:2025-09036" title="BDU:2025-09036" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0008</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38013-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38013-8.0/" type="self" id="ROS-20260205-80-0008" title="ROS-20260205-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38013" type="cve" id="CVE-2025-38013" title="CVE-2025-38013" />
			<reference href="https://bdu.fstec.ru/vul/2025-09034" type="self" id="BDU:2025-09034" title="BDU:2025-09034" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0009</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38015-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38015-8.0/" type="self" id="ROS-20260205-80-0009" title="ROS-20260205-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38015" type="cve" id="CVE-2025-38015" title="CVE-2025-38015" />
			<reference href="https://bdu.fstec.ru/vul/2025-09037" type="self" id="BDU:2025-09037" title="BDU:2025-09037" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0010</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38016-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38016-8.0/" type="self" id="ROS-20260205-80-0010" title="ROS-20260205-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38016" type="cve" id="CVE-2025-38016" title="CVE-2025-38016" />
			<reference href="https://bdu.fstec.ru/vul/2025-09045" type="self" id="BDU:2025-09045" title="BDU:2025-09045" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0011</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38018-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38018-8.0/" type="self" id="ROS-20260205-80-0011" title="ROS-20260205-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38018" type="cve" id="CVE-2025-38018" title="CVE-2025-38018" />
			<reference href="https://bdu.fstec.ru/vul/2025-10609" type="self" id="BDU:2025-10609" title="BDU:2025-10609" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0012</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38019-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38019-8.0/" type="self" id="ROS-20260205-80-0012" title="ROS-20260205-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38019" type="cve" id="CVE-2025-38019" title="CVE-2025-38019" />
			<reference href="https://bdu.fstec.ru/vul/2025-10759" type="self" id="BDU:2025-10759" title="BDU:2025-10759" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0013</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38020-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38020-8.0/" type="self" id="ROS-20260205-80-0013" title="ROS-20260205-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38020" type="cve" id="CVE-2025-38020" title="CVE-2025-38020" />
			<reference href="https://bdu.fstec.ru/vul/2025-10610" type="self" id="BDU:2025-10610" title="BDU:2025-10610" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0014</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38023-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38023-8.0/" type="self" id="ROS-20260205-80-0014" title="ROS-20260205-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38023" type="cve" id="CVE-2025-38023" title="CVE-2025-38023" />
			<reference href="https://bdu.fstec.ru/vul/2025-10614" type="self" id="BDU:2025-10614" title="BDU:2025-10614" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0015</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38024-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38024-8.0/" type="self" id="ROS-20260205-80-0015" title="ROS-20260205-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38024" type="cve" id="CVE-2025-38024" title="CVE-2025-38024" />
			<reference href="https://bdu.fstec.ru/vul/2025-10613" type="self" id="BDU:2025-10613" title="BDU:2025-10613" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0016</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38027-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38027-8.0/" type="self" id="ROS-20260205-80-0016" title="ROS-20260205-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38027" type="cve" id="CVE-2025-38027" title="CVE-2025-38027" />
			<reference href="https://bdu.fstec.ru/vul/2025-11764" type="self" id="BDU:2025-11764" title="BDU:2025-11764" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0017</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38031-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38031-8.0/" type="self" id="ROS-20260205-80-0017" title="ROS-20260205-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38031" type="cve" id="CVE-2025-38031" title="CVE-2025-38031" />
			<reference href="https://bdu.fstec.ru/vul/2025-09006" type="self" id="BDU:2025-09006" title="BDU:2025-09006" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0018</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38034-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38034-8.0/" type="self" id="ROS-20260205-80-0018" title="ROS-20260205-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38034" type="cve" id="CVE-2025-38034" title="CVE-2025-38034" />
			<reference href="https://bdu.fstec.ru/vul/2025-08788" type="self" id="BDU:2025-08788" title="BDU:2025-08788" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0019</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38035-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38035-8.0/" type="self" id="ROS-20260205-80-0019" title="ROS-20260205-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38035" type="cve" id="CVE-2025-38035" title="CVE-2025-38035" />
			<reference href="https://bdu.fstec.ru/vul/2025-10762" type="self" id="BDU:2025-10762" title="BDU:2025-10762" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0020</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38037-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38037-8.0/" type="self" id="ROS-20260205-80-0020" title="ROS-20260205-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38037" type="cve" id="CVE-2025-38037" title="CVE-2025-38037" />
			<reference href="https://bdu.fstec.ru/vul/2025-08789" type="self" id="BDU:2025-08789" title="BDU:2025-08789" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0021</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38040-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38040-8.0/" type="self" id="ROS-20260205-80-0021" title="ROS-20260205-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38040" type="cve" id="CVE-2025-38040" title="CVE-2025-38040" />
			<reference href="https://bdu.fstec.ru/vul/2025-08793" type="self" id="BDU:2025-08793" title="BDU:2025-08793" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0022</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38043-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38043-8.0/" type="self" id="ROS-20260205-80-0022" title="ROS-20260205-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38043" type="cve" id="CVE-2025-38043" title="CVE-2025-38043" />
			<reference href="https://bdu.fstec.ru/vul/2025-08917" type="self" id="BDU:2025-08917" title="BDU:2025-08917" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0023</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38044-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38044-8.0/" type="self" id="ROS-20260205-80-0023" title="ROS-20260205-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38044" type="cve" id="CVE-2025-38044" title="CVE-2025-38044" />
			<reference href="https://bdu.fstec.ru/vul/2025-08916" type="self" id="BDU:2025-08916" title="BDU:2025-08916" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0024</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38046-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38046-8.0/" type="self" id="ROS-20260205-80-0024" title="ROS-20260205-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38046" type="cve" id="CVE-2025-38046" title="CVE-2025-38046" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0025</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38048-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38048-8.0/" type="self" id="ROS-20260205-80-0025" title="ROS-20260205-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38048" type="cve" id="CVE-2025-38048" title="CVE-2025-38048" />
			<reference href="https://bdu.fstec.ru/vul/2025-08792" type="self" id="BDU:2025-08792" title="BDU:2025-08792" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0026</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38051-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38051-8.0/" type="self" id="ROS-20260205-80-0026" title="ROS-20260205-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38051" type="cve" id="CVE-2025-38051" title="CVE-2025-38051" />
			<reference href="https://bdu.fstec.ru/vul/2025-12107" type="self" id="BDU:2025-12107" title="BDU:2025-12107" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0027</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38052-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38052-8.0/" type="self" id="ROS-20260205-80-0027" title="ROS-20260205-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38052" type="cve" id="CVE-2025-38052" title="CVE-2025-38052" />
			<reference href="https://bdu.fstec.ru/vul/2025-08915" type="self" id="BDU:2025-08915" title="BDU:2025-08915" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0028</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38053-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38053-8.0/" type="self" id="ROS-20260205-80-0028" title="ROS-20260205-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38053" type="cve" id="CVE-2025-38053" title="CVE-2025-38053" />
			<reference href="https://bdu.fstec.ru/vul/2025-12121" type="self" id="BDU:2025-12121" title="BDU:2025-12121" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0029</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38054-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38054-8.0/" type="self" id="ROS-20260205-80-0029" title="ROS-20260205-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38054" type="cve" id="CVE-2025-38054" title="CVE-2025-38054" />
			<reference href="https://bdu.fstec.ru/vul/2025-12326" type="self" id="BDU:2025-12326" title="BDU:2025-12326" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0030</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38055-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38055-8.0/" type="self" id="ROS-20260205-80-0030" title="ROS-20260205-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38055" type="cve" id="CVE-2025-38055" title="CVE-2025-38055" />
			<reference href="https://bdu.fstec.ru/vul/2025-12120" type="self" id="BDU:2025-12120" title="BDU:2025-12120" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0031</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38056-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38056-8.0/" type="self" id="ROS-20260205-80-0031" title="ROS-20260205-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38056" type="cve" id="CVE-2025-38056" title="CVE-2025-38056" />
			<reference href="https://bdu.fstec.ru/vul/2025-12064" type="self" id="BDU:2025-12064" title="BDU:2025-12064" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0032</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38058-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38058-8.0/" type="self" id="ROS-20260205-80-0032" title="ROS-20260205-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38058" type="cve" id="CVE-2025-38058" title="CVE-2025-38058" />
			<reference href="https://bdu.fstec.ru/vul/2025-12277" type="self" id="BDU:2025-12277" title="BDU:2025-12277" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0033</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38061-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38061-8.0/" type="self" id="ROS-20260205-80-0033" title="ROS-20260205-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38061" type="cve" id="CVE-2025-38061" title="CVE-2025-38061" />
			<reference href="https://bdu.fstec.ru/vul/2025-11835" type="self" id="BDU:2025-11835" title="BDU:2025-11835" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0034</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38062-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38062-8.0/" type="self" id="ROS-20260205-80-0034" title="ROS-20260205-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38062" type="cve" id="CVE-2025-38062" title="CVE-2025-38062" />
			<reference href="https://bdu.fstec.ru/vul/2025-12288" type="self" id="BDU:2025-12288" title="BDU:2025-12288" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0035</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38063-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38063-8.0/" type="self" id="ROS-20260205-80-0035" title="ROS-20260205-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38063" type="cve" id="CVE-2025-38063" title="CVE-2025-38063" />
			<reference href="https://bdu.fstec.ru/vul/2025-12309" type="self" id="BDU:2025-12309" title="BDU:2025-12309" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0036</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38065-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38065-8.0/" type="self" id="ROS-20260205-80-0036" title="ROS-20260205-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38065" type="cve" id="CVE-2025-38065" title="CVE-2025-38065" />
			<reference href="https://bdu.fstec.ru/vul/2025-11927" type="self" id="BDU:2025-11927" title="BDU:2025-11927" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0037</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38066-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38066-8.0/" type="self" id="ROS-20260205-80-0037" title="ROS-20260205-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38066" type="cve" id="CVE-2025-38066" title="CVE-2025-38066" />
			<reference href="https://bdu.fstec.ru/vul/2025-12241" type="self" id="BDU:2025-12241" title="BDU:2025-12241" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0038</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38067-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38067-8.0/" type="self" id="ROS-20260205-80-0038" title="ROS-20260205-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38067" type="cve" id="CVE-2025-38067" title="CVE-2025-38067" />
			<reference href="https://bdu.fstec.ru/vul/2025-14933" type="self" id="BDU:2025-14933" title="BDU:2025-14933" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0039</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38068-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38068-8.0/" type="self" id="ROS-20260205-80-0039" title="ROS-20260205-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38068" type="cve" id="CVE-2025-38068" title="CVE-2025-38068" />
			<reference href="https://bdu.fstec.ru/vul/2025-11834" type="self" id="BDU:2025-11834" title="BDU:2025-11834" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0040</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38071-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38071-8.0/" type="self" id="ROS-20260205-80-0040" title="ROS-20260205-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38071" type="cve" id="CVE-2025-38071" title="CVE-2025-38071" />
			<reference href="https://bdu.fstec.ru/vul/2025-11972" type="self" id="BDU:2025-11972" title="BDU:2025-11972" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0041</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38072-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38072-8.0/" type="self" id="ROS-20260205-80-0041" title="ROS-20260205-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38072" type="cve" id="CVE-2025-38072" title="CVE-2025-38072" />
			<reference href="https://bdu.fstec.ru/vul/2025-12000" type="self" id="BDU:2025-12000" title="BDU:2025-12000" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0042</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38074-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38074-8.0/" type="self" id="ROS-20260205-80-0042" title="ROS-20260205-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38074" type="cve" id="CVE-2025-38074" title="CVE-2025-38074" />
			<reference href="https://bdu.fstec.ru/vul/2025-14971" type="self" id="BDU:2025-14971" title="BDU:2025-14971" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0043</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38075-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38075-8.0/" type="self" id="ROS-20260205-80-0043" title="ROS-20260205-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38075" type="cve" id="CVE-2025-38075" title="CVE-2025-38075" />
			<reference href="https://bdu.fstec.ru/vul/2025-12119" type="self" id="BDU:2025-12119" title="BDU:2025-12119" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0044</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38077-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38077-8.0/" type="self" id="ROS-20260205-80-0044" title="ROS-20260205-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38077" type="cve" id="CVE-2025-38077" title="CVE-2025-38077" />
			<reference href="https://bdu.fstec.ru/vul/2025-11833" type="self" id="BDU:2025-11833" title="BDU:2025-11833" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0045</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38078-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38078-8.0/" type="self" id="ROS-20260205-80-0045" title="ROS-20260205-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38078" type="cve" id="CVE-2025-38078" title="CVE-2025-38078" />
			<reference href="https://bdu.fstec.ru/vul/2025-12254" type="self" id="BDU:2025-12254" title="BDU:2025-12254" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260205-80-0046</id>
		<issued date="2026-02-05" />
		<updated date="2026-02-05" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38079-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38079-8.0/" type="self" id="ROS-20260205-80-0046" title="ROS-20260205-80-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38079" type="cve" id="CVE-2025-38079" title="CVE-2025-38079" />
			<reference href="https://bdu.fstec.ru/vul/2025-12058" type="self" id="BDU:2025-12058" title="BDU:2025-12058" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0001</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость avahi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в avahi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-avahi-cve-2024-52615-8.0/</description>
               <solution>Установить обновление для пакета(ов) avahi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-avahi-cve-2024-52615-8.0/" type="self" id="ROS-20260209-80-0001" title="ROS-20260209-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52615" type="cve" id="CVE-2024-52615" title="CVE-2024-52615" />
			<reference href="https://bdu.fstec.ru/vul/2025-16178" type="self" id="BDU:2025-16178" title="BDU:2025-16178" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="avahi" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-autoipd-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-compat-howl-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-glib-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-glib-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-gobject-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-libs-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt3-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt4-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt5-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-sharp-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-tools-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-tools-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>python3-avahi-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="avahi" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-autoipd-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-compat-howl-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-glib-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-glib-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-gobject-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-libs-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt3-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt4-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt5-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-sharp-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-tools-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-tools-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>python3-avahi-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0002</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость avahi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в avahi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-avahi-cve-2024-52616-8.0/</description>
               <solution>Установить обновление для пакета(ов) avahi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-avahi-cve-2024-52616-8.0/" type="self" id="ROS-20260209-80-0002" title="ROS-20260209-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52616" type="cve" id="CVE-2024-52616" title="CVE-2024-52616" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="avahi" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-autoipd-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-compat-howl-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-glib-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-glib-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-gobject-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-libs-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt3-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt4-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt5-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-sharp-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-tools-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-tools-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="20.red80" arch="x86_64" src="avahi-0.8-20.red80.src.rpm">
					<filename>python3-avahi-0:0.8-20.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="avahi" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-autoipd-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-compat-howl-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-glib-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-glib-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-gobject-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-libs-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt3-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt4-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt5-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-sharp-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-tools-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>avahi-ui-tools-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="20.red80" arch="aarch64" src="avahi-0.8-20.red80.src.rpm">
					<filename>python3-avahi-0:0.8-20.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0003</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость libsoup </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libsoup</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libsoup-cve-2025-32908-8.0/</description>
               <solution>Установить обновление для пакета(ов) libsoup
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libsoup-cve-2025-32908-8.0/" type="self" id="ROS-20260209-80-0003" title="ROS-20260209-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32908" type="cve" id="CVE-2025-32908" title="CVE-2025-32908" />
			<reference href="https://bdu.fstec.ru/vul/2025-04545" type="self" id="BDU:2025-04545" title="BDU:2025-04545" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libsoup" epoch="0" version="2.74.3" release="6.red80" arch="x86_64" src="libsoup-2.74.3-6.red80.src.rpm">
					<filename>libsoup-0:2.74.3-6.red80.x86_64.rpm</filename>
				</package>
				<package name="libsoup-devel" epoch="0" version="2.74.3" release="6.red80" arch="x86_64" src="libsoup-2.74.3-6.red80.src.rpm">
					<filename>libsoup-devel-0:2.74.3-6.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libsoup" epoch="0" version="2.74.3" release="6.red80" arch="aarch64" src="libsoup-2.74.3-6.red80.src.rpm">
					<filename>libsoup-0:2.74.3-6.red80.aarch64.rpm</filename>
				</package>
				<package name="libsoup-devel" epoch="0" version="2.74.3" release="6.red80" arch="aarch64" src="libsoup-2.74.3-6.red80.src.rpm">
					<filename>libsoup-devel-0:2.74.3-6.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libsoup-doc" epoch="0" version="2.74.3" release="6.red80" arch="noarch" src="libsoup-2.74.3-6.red80.src.rpm">
					<filename>libsoup-doc-0:2.74.3-6.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0004</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость libsoup3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libsoup3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libsoup3-cve-2025-32908-8.0/</description>
               <solution>Установить обновление для пакета(ов) libsoup3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libsoup3-cve-2025-32908-8.0/" type="self" id="ROS-20260209-80-0004" title="ROS-20260209-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32908" type="cve" id="CVE-2025-32908" title="CVE-2025-32908" />
			<reference href="https://bdu.fstec.ru/vul/2025-04545" type="self" id="BDU:2025-04545" title="BDU:2025-04545" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libsoup3" epoch="0" version="3.6.5" release="3.red80" arch="x86_64" src="libsoup3-3.6.5-3.red80.src.rpm">
					<filename>libsoup3-0:3.6.5-3.red80.x86_64.rpm</filename>
				</package>
				<package name="libsoup3-devel" epoch="0" version="3.6.5" release="3.red80" arch="x86_64" src="libsoup3-3.6.5-3.red80.src.rpm">
					<filename>libsoup3-devel-0:3.6.5-3.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libsoup3" epoch="0" version="3.6.5" release="3.red80" arch="aarch64" src="libsoup3-3.6.5-3.red80.src.rpm">
					<filename>libsoup3-0:3.6.5-3.red80.aarch64.rpm</filename>
				</package>
				<package name="libsoup3-devel" epoch="0" version="3.6.5" release="3.red80" arch="aarch64" src="libsoup3-3.6.5-3.red80.src.rpm">
					<filename>libsoup3-devel-0:3.6.5-3.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libsoup3-doc" epoch="0" version="3.6.5" release="3.red80" arch="noarch" src="libsoup3-3.6.5-3.red80.src.rpm">
					<filename>libsoup3-doc-0:3.6.5-3.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0005</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость python3.9 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.9</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python3-9-cve-2025-4516-8.0/</description>
               <solution>Установить обновление для пакета(ов) python3.9
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python3-9-cve-2025-4516-8.0/" type="self" id="ROS-20260209-80-0005" title="ROS-20260209-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4516" type="cve" id="CVE-2025-4516" title="CVE-2025-4516" />
			<reference href="https://bdu.fstec.ru/vul/2025-10930" type="self" id="BDU:2025-10930" title="BDU:2025-10930" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="python3.9" epoch="0" version="3.9.23" release="1.red80" arch="x86_64" src="python3.9-3.9.23-1.red80.src.rpm">
					<filename>python3.9-0:3.9.23-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="python3.9" epoch="0" version="3.9.23" release="1.red80" arch="aarch64" src="python3.9-3.9.23-1.red80.src.rpm">
					<filename>python3.9-0:3.9.23-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0006</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость python3.10 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.10</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python3-10-cve-2025-4516-8.0/</description>
               <solution>Установить обновление для пакета(ов) python3.10
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python3-10-cve-2025-4516-8.0/" type="self" id="ROS-20260209-80-0006" title="ROS-20260209-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4516" type="cve" id="CVE-2025-4516" title="CVE-2025-4516" />
			<reference href="https://bdu.fstec.ru/vul/2025-10930" type="self" id="BDU:2025-10930" title="BDU:2025-10930" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="python3.10" epoch="0" version="3.10.18" release="1.red80" arch="x86_64" src="python3.10-3.10.18-1.red80.src.rpm">
					<filename>python3.10-0:3.10.18-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.10-debug" epoch="0" version="3.10.18" release="1.red80" arch="x86_64" src="python3.10-3.10.18-1.red80.src.rpm">
					<filename>python3.10-debug-0:3.10.18-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.10-devel" epoch="0" version="3.10.18" release="1.red80" arch="x86_64" src="python3.10-3.10.18-1.red80.src.rpm">
					<filename>python3.10-devel-0:3.10.18-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.10-idle" epoch="0" version="3.10.18" release="1.red80" arch="x86_64" src="python3.10-3.10.18-1.red80.src.rpm">
					<filename>python3.10-idle-0:3.10.18-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.10-libs" epoch="0" version="3.10.18" release="1.red80" arch="x86_64" src="python3.10-3.10.18-1.red80.src.rpm">
					<filename>python3.10-libs-0:3.10.18-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.10-test" epoch="0" version="3.10.18" release="1.red80" arch="x86_64" src="python3.10-3.10.18-1.red80.src.rpm">
					<filename>python3.10-test-0:3.10.18-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.10-tkinter" epoch="0" version="3.10.18" release="1.red80" arch="x86_64" src="python3.10-3.10.18-1.red80.src.rpm">
					<filename>python3.10-tkinter-0:3.10.18-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="python3.10" epoch="0" version="3.10.18" release="1.red80" arch="aarch64" src="python3.10-3.10.18-1.red80.src.rpm">
					<filename>python3.10-0:3.10.18-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.10-debug" epoch="0" version="3.10.18" release="1.red80" arch="aarch64" src="python3.10-3.10.18-1.red80.src.rpm">
					<filename>python3.10-debug-0:3.10.18-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.10-devel" epoch="0" version="3.10.18" release="1.red80" arch="aarch64" src="python3.10-3.10.18-1.red80.src.rpm">
					<filename>python3.10-devel-0:3.10.18-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.10-idle" epoch="0" version="3.10.18" release="1.red80" arch="aarch64" src="python3.10-3.10.18-1.red80.src.rpm">
					<filename>python3.10-idle-0:3.10.18-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.10-libs" epoch="0" version="3.10.18" release="1.red80" arch="aarch64" src="python3.10-3.10.18-1.red80.src.rpm">
					<filename>python3.10-libs-0:3.10.18-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.10-test" epoch="0" version="3.10.18" release="1.red80" arch="aarch64" src="python3.10-3.10.18-1.red80.src.rpm">
					<filename>python3.10-test-0:3.10.18-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.10-tkinter" epoch="0" version="3.10.18" release="1.red80" arch="aarch64" src="python3.10-3.10.18-1.red80.src.rpm">
					<filename>python3.10-tkinter-0:3.10.18-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0007</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость python3.11 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.11</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python3-11-cve-2025-4516-8.0/</description>
               <solution>Установить обновление для пакета(ов) python3.11
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python3-11-cve-2025-4516-8.0/" type="self" id="ROS-20260209-80-0007" title="ROS-20260209-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4516" type="cve" id="CVE-2025-4516" title="CVE-2025-4516" />
			<reference href="https://bdu.fstec.ru/vul/2025-10930" type="self" id="BDU:2025-10930" title="BDU:2025-10930" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="python3" epoch="0" version="3.11.13" release="1.red80" arch="x86_64" src="python3.11-3.11.13-1.red80.src.rpm">
					<filename>python3-0:3.11.13-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-debug" epoch="0" version="3.11.13" release="1.red80" arch="x86_64" src="python3.11-3.11.13-1.red80.src.rpm">
					<filename>python3-debug-0:3.11.13-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-devel" epoch="0" version="3.11.13" release="1.red80" arch="x86_64" src="python3.11-3.11.13-1.red80.src.rpm">
					<filename>python3-devel-0:3.11.13-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-idle" epoch="0" version="3.11.13" release="1.red80" arch="x86_64" src="python3.11-3.11.13-1.red80.src.rpm">
					<filename>python3-idle-0:3.11.13-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-libs" epoch="0" version="3.11.13" release="1.red80" arch="x86_64" src="python3.11-3.11.13-1.red80.src.rpm">
					<filename>python3-libs-0:3.11.13-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-test" epoch="0" version="3.11.13" release="1.red80" arch="x86_64" src="python3.11-3.11.13-1.red80.src.rpm">
					<filename>python3-test-0:3.11.13-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-tkinter" epoch="0" version="3.11.13" release="1.red80" arch="x86_64" src="python3.11-3.11.13-1.red80.src.rpm">
					<filename>python3-tkinter-0:3.11.13-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="python3" epoch="0" version="3.11.13" release="1.red80" arch="aarch64" src="python3.11-3.11.13-1.red80.src.rpm">
					<filename>python3-0:3.11.13-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-debug" epoch="0" version="3.11.13" release="1.red80" arch="aarch64" src="python3.11-3.11.13-1.red80.src.rpm">
					<filename>python3-debug-0:3.11.13-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-devel" epoch="0" version="3.11.13" release="1.red80" arch="aarch64" src="python3.11-3.11.13-1.red80.src.rpm">
					<filename>python3-devel-0:3.11.13-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-idle" epoch="0" version="3.11.13" release="1.red80" arch="aarch64" src="python3.11-3.11.13-1.red80.src.rpm">
					<filename>python3-idle-0:3.11.13-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-libs" epoch="0" version="3.11.13" release="1.red80" arch="aarch64" src="python3.11-3.11.13-1.red80.src.rpm">
					<filename>python3-libs-0:3.11.13-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-test" epoch="0" version="3.11.13" release="1.red80" arch="aarch64" src="python3.11-3.11.13-1.red80.src.rpm">
					<filename>python3-test-0:3.11.13-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-tkinter" epoch="0" version="3.11.13" release="1.red80" arch="aarch64" src="python3.11-3.11.13-1.red80.src.rpm">
					<filename>python3-tkinter-0:3.11.13-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python-unversioned-command" epoch="0" version="3.11.13" release="1.red80" arch="noarch" src="python3.11-3.11.13-1.red80.src.rpm">
					<filename>python-unversioned-command-0:3.11.13-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0008</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость python3.12 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python3-12-cve-2025-4516-8.0/</description>
               <solution>Установить обновление для пакета(ов) python3.12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python3-12-cve-2025-4516-8.0/" type="self" id="ROS-20260209-80-0008" title="ROS-20260209-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4516" type="cve" id="CVE-2025-4516" title="CVE-2025-4516" />
			<reference href="https://bdu.fstec.ru/vul/2025-10930" type="self" id="BDU:2025-10930" title="BDU:2025-10930" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="python3.12" epoch="0" version="3.12.11" release="1.red80" arch="x86_64" src="python3.12-3.12.11-1.red80.src.rpm">
					<filename>python3.12-0:3.12.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.12-debug" epoch="0" version="3.12.11" release="1.red80" arch="x86_64" src="python3.12-3.12.11-1.red80.src.rpm">
					<filename>python3.12-debug-0:3.12.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.12-devel" epoch="0" version="3.12.11" release="1.red80" arch="x86_64" src="python3.12-3.12.11-1.red80.src.rpm">
					<filename>python3.12-devel-0:3.12.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.12-idle" epoch="0" version="3.12.11" release="1.red80" arch="x86_64" src="python3.12-3.12.11-1.red80.src.rpm">
					<filename>python3.12-idle-0:3.12.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.12-libs" epoch="0" version="3.12.11" release="1.red80" arch="x86_64" src="python3.12-3.12.11-1.red80.src.rpm">
					<filename>python3.12-libs-0:3.12.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.12-test" epoch="0" version="3.12.11" release="1.red80" arch="x86_64" src="python3.12-3.12.11-1.red80.src.rpm">
					<filename>python3.12-test-0:3.12.11-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.12-tkinter" epoch="0" version="3.12.11" release="1.red80" arch="x86_64" src="python3.12-3.12.11-1.red80.src.rpm">
					<filename>python3.12-tkinter-0:3.12.11-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="python3.12" epoch="0" version="3.12.11" release="1.red80" arch="aarch64" src="python3.12-3.12.11-1.red80.src.rpm">
					<filename>python3.12-0:3.12.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.12-debug" epoch="0" version="3.12.11" release="1.red80" arch="aarch64" src="python3.12-3.12.11-1.red80.src.rpm">
					<filename>python3.12-debug-0:3.12.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.12-devel" epoch="0" version="3.12.11" release="1.red80" arch="aarch64" src="python3.12-3.12.11-1.red80.src.rpm">
					<filename>python3.12-devel-0:3.12.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.12-idle" epoch="0" version="3.12.11" release="1.red80" arch="aarch64" src="python3.12-3.12.11-1.red80.src.rpm">
					<filename>python3.12-idle-0:3.12.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.12-libs" epoch="0" version="3.12.11" release="1.red80" arch="aarch64" src="python3.12-3.12.11-1.red80.src.rpm">
					<filename>python3.12-libs-0:3.12.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.12-test" epoch="0" version="3.12.11" release="1.red80" arch="aarch64" src="python3.12-3.12.11-1.red80.src.rpm">
					<filename>python3.12-test-0:3.12.11-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.12-tkinter" epoch="0" version="3.12.11" release="1.red80" arch="aarch64" src="python3.12-3.12.11-1.red80.src.rpm">
					<filename>python3.12-tkinter-0:3.12.11-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0009</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость python3.13 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python3.13</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python3-13-cve-2025-4516-8.0/</description>
               <solution>Установить обновление для пакета(ов) python3.13
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python3-13-cve-2025-4516-8.0/" type="self" id="ROS-20260209-80-0009" title="ROS-20260209-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4516" type="cve" id="CVE-2025-4516" title="CVE-2025-4516" />
			<reference href="https://bdu.fstec.ru/vul/2025-10930" type="self" id="BDU:2025-10930" title="BDU:2025-10930" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="python3.13" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-debug-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-devel-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-freethreading-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-idle-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-libs-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-test-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.7" release="1.red80" arch="x86_64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-tkinter-0:3.13.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="python3.13" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-debug" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-debug-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-devel" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-devel-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-freethreading" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-freethreading-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-freethreading-debug" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-freethreading-debug-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-idle" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-idle-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-libs" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-libs-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-test" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-test-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3.13-tkinter" epoch="0" version="3.13.7" release="1.red80" arch="aarch64" src="python3.13-3.13.7-1.red80.src.rpm">
					<filename>python3.13-tkinter-0:3.13.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0010</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость tar </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tar</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-tar-cve-2025-45582-8.0/</description>
               <solution>Установить обновление для пакета(ов) tar
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-tar-cve-2025-45582-8.0/" type="self" id="ROS-20260209-80-0010" title="ROS-20260209-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-45582" type="cve" id="CVE-2025-45582" title="CVE-2025-45582" />
			<reference href="https://bdu.fstec.ru/vul/2026-00339" type="self" id="BDU:2026-00339" title="BDU:2026-00339" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="tar" epoch="2" version="1.35" release="3.red80" arch="x86_64" src="tar-1.35-3.red80.src.rpm">
					<filename>tar-2:1.35-3.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="tar" epoch="2" version="1.35" release="3.red80" arch="aarch64" src="tar-1.35-3.red80.src.rpm">
					<filename>tar-2:1.35-3.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0011</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость binutils </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-binutils-cve-2025-7545-8.0/</description>
               <solution>Установить обновление для пакета(ов) binutils
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-binutils-cve-2025-7545-8.0/" type="self" id="ROS-20260209-80-0011" title="ROS-20260209-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7545" type="cve" id="CVE-2025-7545" title="CVE-2025-7545" />
			<reference href="https://bdu.fstec.ru/vul/2025-11462" type="self" id="BDU:2025-11462" title="BDU:2025-11462" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="binutils" epoch="0" version="2.40" release="19.red80" arch="x86_64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-0:2.40-19.red80.x86_64.rpm</filename>
				</package>
				<package name="binutils-devel" epoch="0" version="2.40" release="19.red80" arch="x86_64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-devel-0:2.40-19.red80.x86_64.rpm</filename>
				</package>
				<package name="binutils-gold" epoch="0" version="2.40" release="19.red80" arch="x86_64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-gold-0:2.40-19.red80.x86_64.rpm</filename>
				</package>
				<package name="binutils-gprofng" epoch="0" version="2.40" release="19.red80" arch="x86_64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-gprofng-0:2.40-19.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="binutils" epoch="0" version="2.40" release="19.red80" arch="aarch64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-0:2.40-19.red80.aarch64.rpm</filename>
				</package>
				<package name="binutils-devel" epoch="0" version="2.40" release="19.red80" arch="aarch64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-devel-0:2.40-19.red80.aarch64.rpm</filename>
				</package>
				<package name="binutils-gold" epoch="0" version="2.40" release="19.red80" arch="aarch64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-gold-0:2.40-19.red80.aarch64.rpm</filename>
				</package>
				<package name="binutils-gprofng" epoch="0" version="2.40" release="19.red80" arch="aarch64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-gprofng-0:2.40-19.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0012</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость perl-Crypt-URandom-Token </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в perl-Crypt-URandom-Token</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-perl-crypt-urandom-token-cve-2025-27551-8.0/</description>
               <solution>Установить обновление для пакета(ов) perl-Crypt-URandom-Token
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-perl-crypt-urandom-token-cve-2025-27551-8.0/" type="self" id="ROS-20260209-80-0012" title="ROS-20260209-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27551" type="cve" id="CVE-2025-27551" title="CVE-2025-27551" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="perl-Crypt-URandom-Token" epoch="0" version="0.005" release="1.red80" arch="noarch" src="perl-Crypt-URandom-Token-0.005-1.red80.src.rpm">
					<filename>perl-Crypt-URandom-Token-0:0.005-1.red80.noarch.rpm</filename>
				</package>
				<package name="perl-Crypt-URandom-Token-tests" epoch="0" version="0.005" release="1.red80" arch="noarch" src="perl-Crypt-URandom-Token-0.005-1.red80.src.rpm">
					<filename>perl-Crypt-URandom-Token-tests-0:0.005-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0013</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость perl-DBIx-Class-EncodedColumn </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в perl-DBIx-Class-EncodedColumn</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-perl-dbix-class-encodedcolumn-cve-2025-27551-8.0/</description>
               <solution>Установить обновление для пакета(ов) perl-DBIx-Class-EncodedColumn
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-perl-dbix-class-encodedcolumn-cve-2025-27551-8.0/" type="self" id="ROS-20260209-80-0013" title="ROS-20260209-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27551" type="cve" id="CVE-2025-27551" title="CVE-2025-27551" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="perl-DBIx-Class-EncodedColumn" epoch="0" version="0.11" release="1.red80" arch="noarch" src="perl-DBIx-Class-EncodedColumn-0.11-1.red80.src.rpm">
					<filename>perl-DBIx-Class-EncodedColumn-0:0.11-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0014</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость perl-DBIx-Class-EncodedColumn </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в perl-DBIx-Class-EncodedColumn</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-perl-dbix-class-encodedcolumn-cve-2025-27552-8.0/</description>
               <solution>Установить обновление для пакета(ов) perl-DBIx-Class-EncodedColumn
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-perl-dbix-class-encodedcolumn-cve-2025-27552-8.0/" type="self" id="ROS-20260209-80-0014" title="ROS-20260209-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27552" type="cve" id="CVE-2025-27552" title="CVE-2025-27552" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="perl-DBIx-Class-EncodedColumn" epoch="0" version="0.11" release="1.red80" arch="noarch" src="perl-DBIx-Class-EncodedColumn-0.11-1.red80.src.rpm">
					<filename>perl-DBIx-Class-EncodedColumn-0:0.11-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0015</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость perl-Crypt-URandom-Token </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в perl-Crypt-URandom-Token</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-perl-crypt-urandom-token-cve-2025-27552-8.0/</description>
               <solution>Установить обновление для пакета(ов) perl-Crypt-URandom-Token
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-perl-crypt-urandom-token-cve-2025-27552-8.0/" type="self" id="ROS-20260209-80-0015" title="ROS-20260209-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27552" type="cve" id="CVE-2025-27552" title="CVE-2025-27552" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="perl-Crypt-URandom-Token" epoch="0" version="0.005" release="1.red80" arch="noarch" src="perl-Crypt-URandom-Token-0.005-1.red80.src.rpm">
					<filename>perl-Crypt-URandom-Token-0:0.005-1.red80.noarch.rpm</filename>
				</package>
				<package name="perl-Crypt-URandom-Token-tests" epoch="0" version="0.005" release="1.red80" arch="noarch" src="perl-Crypt-URandom-Token-0.005-1.red80.src.rpm">
					<filename>perl-Crypt-URandom-Token-tests-0:0.005-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0016</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость python-xmltodict </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-xmltodict</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-xmltodict-cve-2025-9375-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-xmltodict
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-xmltodict-cve-2025-9375-8.0/" type="self" id="ROS-20260209-80-0016" title="ROS-20260209-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9375" type="cve" id="CVE-2025-9375" title="CVE-2025-9375" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python3-xmltodict" epoch="0" version="0.15.1" release="1.red80" arch="noarch" src="python-xmltodict-0.15.1-1.red80.src.rpm">
					<filename>python3-xmltodict-0:0.15.1-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0017</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость openssl-gost-engine </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openssl-gost-engine</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openssl-gost-engine-cve-2025-9230-8.0/</description>
               <solution>Установить обновление для пакета(ов) openssl-gost-engine
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openssl-gost-engine-cve-2025-9230-8.0/" type="self" id="ROS-20260209-80-0017" title="ROS-20260209-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9230" type="cve" id="CVE-2025-9230" title="CVE-2025-9230" />
			<reference href="https://bdu.fstec.ru/vul/2025-12885" type="self" id="BDU:2025-12885" title="BDU:2025-12885" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gostsum" epoch="0" version="3.0.3" release="2.red80" arch="x86_64" src="openssl-gost-engine-3.0.3-2.red80.src.rpm">
					<filename>gostsum-0:3.0.3-2.red80.x86_64.rpm</filename>
				</package>
				<package name="openssl-gost-engine" epoch="0" version="3.0.3" release="2.red80" arch="x86_64" src="openssl-gost-engine-3.0.3-2.red80.src.rpm">
					<filename>openssl-gost-engine-0:3.0.3-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gostsum" epoch="0" version="3.0.3" release="2.red80" arch="aarch64" src="openssl-gost-engine-3.0.3-2.red80.src.rpm">
					<filename>gostsum-0:3.0.3-2.red80.aarch64.rpm</filename>
				</package>
				<package name="openssl-gost-engine" epoch="0" version="3.0.3" release="2.red80" arch="aarch64" src="openssl-gost-engine-3.0.3-2.red80.src.rpm">
					<filename>openssl-gost-engine-0:3.0.3-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0018</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость openssl-gost-engine </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openssl-gost-engine</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openssl-gost-engine-cve-2025-9232-8.0/</description>
               <solution>Установить обновление для пакета(ов) openssl-gost-engine
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openssl-gost-engine-cve-2025-9232-8.0/" type="self" id="ROS-20260209-80-0018" title="ROS-20260209-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9232" type="cve" id="CVE-2025-9232" title="CVE-2025-9232" />
			<reference href="https://bdu.fstec.ru/vul/2025-12887" type="self" id="BDU:2025-12887" title="BDU:2025-12887" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gostsum" epoch="0" version="3.0.3" release="2.red80" arch="x86_64" src="openssl-gost-engine-3.0.3-2.red80.src.rpm">
					<filename>gostsum-0:3.0.3-2.red80.x86_64.rpm</filename>
				</package>
				<package name="openssl-gost-engine" epoch="0" version="3.0.3" release="2.red80" arch="x86_64" src="openssl-gost-engine-3.0.3-2.red80.src.rpm">
					<filename>openssl-gost-engine-0:3.0.3-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gostsum" epoch="0" version="3.0.3" release="2.red80" arch="aarch64" src="openssl-gost-engine-3.0.3-2.red80.src.rpm">
					<filename>gostsum-0:3.0.3-2.red80.aarch64.rpm</filename>
				</package>
				<package name="openssl-gost-engine" epoch="0" version="3.0.3" release="2.red80" arch="aarch64" src="openssl-gost-engine-3.0.3-2.red80.src.rpm">
					<filename>openssl-gost-engine-0:3.0.3-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0019</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость wireshark </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-wireshark-cve-2025-11626-8.0/</description>
               <solution>Установить обновление для пакета(ов) wireshark
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-wireshark-cve-2025-11626-8.0/" type="self" id="ROS-20260209-80-0019" title="ROS-20260209-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626" type="cve" id="CVE-2025-11626" title="CVE-2025-11626" />
			<reference href="https://bdu.fstec.ru/vul/2025-13330" type="self" id="BDU:2025-13330" title="BDU:2025-13330" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="wireshark" epoch="1" version="4.6.1" release="1.red80" arch="x86_64" src="wireshark-4.6.1-1.red80.src.rpm">
					<filename>wireshark-1:4.6.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.1" release="1.red80" arch="x86_64" src="wireshark-4.6.1-1.red80.src.rpm">
					<filename>wireshark-cli-1:4.6.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.1" release="1.red80" arch="x86_64" src="wireshark-4.6.1-1.red80.src.rpm">
					<filename>wireshark-devel-1:4.6.1-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="wireshark" epoch="1" version="4.6.1" release="1.red80" arch="aarch64" src="wireshark-4.6.1-1.red80.src.rpm">
					<filename>wireshark-1:4.6.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.1" release="1.red80" arch="aarch64" src="wireshark-4.6.1-1.red80.src.rpm">
					<filename>wireshark-cli-1:4.6.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.1" release="1.red80" arch="aarch64" src="wireshark-4.6.1-1.red80.src.rpm">
					<filename>wireshark-devel-1:4.6.1-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0020</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость binutils </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-binutils-cve-2025-11840-8.0/</description>
               <solution>Установить обновление для пакета(ов) binutils
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-binutils-cve-2025-11840-8.0/" type="self" id="ROS-20260209-80-0020" title="ROS-20260209-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11840" type="cve" id="CVE-2025-11840" title="CVE-2025-11840" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="binutils" epoch="0" version="2.40" release="19.red80" arch="x86_64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-0:2.40-19.red80.x86_64.rpm</filename>
				</package>
				<package name="binutils-devel" epoch="0" version="2.40" release="19.red80" arch="x86_64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-devel-0:2.40-19.red80.x86_64.rpm</filename>
				</package>
				<package name="binutils-gold" epoch="0" version="2.40" release="19.red80" arch="x86_64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-gold-0:2.40-19.red80.x86_64.rpm</filename>
				</package>
				<package name="binutils-gprofng" epoch="0" version="2.40" release="19.red80" arch="x86_64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-gprofng-0:2.40-19.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="binutils" epoch="0" version="2.40" release="19.red80" arch="aarch64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-0:2.40-19.red80.aarch64.rpm</filename>
				</package>
				<package name="binutils-devel" epoch="0" version="2.40" release="19.red80" arch="aarch64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-devel-0:2.40-19.red80.aarch64.rpm</filename>
				</package>
				<package name="binutils-gold" epoch="0" version="2.40" release="19.red80" arch="aarch64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-gold-0:2.40-19.red80.aarch64.rpm</filename>
				</package>
				<package name="binutils-gprofng" epoch="0" version="2.40" release="19.red80" arch="aarch64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-gprofng-0:2.40-19.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0021</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость sssd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в sssd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-sssd-cve-2025-11561-8.0/</description>
               <solution>Установить обновление для пакета(ов) sssd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-sssd-cve-2025-11561-8.0/" type="self" id="ROS-20260209-80-0021" title="ROS-20260209-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11561" type="cve" id="CVE-2025-11561" title="CVE-2025-11561" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libipa_hbac" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libipa_hbac-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libipa_hbac-devel" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libipa_hbac-devel-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libsss_autofs" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libsss_autofs-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libsss_certmap" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libsss_certmap-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libsss_certmap-devel" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libsss_certmap-devel-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libsss_idmap" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libsss_idmap-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libsss_idmap-devel" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libsss_idmap-devel-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libsss_nss_idmap" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libsss_nss_idmap-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libsss_nss_idmap-devel" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libsss_nss_idmap-devel-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libsss_sudo" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libsss_sudo-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-libipa_hbac" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>python3-libipa_hbac-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-libsss_nss_idmap" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>python3-libsss_nss_idmap-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sss" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>python3-sss-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-sss-murmur" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>python3-sss-murmur-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="sssd" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="sssd-ad" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-ad-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="sssd-client" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-client-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="sssd-common" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-common-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="sssd-common-pac" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-common-pac-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="sssd-dbus" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-dbus-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="sssd-idp" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-idp-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="sssd-ipa" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-ipa-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="sssd-kcm" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-kcm-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="sssd-krb5" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-krb5-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="sssd-krb5-common" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-krb5-common-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="sssd-ldap" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-ldap-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="sssd-nfs-idmap" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-nfs-idmap-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="sssd-passkey" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-passkey-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="sssd-proxy" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-proxy-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="sssd-tools" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-tools-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
				<package name="sssd-winbind-idmap" epoch="0" version="2.9.7" release="4.red80" arch="x86_64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-winbind-idmap-0:2.9.7-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libipa_hbac" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libipa_hbac-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libipa_hbac-devel" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libipa_hbac-devel-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libsss_autofs" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libsss_autofs-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libsss_certmap" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libsss_certmap-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libsss_certmap-devel" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libsss_certmap-devel-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libsss_idmap" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libsss_idmap-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libsss_idmap-devel" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libsss_idmap-devel-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libsss_nss_idmap" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libsss_nss_idmap-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libsss_nss_idmap-devel" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libsss_nss_idmap-devel-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libsss_sudo" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>libsss_sudo-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-libipa_hbac" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>python3-libipa_hbac-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-libsss_nss_idmap" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>python3-libsss_nss_idmap-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sss" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>python3-sss-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-sss-murmur" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>python3-sss-murmur-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="sssd" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="sssd-ad" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-ad-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="sssd-client" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-client-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="sssd-common" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-common-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="sssd-common-pac" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-common-pac-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="sssd-dbus" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-dbus-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="sssd-idp" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-idp-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="sssd-ipa" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-ipa-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="sssd-kcm" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-kcm-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="sssd-krb5" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-krb5-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="sssd-krb5-common" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-krb5-common-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="sssd-ldap" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-ldap-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="sssd-nfs-idmap" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-nfs-idmap-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="sssd-passkey" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-passkey-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="sssd-proxy" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-proxy-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="sssd-tools" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-tools-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
				<package name="sssd-winbind-idmap" epoch="0" version="2.9.7" release="4.red80" arch="aarch64" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>sssd-winbind-idmap-0:2.9.7-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python3-sssdconfig" epoch="0" version="2.9.7" release="4.red80" arch="noarch" src="sssd-2.9.7-4.red80.src.rpm">
					<filename>python3-sssdconfig-0:2.9.7-4.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0022</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость binutils </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в binutils</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-binutils-cve-2025-11839-8.0/</description>
               <solution>Установить обновление для пакета(ов) binutils
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-binutils-cve-2025-11839-8.0/" type="self" id="ROS-20260209-80-0022" title="ROS-20260209-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11839" type="cve" id="CVE-2025-11839" title="CVE-2025-11839" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="binutils" epoch="0" version="2.40" release="19.red80" arch="x86_64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-0:2.40-19.red80.x86_64.rpm</filename>
				</package>
				<package name="binutils-devel" epoch="0" version="2.40" release="19.red80" arch="x86_64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-devel-0:2.40-19.red80.x86_64.rpm</filename>
				</package>
				<package name="binutils-gold" epoch="0" version="2.40" release="19.red80" arch="x86_64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-gold-0:2.40-19.red80.x86_64.rpm</filename>
				</package>
				<package name="binutils-gprofng" epoch="0" version="2.40" release="19.red80" arch="x86_64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-gprofng-0:2.40-19.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="binutils" epoch="0" version="2.40" release="19.red80" arch="aarch64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-0:2.40-19.red80.aarch64.rpm</filename>
				</package>
				<package name="binutils-devel" epoch="0" version="2.40" release="19.red80" arch="aarch64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-devel-0:2.40-19.red80.aarch64.rpm</filename>
				</package>
				<package name="binutils-gold" epoch="0" version="2.40" release="19.red80" arch="aarch64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-gold-0:2.40-19.red80.aarch64.rpm</filename>
				</package>
				<package name="binutils-gprofng" epoch="0" version="2.40" release="19.red80" arch="aarch64" src="binutils-2.40-19.red80.src.rpm">
					<filename>binutils-gprofng-0:2.40-19.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0023</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость pdns </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pdns</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-pdns-cve-2025-59023-8.0/</description>
               <solution>Установить обновление для пакета(ов) pdns
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-pdns-cve-2025-59023-8.0/" type="self" id="ROS-20260209-80-0023" title="ROS-20260209-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59023" type="cve" id="CVE-2025-59023" title="CVE-2025-59023" />
			<reference href="https://bdu.fstec.ru/vul/2026-00247" type="self" id="BDU:2026-00247" title="BDU:2026-00247" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="pdns" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-ldap" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-ldap-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-lmdb" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-lmdb-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-lua2" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-lua2-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-mysql" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-mysql-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-pipe" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-pipe-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-postgresql" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-postgresql-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-remote" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-remote-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-sqlite" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-sqlite-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-tinydns" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-tinydns-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-ixfrdist" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-ixfrdist-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-tools" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-tools-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="pdns" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-backend-ldap" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-ldap-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-backend-lmdb" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-lmdb-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-backend-lua2" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-lua2-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-backend-mysql" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-mysql-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-backend-pipe" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-pipe-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-backend-postgresql" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-postgresql-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-backend-remote" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-remote-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-backend-sqlite" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-sqlite-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-backend-tinydns" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-tinydns-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-ixfrdist" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-ixfrdist-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-tools" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-tools-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0024</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость pdns-recursor </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pdns-recursor</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-pdns-recursor-cve-2025-59023-8.0/</description>
               <solution>Установить обновление для пакета(ов) pdns-recursor
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-pdns-recursor-cve-2025-59023-8.0/" type="self" id="ROS-20260209-80-0024" title="ROS-20260209-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59023" type="cve" id="CVE-2025-59023" title="CVE-2025-59023" />
			<reference href="https://bdu.fstec.ru/vul/2026-00247" type="self" id="BDU:2026-00247" title="BDU:2026-00247" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="pdns-recursor" epoch="0" version="5.2.6" release="1.red80" arch="x86_64" src="pdns-recursor-5.2.6-1.red80.src.rpm">
					<filename>pdns-recursor-0:5.2.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="pdns-recursor" epoch="0" version="5.2.6" release="1.red80" arch="aarch64" src="pdns-recursor-5.2.6-1.red80.src.rpm">
					<filename>pdns-recursor-0:5.2.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0025</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость pdns </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в pdns</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-pdns-cve-2025-59024-8.0/</description>
               <solution>Установить обновление для пакета(ов) pdns
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-pdns-cve-2025-59024-8.0/" type="self" id="ROS-20260209-80-0025" title="ROS-20260209-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59024" type="cve" id="CVE-2025-59024" title="CVE-2025-59024" />
			<reference href="https://bdu.fstec.ru/vul/2026-00248" type="self" id="BDU:2026-00248" title="BDU:2026-00248" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="pdns" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-ldap" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-ldap-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-lmdb" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-lmdb-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-lua2" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-lua2-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-mysql" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-mysql-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-pipe" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-pipe-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-postgresql" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-postgresql-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-remote" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-remote-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-sqlite" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-sqlite-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-backend-tinydns" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-tinydns-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-ixfrdist" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-ixfrdist-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="pdns-tools" epoch="0" version="5.0.1" release="1.red80" arch="x86_64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-tools-0:5.0.1-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="pdns" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-backend-ldap" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-ldap-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-backend-lmdb" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-lmdb-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-backend-lua2" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-lua2-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-backend-mysql" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-mysql-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-backend-pipe" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-pipe-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-backend-postgresql" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-postgresql-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-backend-remote" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-remote-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-backend-sqlite" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-sqlite-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-backend-tinydns" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-backend-tinydns-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-ixfrdist" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-ixfrdist-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="pdns-tools" epoch="0" version="5.0.1" release="1.red80" arch="aarch64" src="pdns-5.0.1-1.red80.src.rpm">
					<filename>pdns-tools-0:5.0.1-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0026</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость pdns-recursor </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в pdns-recursor</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-pdns-recursor-cve-2025-59024-8.0/</description>
               <solution>Установить обновление для пакета(ов) pdns-recursor
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-pdns-recursor-cve-2025-59024-8.0/" type="self" id="ROS-20260209-80-0026" title="ROS-20260209-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59024" type="cve" id="CVE-2025-59024" title="CVE-2025-59024" />
			<reference href="https://bdu.fstec.ru/vul/2026-00248" type="self" id="BDU:2026-00248" title="BDU:2026-00248" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="pdns-recursor" epoch="0" version="5.2.6" release="1.red80" arch="x86_64" src="pdns-recursor-5.2.6-1.red80.src.rpm">
					<filename>pdns-recursor-0:5.2.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="pdns-recursor" epoch="0" version="5.2.6" release="1.red80" arch="aarch64" src="pdns-recursor-5.2.6-1.red80.src.rpm">
					<filename>pdns-recursor-0:5.2.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0027</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость openvpn </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в openvpn</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openvpn-cve-2025-13086-8.0/</description>
               <solution>Установить обновление для пакета(ов) openvpn
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openvpn-cve-2025-13086-8.0/" type="self" id="ROS-20260209-80-0027" title="ROS-20260209-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13086" type="cve" id="CVE-2025-13086" title="CVE-2025-13086" />
			<reference href="https://bdu.fstec.ru/vul/2025-14653" type="self" id="BDU:2025-14653" title="BDU:2025-14653" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="openvpn" epoch="0" version="2.6.17" release="1.red80" arch="x86_64" src="openvpn-2.6.17-1.red80.src.rpm">
					<filename>openvpn-0:2.6.17-1.red80.x86_64.rpm</filename>
				</package>
				<package name="openvpn-devel" epoch="0" version="2.6.17" release="1.red80" arch="x86_64" src="openvpn-2.6.17-1.red80.src.rpm">
					<filename>openvpn-devel-0:2.6.17-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="openvpn" epoch="0" version="2.6.17" release="1.red80" arch="aarch64" src="openvpn-2.6.17-1.red80.src.rpm">
					<filename>openvpn-0:2.6.17-1.red80.aarch64.rpm</filename>
				</package>
				<package name="openvpn-devel" epoch="0" version="2.6.17" release="1.red80" arch="aarch64" src="openvpn-2.6.17-1.red80.src.rpm">
					<filename>openvpn-devel-0:2.6.17-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0028</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость nextcloud-app-mail </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nextcloud-app-mail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nextcloud-app-mail-cve-2025-66514-8.0/</description>
               <solution>Установить обновление для пакета(ов) nextcloud-app-mail
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nextcloud-app-mail-cve-2025-66514-8.0/" type="self" id="ROS-20260209-80-0028" title="ROS-20260209-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66514" type="cve" id="CVE-2025-66514" title="CVE-2025-66514" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="nextcloud-app-mail" epoch="0" version="5.6.5" release="1.red80" arch="x86_64" src="nextcloud-app-mail-5.6.5-1.red80.src.rpm">
					<filename>nextcloud-app-mail-0:5.6.5-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0029</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость nextcloud-app-calendar </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в nextcloud-app-calendar</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nextcloud-app-calendar-cve-2025-66546-8.0/</description>
               <solution>Установить обновление для пакета(ов) nextcloud-app-calendar
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nextcloud-app-calendar-cve-2025-66546-8.0/" type="self" id="ROS-20260209-80-0029" title="ROS-20260209-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66546" type="cve" id="CVE-2025-66546" title="CVE-2025-66546" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="nextcloud-app-calendar" epoch="0" version="6.1.2" release="1.red80" arch="noarch" src="nextcloud-app-calendar-6.1.2-1.red80.src.rpm">
					<filename>nextcloud-app-calendar-0:6.1.2-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0030</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2025-14847-8.0/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2025-14847-8.0/" type="self" id="ROS-20260209-80-0030" title="ROS-20260209-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14847" type="cve" id="CVE-2025-14847" title="CVE-2025-14847" />
			<reference href="https://bdu.fstec.ru/vul/2025-16225" type="self" id="BDU:2025-16225" title="BDU:2025-16225" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="mongodb-org" epoch="0" version="7.0.28" release="1.red80" arch="x86_64" src="mongodb-org-7.0.28-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.28-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.28" release="1.red80" arch="x86_64" src="mongodb-org-7.0.28-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.28-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.28" release="1.red80" arch="x86_64" src="mongodb-org-7.0.28-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.28-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.28" release="1.red80" arch="x86_64" src="mongodb-org-7.0.28-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.28-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="mongodb-org" epoch="0" version="7.0.28" release="1.red80" arch="aarch64" src="mongodb-org-7.0.28-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.28-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.28" release="1.red80" arch="aarch64" src="mongodb-org-7.0.28-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.28-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.28" release="1.red80" arch="aarch64" src="mongodb-org-7.0.28-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.28-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.28" release="1.red80" arch="aarch64" src="mongodb-org-7.0.28-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.28-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0031</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость composer </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в composer</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-composer-cve-2025-67746-8.0/</description>
               <solution>Установить обновление для пакета(ов) composer
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-composer-cve-2025-67746-8.0/" type="self" id="ROS-20260209-80-0031" title="ROS-20260209-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67746" type="cve" id="CVE-2025-67746" title="CVE-2025-67746" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="composer" epoch="0" version="2.9.3" release="1.red80" arch="noarch" src="composer-2.9.3-1.red80.src.rpm">
					<filename>composer-0:2.9.3-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0032</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость python-urllib3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-urllib3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-urllib3-cve-2026-21441-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-urllib3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-urllib3-cve-2026-21441-8.0/" type="self" id="ROS-20260209-80-0032" title="ROS-20260209-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21441" type="cve" id="CVE-2026-21441" title="CVE-2026-21441" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python3-urllib3" epoch="0" version="2.6.3" release="1.red80" arch="noarch" src="python-urllib3-2.6.3-1.red80.src.rpm">
					<filename>python3-urllib3-0:2.6.3-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-urllib3+brotli" epoch="0" version="2.6.3" release="1.red80" arch="noarch" src="python-urllib3-2.6.3-1.red80.src.rpm">
					<filename>python3-urllib3+brotli-0:2.6.3-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-urllib3+h2" epoch="0" version="2.6.3" release="1.red80" arch="noarch" src="python-urllib3-2.6.3-1.red80.src.rpm">
					<filename>python3-urllib3+h2-0:2.6.3-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-urllib3+socks" epoch="0" version="2.6.3" release="1.red80" arch="noarch" src="python-urllib3-2.6.3-1.red80.src.rpm">
					<filename>python3-urllib3+socks-0:2.6.3-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-urllib3+zstd" epoch="0" version="2.6.3" release="1.red80" arch="noarch" src="python-urllib3-2.6.3-1.red80.src.rpm">
					<filename>python3-urllib3+zstd-0:2.6.3-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0033</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость net-snmp </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в net-snmp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-net-snmp-cve-2025-68615-8.0/</description>
               <solution>Установить обновление для пакета(ов) net-snmp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-net-snmp-cve-2025-68615-8.0/" type="self" id="ROS-20260209-80-0033" title="ROS-20260209-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68615" type="cve" id="CVE-2025-68615" title="CVE-2025-68615" />
			<reference href="https://bdu.fstec.ru/vul/2025-16314" type="self" id="BDU:2025-16314" title="BDU:2025-16314" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="net-snmp" epoch="1" version="5.9.4" release="4.red80" arch="x86_64" src="net-snmp-5.9.4-4.red80.src.rpm">
					<filename>net-snmp-1:5.9.4-4.red80.x86_64.rpm</filename>
				</package>
				<package name="net-snmp-agent-libs" epoch="1" version="5.9.4" release="4.red80" arch="x86_64" src="net-snmp-5.9.4-4.red80.src.rpm">
					<filename>net-snmp-agent-libs-1:5.9.4-4.red80.x86_64.rpm</filename>
				</package>
				<package name="net-snmp-devel" epoch="1" version="5.9.4" release="4.red80" arch="x86_64" src="net-snmp-5.9.4-4.red80.src.rpm">
					<filename>net-snmp-devel-1:5.9.4-4.red80.x86_64.rpm</filename>
				</package>
				<package name="net-snmp-gui" epoch="1" version="5.9.4" release="4.red80" arch="x86_64" src="net-snmp-5.9.4-4.red80.src.rpm">
					<filename>net-snmp-gui-1:5.9.4-4.red80.x86_64.rpm</filename>
				</package>
				<package name="net-snmp-libs" epoch="1" version="5.9.4" release="4.red80" arch="x86_64" src="net-snmp-5.9.4-4.red80.src.rpm">
					<filename>net-snmp-libs-1:5.9.4-4.red80.x86_64.rpm</filename>
				</package>
				<package name="net-snmp-perl" epoch="1" version="5.9.4" release="4.red80" arch="x86_64" src="net-snmp-5.9.4-4.red80.src.rpm">
					<filename>net-snmp-perl-1:5.9.4-4.red80.x86_64.rpm</filename>
				</package>
				<package name="net-snmp-perl-module" epoch="1" version="5.9.4" release="4.red80" arch="x86_64" src="net-snmp-5.9.4-4.red80.src.rpm">
					<filename>net-snmp-perl-module-1:5.9.4-4.red80.x86_64.rpm</filename>
				</package>
				<package name="net-snmp-utils" epoch="1" version="5.9.4" release="4.red80" arch="x86_64" src="net-snmp-5.9.4-4.red80.src.rpm">
					<filename>net-snmp-utils-1:5.9.4-4.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-net-snmp" epoch="1" version="5.9.4" release="4.red80" arch="x86_64" src="net-snmp-5.9.4-4.red80.src.rpm">
					<filename>python3-net-snmp-1:5.9.4-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="net-snmp" epoch="1" version="5.9.4" release="4.red80" arch="aarch64" src="net-snmp-5.9.4-4.red80.src.rpm">
					<filename>net-snmp-1:5.9.4-4.red80.aarch64.rpm</filename>
				</package>
				<package name="net-snmp-agent-libs" epoch="1" version="5.9.4" release="4.red80" arch="aarch64" src="net-snmp-5.9.4-4.red80.src.rpm">
					<filename>net-snmp-agent-libs-1:5.9.4-4.red80.aarch64.rpm</filename>
				</package>
				<package name="net-snmp-devel" epoch="1" version="5.9.4" release="4.red80" arch="aarch64" src="net-snmp-5.9.4-4.red80.src.rpm">
					<filename>net-snmp-devel-1:5.9.4-4.red80.aarch64.rpm</filename>
				</package>
				<package name="net-snmp-gui" epoch="1" version="5.9.4" release="4.red80" arch="aarch64" src="net-snmp-5.9.4-4.red80.src.rpm">
					<filename>net-snmp-gui-1:5.9.4-4.red80.aarch64.rpm</filename>
				</package>
				<package name="net-snmp-libs" epoch="1" version="5.9.4" release="4.red80" arch="aarch64" src="net-snmp-5.9.4-4.red80.src.rpm">
					<filename>net-snmp-libs-1:5.9.4-4.red80.aarch64.rpm</filename>
				</package>
				<package name="net-snmp-perl" epoch="1" version="5.9.4" release="4.red80" arch="aarch64" src="net-snmp-5.9.4-4.red80.src.rpm">
					<filename>net-snmp-perl-1:5.9.4-4.red80.aarch64.rpm</filename>
				</package>
				<package name="net-snmp-perl-module" epoch="1" version="5.9.4" release="4.red80" arch="aarch64" src="net-snmp-5.9.4-4.red80.src.rpm">
					<filename>net-snmp-perl-module-1:5.9.4-4.red80.aarch64.rpm</filename>
				</package>
				<package name="net-snmp-utils" epoch="1" version="5.9.4" release="4.red80" arch="aarch64" src="net-snmp-5.9.4-4.red80.src.rpm">
					<filename>net-snmp-utils-1:5.9.4-4.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-net-snmp" epoch="1" version="5.9.4" release="4.red80" arch="aarch64" src="net-snmp-5.9.4-4.red80.src.rpm">
					<filename>python3-net-snmp-1:5.9.4-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0034</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость opentofu </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opentofu</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-opentofu-cve-2025-58185-8.0/</description>
               <solution>Установить обновление для пакета(ов) opentofu
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-opentofu-cve-2025-58185-8.0/" type="self" id="ROS-20260209-80-0034" title="ROS-20260209-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58185" type="cve" id="CVE-2025-58185" title="CVE-2025-58185" />
			<reference href="https://bdu.fstec.ru/vul/2025-14530" type="self" id="BDU:2025-14530" title="BDU:2025-14530" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="opentofu" epoch="0" version="1.11.2" release="1.red80" arch="x86_64" src="opentofu-1.11.2-1.red80.src.rpm">
					<filename>opentofu-0:1.11.2-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="opentofu" epoch="0" version="1.11.2" release="1.red80" arch="aarch64" src="opentofu-1.11.2-1.red80.src.rpm">
					<filename>opentofu-0:1.11.2-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0035</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость opentofu </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opentofu</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-opentofu-cve-2025-58187-8.0/</description>
               <solution>Установить обновление для пакета(ов) opentofu
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-opentofu-cve-2025-58187-8.0/" type="self" id="ROS-20260209-80-0035" title="ROS-20260209-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58187" type="cve" id="CVE-2025-58187" title="CVE-2025-58187" />
			<reference href="https://bdu.fstec.ru/vul/2025-13562" type="self" id="BDU:2025-13562" title="BDU:2025-13562" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="opentofu" epoch="0" version="1.11.2" release="1.red80" arch="x86_64" src="opentofu-1.11.2-1.red80.src.rpm">
					<filename>opentofu-0:1.11.2-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="opentofu" epoch="0" version="1.11.2" release="1.red80" arch="aarch64" src="opentofu-1.11.2-1.red80.src.rpm">
					<filename>opentofu-0:1.11.2-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0036</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость opentofu </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в opentofu</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-opentofu-cve-2025-58188-8.0/</description>
               <solution>Установить обновление для пакета(ов) opentofu
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-opentofu-cve-2025-58188-8.0/" type="self" id="ROS-20260209-80-0036" title="ROS-20260209-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58188" type="cve" id="CVE-2025-58188" title="CVE-2025-58188" />
			<reference href="https://bdu.fstec.ru/vul/2025-14525" type="self" id="BDU:2025-14525" title="BDU:2025-14525" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="opentofu" epoch="0" version="1.11.2" release="1.red80" arch="x86_64" src="opentofu-1.11.2-1.red80.src.rpm">
					<filename>opentofu-0:1.11.2-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="opentofu" epoch="0" version="1.11.2" release="1.red80" arch="aarch64" src="opentofu-1.11.2-1.red80.src.rpm">
					<filename>opentofu-0:1.11.2-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0037</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость opentofu </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opentofu</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-opentofu-cve-2025-58183-8.0/</description>
               <solution>Установить обновление для пакета(ов) opentofu
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-opentofu-cve-2025-58183-8.0/" type="self" id="ROS-20260209-80-0037" title="ROS-20260209-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58183" type="cve" id="CVE-2025-58183" title="CVE-2025-58183" />
			<reference href="https://bdu.fstec.ru/vul/2025-14528" type="self" id="BDU:2025-14528" title="BDU:2025-14528" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="opentofu" epoch="0" version="1.11.2" release="1.red80" arch="x86_64" src="opentofu-1.11.2-1.red80.src.rpm">
					<filename>opentofu-0:1.11.2-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="opentofu" epoch="0" version="1.11.2" release="1.red80" arch="aarch64" src="opentofu-1.11.2-1.red80.src.rpm">
					<filename>opentofu-0:1.11.2-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0038</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость containerd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в containerd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-containerd-cve-2024-25621-8.0/</description>
               <solution>Установить обновление для пакета(ов) containerd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-containerd-cve-2024-25621-8.0/" type="self" id="ROS-20260209-80-0038" title="ROS-20260209-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25621" type="cve" id="CVE-2024-25621" title="CVE-2024-25621" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="containerd" epoch="0" version="1.7.29" release="1.red80" arch="x86_64" src="containerd-1.7.29-1.red80.src.rpm">
					<filename>containerd-0:1.7.29-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="containerd" epoch="0" version="1.7.29" release="1.red80" arch="aarch64" src="containerd-1.7.29-1.red80.src.rpm">
					<filename>containerd-0:1.7.29-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0039</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость python-jose </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-jose</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-jose-cve-2024-29370-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-jose
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-jose-cve-2024-29370-8.0/" type="self" id="ROS-20260209-80-0039" title="ROS-20260209-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29370" type="cve" id="CVE-2024-29370" title="CVE-2024-29370" />
			<reference href="https://bdu.fstec.ru/vul/2025-16345" type="self" id="BDU:2025-16345" title="BDU:2025-16345" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python-jose-doc" epoch="0" version="3.3.0" release="16.red80" arch="noarch" src="python-jose-3.3.0-16.red80.src.rpm">
					<filename>python-jose-doc-0:3.3.0-16.red80.noarch.rpm</filename>
				</package>
				<package name="python3-jose" epoch="0" version="3.3.0" release="16.red80" arch="noarch" src="python-jose-3.3.0-16.red80.src.rpm">
					<filename>python3-jose-0:3.3.0-16.red80.noarch.rpm</filename>
				</package>
				<package name="python3-jose+cryptography" epoch="0" version="3.3.0" release="16.red80" arch="noarch" src="python-jose-3.3.0-16.red80.src.rpm">
					<filename>python3-jose+cryptography-0:3.3.0-16.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0040</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость mongo-c-driver </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongo-c-driver</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongo-c-driver-cve-2025-12119-8.0/</description>
               <solution>Установить обновление для пакета(ов) mongo-c-driver
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongo-c-driver-cve-2025-12119-8.0/" type="self" id="ROS-20260209-80-0040" title="ROS-20260209-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12119" type="cve" id="CVE-2025-12119" title="CVE-2025-12119" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libbson" epoch="0" version="1.30.6" release="1.red80" arch="x86_64" src="mongo-c-driver-1.30.6-1.red80.src.rpm">
					<filename>libbson-0:1.30.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libbson-devel" epoch="0" version="1.30.6" release="1.red80" arch="x86_64" src="mongo-c-driver-1.30.6-1.red80.src.rpm">
					<filename>libbson-devel-0:1.30.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver" epoch="0" version="1.30.6" release="1.red80" arch="x86_64" src="mongo-c-driver-1.30.6-1.red80.src.rpm">
					<filename>mongo-c-driver-0:1.30.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver-devel" epoch="0" version="1.30.6" release="1.red80" arch="x86_64" src="mongo-c-driver-1.30.6-1.red80.src.rpm">
					<filename>mongo-c-driver-devel-0:1.30.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver-doc" epoch="0" version="1.30.6" release="1.red80" arch="x86_64" src="mongo-c-driver-1.30.6-1.red80.src.rpm">
					<filename>mongo-c-driver-doc-0:1.30.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver-libs" epoch="0" version="1.30.6" release="1.red80" arch="x86_64" src="mongo-c-driver-1.30.6-1.red80.src.rpm">
					<filename>mongo-c-driver-libs-0:1.30.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libbson" epoch="0" version="1.30.6" release="1.red80" arch="aarch64" src="mongo-c-driver-1.30.6-1.red80.src.rpm">
					<filename>libbson-0:1.30.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libbson-devel" epoch="0" version="1.30.6" release="1.red80" arch="aarch64" src="mongo-c-driver-1.30.6-1.red80.src.rpm">
					<filename>libbson-devel-0:1.30.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongo-c-driver" epoch="0" version="1.30.6" release="1.red80" arch="aarch64" src="mongo-c-driver-1.30.6-1.red80.src.rpm">
					<filename>mongo-c-driver-0:1.30.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongo-c-driver-devel" epoch="0" version="1.30.6" release="1.red80" arch="aarch64" src="mongo-c-driver-1.30.6-1.red80.src.rpm">
					<filename>mongo-c-driver-devel-0:1.30.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongo-c-driver-doc" epoch="0" version="1.30.6" release="1.red80" arch="aarch64" src="mongo-c-driver-1.30.6-1.red80.src.rpm">
					<filename>mongo-c-driver-doc-0:1.30.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongo-c-driver-libs" epoch="0" version="1.30.6" release="1.red80" arch="aarch64" src="mongo-c-driver-1.30.6-1.red80.src.rpm">
					<filename>mongo-c-driver-libs-0:1.30.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0041</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость pgbouncer </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в pgbouncer</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-pgbouncer-cve-2025-12819-8.0/</description>
               <solution>Установить обновление для пакета(ов) pgbouncer
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-pgbouncer-cve-2025-12819-8.0/" type="self" id="ROS-20260209-80-0041" title="ROS-20260209-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12819" type="cve" id="CVE-2025-12819" title="CVE-2025-12819" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="pgbouncer" epoch="0" version="1.25.1" release="1.red80" arch="x86_64" src="pgbouncer-1.25.1-1.red80.src.rpm">
					<filename>pgbouncer-0:1.25.1-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="pgbouncer" epoch="0" version="1.25.1" release="1.red80" arch="aarch64" src="pgbouncer-1.25.1-1.red80.src.rpm">
					<filename>pgbouncer-0:1.25.1-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0042</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2025-68121-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2025-68121-8.0/" type="self" id="ROS-20260209-80-0042" title="ROS-20260209-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68121" type="cve" id="CVE-2025-68121" title="CVE-2025-68121" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="golang" epoch="0" version="1.25.6" release="1.red80" arch="x86_64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-0:1.25.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.6" release="1.red80" arch="x86_64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.6" release="1.red80" arch="x86_64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="golang" epoch="0" version="1.25.6" release="1.red80" arch="aarch64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-0:1.25.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.6" release="1.red80" arch="aarch64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.6" release="1.red80" arch="aarch64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="golang-docs" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-docs-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-misc-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-src-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-tests-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0043</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость zabbix-lts </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix-lts</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix-lts-cve-2025-49642-8.0/</description>
               <solution>Установить обновление для пакета(ов) zabbix-lts
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix-lts-cve-2025-49642-8.0/" type="self" id="ROS-20260209-80-0043" title="ROS-20260209-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49642" type="cve" id="CVE-2025-49642" title="CVE-2025-49642" />
			<reference href="https://bdu.fstec.ru/vul/2025-15875" type="self" id="BDU:2025-15875" title="BDU:2025-15875" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="zabbix-lts-agent" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-agent-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-agent2" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-agent2-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-get" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-get-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk11" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk11-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk17" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk17-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk21" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk21-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-js" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-js-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-mysql" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-proxy-mysql-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-pgsql" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-proxy-pgsql-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-sqlite3" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-proxy-sqlite3-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-sender" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-sender-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-mysql" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-server-mysql-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-pgsql" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-server-pgsql-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-web-service" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-web-service-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="zabbix-lts-agent" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-agent-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-agent2" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-agent2-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-get" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-get-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk11" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk11-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk17" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk17-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk21" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk21-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-js" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-js-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-mysql" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-proxy-mysql-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-pgsql" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-proxy-pgsql-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-sqlite3" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-proxy-sqlite3-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-sender" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-sender-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-mysql" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-server-mysql-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-pgsql" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-server-pgsql-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-web-service" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-web-service-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="zabbix-lts-apache-conf" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-apache-conf-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-nginx-conf" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-nginx-conf-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-selinux-policy" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-selinux-policy-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-sql-scripts" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-sql-scripts-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-web-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-deps" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-web-deps-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-mysql" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-web-mysql-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-pgsql" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-web-pgsql-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0044</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость zabbix7-lts </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7-lts</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix7-lts-cve-2025-49642-8.0/</description>
               <solution>Установить обновление для пакета(ов) zabbix7-lts
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix7-lts-cve-2025-49642-8.0/" type="self" id="ROS-20260209-80-0044" title="ROS-20260209-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49642" type="cve" id="CVE-2025-49642" title="CVE-2025-49642" />
			<reference href="https://bdu.fstec.ru/vul/2025-15875" type="self" id="BDU:2025-15875" title="BDU:2025-15875" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="zabbix7-lts-agent" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-agent-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-agent2" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-agent2-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-get" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-get-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-java-gateway-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk11" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk11-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk17" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk17-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk21" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk21-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-js" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-js-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-mysql" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-proxy-mysql-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-pgsql" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-proxy-pgsql-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-sqlite3" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-proxy-sqlite3-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-sender" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-sender-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-mysql" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-server-mysql-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-pgsql" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-server-pgsql-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-service" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-web-service-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="zabbix7-lts-agent" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-agent-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-agent2" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-agent2-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-get" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-get-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-java-gateway-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk11" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk11-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk17" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk17-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk21" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk21-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-js" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-js-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-mysql" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-proxy-mysql-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-pgsql" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-proxy-pgsql-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-sqlite3" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-proxy-sqlite3-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-sender" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-sender-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-mysql" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-server-mysql-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-pgsql" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-server-pgsql-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-service" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-web-service-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="zabbix7-lts-apache-conf" epoch="1" version="7.0.19" release="1.red80" arch="noarch" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-apache-conf-1:7.0.19-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-nginx-conf" epoch="1" version="7.0.19" release="1.red80" arch="noarch" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-nginx-conf-1:7.0.19-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-selinux-policy" epoch="1" version="7.0.19" release="1.red80" arch="noarch" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-selinux-policy-1:7.0.19-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-sql-scripts" epoch="1" version="7.0.19" release="1.red80" arch="noarch" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-sql-scripts-1:7.0.19-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web" epoch="1" version="7.0.19" release="1.red80" arch="noarch" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-web-1:7.0.19-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-deps" epoch="1" version="7.0.19" release="1.red80" arch="noarch" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-web-deps-1:7.0.19-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-mysql" epoch="1" version="7.0.19" release="1.red80" arch="noarch" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-web-mysql-1:7.0.19-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-pgsql" epoch="1" version="7.0.19" release="1.red80" arch="noarch" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-web-pgsql-1:7.0.19-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0045</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость zabbix7.2 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в zabbix7.2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix7-2-cve-2025-49642-8.0/</description>
               <solution>Установить обновление для пакета(ов) zabbix7.2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix7-2-cve-2025-49642-8.0/" type="self" id="ROS-20260209-80-0045" title="ROS-20260209-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49642" type="cve" id="CVE-2025-49642" title="CVE-2025-49642" />
			<reference href="https://bdu.fstec.ru/vul/2025-15875" type="self" id="BDU:2025-15875" title="BDU:2025-15875" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="zabbix7.2-agent" epoch="1" version="7.2.12" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-agent-1:7.2.12-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-agent2" epoch="1" version="7.2.12" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-agent2-1:7.2.12-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-get" epoch="1" version="7.2.12" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-get-1:7.2.12-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway" epoch="1" version="7.2.12" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-1:7.2.12-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk11" epoch="1" version="7.2.12" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk11-1:7.2.12-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk17" epoch="1" version="7.2.12" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk17-1:7.2.12-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk21" epoch="1" version="7.2.12" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk21-1:7.2.12-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-js" epoch="1" version="7.2.12" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-js-1:7.2.12-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-mysql" epoch="1" version="7.2.12" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-proxy-mysql-1:7.2.12-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-pgsql" epoch="1" version="7.2.12" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-proxy-pgsql-1:7.2.12-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-sqlite3" epoch="1" version="7.2.12" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-proxy-sqlite3-1:7.2.12-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-sender" epoch="1" version="7.2.12" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-sender-1:7.2.12-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-mysql" epoch="1" version="7.2.12" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-server-mysql-1:7.2.12-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-pgsql" epoch="1" version="7.2.12" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-server-pgsql-1:7.2.12-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-web-service" epoch="1" version="7.2.12" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-web-service-1:7.2.12-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="zabbix7.2-agent" epoch="1" version="7.2.12" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-agent-1:7.2.12-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-agent2" epoch="1" version="7.2.12" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-agent2-1:7.2.12-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-get" epoch="1" version="7.2.12" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-get-1:7.2.12-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway" epoch="1" version="7.2.12" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-1:7.2.12-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk11" epoch="1" version="7.2.12" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk11-1:7.2.12-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk17" epoch="1" version="7.2.12" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk17-1:7.2.12-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk21" epoch="1" version="7.2.12" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk21-1:7.2.12-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-js" epoch="1" version="7.2.12" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-js-1:7.2.12-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-mysql" epoch="1" version="7.2.12" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-proxy-mysql-1:7.2.12-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-pgsql" epoch="1" version="7.2.12" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-proxy-pgsql-1:7.2.12-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-sqlite3" epoch="1" version="7.2.12" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-proxy-sqlite3-1:7.2.12-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-sender" epoch="1" version="7.2.12" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-sender-1:7.2.12-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-mysql" epoch="1" version="7.2.12" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-server-mysql-1:7.2.12-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-pgsql" epoch="1" version="7.2.12" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-server-pgsql-1:7.2.12-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="zabbix7.2-apache-conf" epoch="1" version="7.2.12" release="1.red80" arch="noarch" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-apache-conf-1:7.2.12-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-nginx-conf" epoch="1" version="7.2.12" release="1.red80" arch="noarch" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-nginx-conf-1:7.2.12-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-selinux-policy" epoch="1" version="7.2.12" release="1.red80" arch="noarch" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-selinux-policy-1:7.2.12-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-sql-scripts" epoch="1" version="7.2.12" release="1.red80" arch="noarch" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-sql-scripts-1:7.2.12-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web" epoch="1" version="7.2.12" release="1.red80" arch="noarch" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-web-1:7.2.12-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-deps" epoch="1" version="7.2.12" release="1.red80" arch="noarch" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-web-deps-1:7.2.12-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-mysql" epoch="1" version="7.2.12" release="1.red80" arch="noarch" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-web-mysql-1:7.2.12-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-pgsql" epoch="1" version="7.2.12" release="1.red80" arch="noarch" src="zabbix7.2-7.2.12-1.red80.src.rpm">
					<filename>zabbix7.2-web-pgsql-1:7.2.12-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0047</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость polkit </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в polkit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-polkit-cve-2021-3560-8.0/</description>
               <solution>Установить обновление для пакета(ов) polkit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-polkit-cve-2021-3560-8.0/" type="self" id="ROS-20260209-80-0047" title="ROS-20260209-80-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3560" type="cve" id="CVE-2021-3560" title="CVE-2021-3560" />
			<reference href="https://bdu.fstec.ru/vul/2021-03207" type="self" id="BDU:2021-03207" title="BDU:2021-03207" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="polkit" epoch="0" version="125" release="3.red80" arch="x86_64" src="polkit-125-3.red80.src.rpm">
					<filename>polkit-0:125-3.red80.x86_64.rpm</filename>
				</package>
				<package name="polkit-devel" epoch="0" version="125" release="3.red80" arch="x86_64" src="polkit-125-3.red80.src.rpm">
					<filename>polkit-devel-0:125-3.red80.x86_64.rpm</filename>
				</package>
				<package name="polkit-libs" epoch="0" version="125" release="3.red80" arch="x86_64" src="polkit-125-3.red80.src.rpm">
					<filename>polkit-libs-0:125-3.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="polkit" epoch="0" version="125" release="3.red80" arch="aarch64" src="polkit-125-3.red80.src.rpm">
					<filename>polkit-0:125-3.red80.aarch64.rpm</filename>
				</package>
				<package name="polkit-devel" epoch="0" version="125" release="3.red80" arch="aarch64" src="polkit-125-3.red80.src.rpm">
					<filename>polkit-devel-0:125-3.red80.aarch64.rpm</filename>
				</package>
				<package name="polkit-libs" epoch="0" version="125" release="3.red80" arch="aarch64" src="polkit-125-3.red80.src.rpm">
					<filename>polkit-libs-0:125-3.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="polkit-docs" epoch="0" version="125" release="3.red80" arch="noarch" src="polkit-125-3.red80.src.rpm">
					<filename>polkit-docs-0:125-3.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0048</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2025-61726-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2025-61726-8.0/" type="self" id="ROS-20260209-80-0048" title="ROS-20260209-80-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61726" type="cve" id="CVE-2025-61726" title="CVE-2025-61726" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="golang" epoch="0" version="1.25.6" release="1.red80" arch="x86_64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-0:1.25.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.6" release="1.red80" arch="x86_64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.6" release="1.red80" arch="x86_64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="golang" epoch="0" version="1.25.6" release="1.red80" arch="aarch64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-0:1.25.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.6" release="1.red80" arch="aarch64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.6" release="1.red80" arch="aarch64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="golang-docs" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-docs-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-misc-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-src-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-tests-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0049</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2025-61728-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2025-61728-8.0/" type="self" id="ROS-20260209-80-0049" title="ROS-20260209-80-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61728" type="cve" id="CVE-2025-61728" title="CVE-2025-61728" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="golang" epoch="0" version="1.25.6" release="1.red80" arch="x86_64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-0:1.25.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.6" release="1.red80" arch="x86_64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.6" release="1.red80" arch="x86_64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="golang" epoch="0" version="1.25.6" release="1.red80" arch="aarch64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-0:1.25.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.6" release="1.red80" arch="aarch64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.6" release="1.red80" arch="aarch64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="golang-docs" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-docs-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-misc-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-src-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-tests-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0050</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2025-61730-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2025-61730-8.0/" type="self" id="ROS-20260209-80-0050" title="ROS-20260209-80-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61730" type="cve" id="CVE-2025-61730" title="CVE-2025-61730" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="golang" epoch="0" version="1.25.6" release="1.red80" arch="x86_64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-0:1.25.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.6" release="1.red80" arch="x86_64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.6" release="1.red80" arch="x86_64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="golang" epoch="0" version="1.25.6" release="1.red80" arch="aarch64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-0:1.25.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.6" release="1.red80" arch="aarch64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.6" release="1.red80" arch="aarch64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="golang-docs" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-docs-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-misc-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-src-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-tests-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0051</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2025-61731-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2025-61731-8.0/" type="self" id="ROS-20260209-80-0051" title="ROS-20260209-80-0051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61731" type="cve" id="CVE-2025-61731" title="CVE-2025-61731" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="golang" epoch="0" version="1.25.6" release="1.red80" arch="x86_64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-0:1.25.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.6" release="1.red80" arch="x86_64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.6" release="1.red80" arch="x86_64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="golang" epoch="0" version="1.25.6" release="1.red80" arch="aarch64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-0:1.25.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.6" release="1.red80" arch="aarch64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.6" release="1.red80" arch="aarch64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="golang-docs" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-docs-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-misc-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-src-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-tests-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260209-80-0052</id>
		<issued date="2026-02-09" />
		<updated date="2026-02-09" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2025-68119-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2025-68119-8.0/" type="self" id="ROS-20260209-80-0052" title="ROS-20260209-80-0052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68119" type="cve" id="CVE-2025-68119" title="CVE-2025-68119" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="golang" epoch="0" version="1.25.6" release="1.red80" arch="x86_64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-0:1.25.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.6" release="1.red80" arch="x86_64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.6" release="1.red80" arch="x86_64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="golang" epoch="0" version="1.25.6" release="1.red80" arch="aarch64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-0:1.25.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.6" release="1.red80" arch="aarch64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.6" release="1.red80" arch="aarch64" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="golang-docs" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-docs-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-misc-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-src-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.6" release="1.red80" arch="noarch" src="golang-1.25.6-1.red80.src.rpm">
					<filename>golang-tests-0:1.25.6-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-80-0001</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37897-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37897-8.0/" type="self" id="ROS-20260211-80-0001" title="ROS-20260211-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37897" type="cve" id="CVE-2025-37897" title="CVE-2025-37897" />
			<reference href="https://bdu.fstec.ru/vul/2025-12237" type="self" id="BDU:2025-12237" title="BDU:2025-12237" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-80-0002</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37900-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37900-8.0/" type="self" id="ROS-20260211-80-0002" title="ROS-20260211-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37900" type="cve" id="CVE-2025-37900" title="CVE-2025-37900" />
			<reference href="https://bdu.fstec.ru/vul/2025-11796" type="self" id="BDU:2025-11796" title="BDU:2025-11796" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-80-0003</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37901-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37901-8.0/" type="self" id="ROS-20260211-80-0003" title="ROS-20260211-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37901" type="cve" id="CVE-2025-37901" title="CVE-2025-37901" />
			<reference href="https://bdu.fstec.ru/vul/2025-11900" type="self" id="BDU:2025-11900" title="BDU:2025-11900" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-80-0004</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37998-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37998-8.0/" type="self" id="ROS-20260211-80-0004" title="ROS-20260211-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37998" type="cve" id="CVE-2025-37998" title="CVE-2025-37998" />
			<reference href="https://bdu.fstec.ru/vul/2025-11970" type="self" id="BDU:2025-11970" title="BDU:2025-11970" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-80-0005</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37999-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37999-8.0/" type="self" id="ROS-20260211-80-0005" title="ROS-20260211-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37999" type="cve" id="CVE-2025-37999" title="CVE-2025-37999" />
			<reference href="https://bdu.fstec.ru/vul/2025-12289" type="self" id="BDU:2025-12289" title="BDU:2025-12289" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-80-0006</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38003-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38003-8.0/" type="self" id="ROS-20260211-80-0006" title="ROS-20260211-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38003" type="cve" id="CVE-2025-38003" title="CVE-2025-38003" />
			<reference href="https://bdu.fstec.ru/vul/2025-12065" type="self" id="BDU:2025-12065" title="BDU:2025-12065" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-80-0007</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38083-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38083-8.0/" type="self" id="ROS-20260211-80-0007" title="ROS-20260211-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38083" type="cve" id="CVE-2025-38083" title="CVE-2025-38083" />
			<reference href="https://bdu.fstec.ru/vul/2025-11467" type="self" id="BDU:2025-11467" title="BDU:2025-11467" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-80-0008</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38084-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38084-8.0/" type="self" id="ROS-20260211-80-0008" title="ROS-20260211-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38084" type="cve" id="CVE-2025-38084" title="CVE-2025-38084" />
			<reference href="https://bdu.fstec.ru/vul/2025-15825" type="self" id="BDU:2025-15825" title="BDU:2025-15825" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-80-0009</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38085-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38085-8.0/" type="self" id="ROS-20260211-80-0009" title="ROS-20260211-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38085" type="cve" id="CVE-2025-38085" title="CVE-2025-38085" />
			<reference href="https://bdu.fstec.ru/vul/2025-15824" type="self" id="BDU:2025-15824" title="BDU:2025-15824" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-80-0010</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38086-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38086-8.0/" type="self" id="ROS-20260211-80-0010" title="ROS-20260211-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38086" type="cve" id="CVE-2025-38086" title="CVE-2025-38086" />
			<reference href="https://bdu.fstec.ru/vul/2025-09834" type="self" id="BDU:2025-09834" title="BDU:2025-09834" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-80-0011</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38087-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38087-8.0/" type="self" id="ROS-20260211-80-0011" title="ROS-20260211-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38087" type="cve" id="CVE-2025-38087" title="CVE-2025-38087" />
			<reference href="https://bdu.fstec.ru/vul/2025-09825" type="self" id="BDU:2025-09825" title="BDU:2025-09825" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-80-0012</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38088-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38088-8.0/" type="self" id="ROS-20260211-80-0012" title="ROS-20260211-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38088" type="cve" id="CVE-2025-38088" title="CVE-2025-38088" />
			<reference href="https://bdu.fstec.ru/vul/2025-09826" type="self" id="BDU:2025-09826" title="BDU:2025-09826" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-80-0013</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38089-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38089-8.0/" type="self" id="ROS-20260211-80-0013" title="ROS-20260211-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38089" type="cve" id="CVE-2025-38089" title="CVE-2025-38089" />
			<reference href="https://bdu.fstec.ru/vul/2025-11768" type="self" id="BDU:2025-11768" title="BDU:2025-11768" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-80-0014</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38090-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38090-8.0/" type="self" id="ROS-20260211-80-0014" title="ROS-20260211-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38090" type="cve" id="CVE-2025-38090" title="CVE-2025-38090" />
			<reference href="https://bdu.fstec.ru/vul/2025-14095" type="self" id="BDU:2025-14095" title="BDU:2025-14095" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260211-80-0015</id>
		<issued date="2026-02-11" />
		<updated date="2026-02-11" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38093-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38093-8.0/" type="self" id="ROS-20260211-80-0015" title="ROS-20260211-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38093" type="cve" id="CVE-2025-38093" title="CVE-2025-38093" />
			<reference href="https://bdu.fstec.ru/vul/2025-11385" type="self" id="BDU:2025-11385" title="BDU:2025-11385" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0001</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость pgadmin4 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в pgadmin4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-pgadmin4-cve-2025-12762-8.0/</description>
               <solution>Установить обновление для пакета(ов) pgadmin4
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-pgadmin4-cve-2025-12762-8.0/" type="self" id="ROS-20260216-80-0001" title="ROS-20260216-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12762" type="cve" id="CVE-2025-12762" title="CVE-2025-12762" />
			<reference href="https://bdu.fstec.ru/vul/2025-14360" type="self" id="BDU:2025-14360" title="BDU:2025-14360" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="pgadmin4" epoch="0" version="9.6" release="4.red80" arch="x86_64" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-0:9.6-4.red80.x86_64.rpm</filename>
				</package>
				<package name="pgadmin4-httpd" epoch="0" version="9.6" release="4.red80" arch="x86_64" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-httpd-0:9.6-4.red80.x86_64.rpm</filename>
				</package>
				<package name="pgadmin4-qt" epoch="0" version="9.6" release="4.red80" arch="x86_64" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-qt-0:9.6-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="pgadmin4" epoch="0" version="9.6" release="4.red80" arch="aarch64" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-0:9.6-4.red80.aarch64.rpm</filename>
				</package>
				<package name="pgadmin4-httpd" epoch="0" version="9.6" release="4.red80" arch="aarch64" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-httpd-0:9.6-4.red80.aarch64.rpm</filename>
				</package>
				<package name="pgadmin4-qt" epoch="0" version="9.6" release="4.red80" arch="aarch64" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-qt-0:9.6-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="pgadmin4-doc" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-doc-0:9.6-4.red80.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-cs" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-langpack-cs-0:9.6-4.red80.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-de" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-langpack-de-0:9.6-4.red80.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-es" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-langpack-es-0:9.6-4.red80.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-fr" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-langpack-fr-0:9.6-4.red80.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-it" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-langpack-it-0:9.6-4.red80.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-ja" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-langpack-ja-0:9.6-4.red80.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-ko" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-langpack-ko-0:9.6-4.red80.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-pl" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-langpack-pl-0:9.6-4.red80.noarch.rpm</filename>
				</package>
				<package name="pgadmin4-langpack-ru" epoch="0" version="9.6" release="4.red80" arch="noarch" src="pgadmin4-9.6-4.red80.src.rpm">
					<filename>pgadmin4-langpack-ru-0:9.6-4.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0002</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость python-socketio </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-socketio</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-socketio-cve-2025-61765-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-socketio
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-socketio-cve-2025-61765-8.0/" type="self" id="ROS-20260216-80-0002" title="ROS-20260216-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61765" type="cve" id="CVE-2025-61765" title="CVE-2025-61765" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python-socketio-doc" epoch="0" version="5.16.0" release="1.red80" arch="noarch" src="python-socketio-5.16.0-1.red80.src.rpm">
					<filename>python-socketio-doc-0:5.16.0-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-socketio" epoch="0" version="5.16.0" release="1.red80" arch="noarch" src="python-socketio-5.16.0-1.red80.src.rpm">
					<filename>python3-socketio-0:5.16.0-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-socketio+asyncio_client" epoch="0" version="5.16.0" release="1.red80" arch="noarch" src="python-socketio-5.16.0-1.red80.src.rpm">
					<filename>python3-socketio+asyncio_client-0:5.16.0-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-socketio+client" epoch="0" version="5.16.0" release="1.red80" arch="noarch" src="python-socketio-5.16.0-1.red80.src.rpm">
					<filename>python3-socketio+client-0:5.16.0-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0003</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость unbound </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в unbound</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-unbound-cve-2025-11411-8.0/</description>
               <solution>Установить обновление для пакета(ов) unbound
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-unbound-cve-2025-11411-8.0/" type="self" id="ROS-20260216-80-0003" title="ROS-20260216-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11411" type="cve" id="CVE-2025-11411" title="CVE-2025-11411" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="python3-unbound" epoch="0" version="1.19.2" release="10.red80" arch="x86_64" src="unbound-1.19.2-10.red80.src.rpm">
					<filename>python3-unbound-0:1.19.2-10.red80.x86_64.rpm</filename>
				</package>
				<package name="unbound" epoch="0" version="1.19.2" release="10.red80" arch="x86_64" src="unbound-1.19.2-10.red80.src.rpm">
					<filename>unbound-0:1.19.2-10.red80.x86_64.rpm</filename>
				</package>
				<package name="unbound-devel" epoch="0" version="1.19.2" release="10.red80" arch="x86_64" src="unbound-1.19.2-10.red80.src.rpm">
					<filename>unbound-devel-0:1.19.2-10.red80.x86_64.rpm</filename>
				</package>
				<package name="unbound-libs" epoch="0" version="1.19.2" release="10.red80" arch="x86_64" src="unbound-1.19.2-10.red80.src.rpm">
					<filename>unbound-libs-0:1.19.2-10.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="python3-unbound" epoch="0" version="1.19.2" release="10.red80" arch="aarch64" src="unbound-1.19.2-10.red80.src.rpm">
					<filename>python3-unbound-0:1.19.2-10.red80.aarch64.rpm</filename>
				</package>
				<package name="unbound" epoch="0" version="1.19.2" release="10.red80" arch="aarch64" src="unbound-1.19.2-10.red80.src.rpm">
					<filename>unbound-0:1.19.2-10.red80.aarch64.rpm</filename>
				</package>
				<package name="unbound-devel" epoch="0" version="1.19.2" release="10.red80" arch="aarch64" src="unbound-1.19.2-10.red80.src.rpm">
					<filename>unbound-devel-0:1.19.2-10.red80.aarch64.rpm</filename>
				</package>
				<package name="unbound-libs" epoch="0" version="1.19.2" release="10.red80" arch="aarch64" src="unbound-1.19.2-10.red80.src.rpm">
					<filename>unbound-libs-0:1.19.2-10.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0004</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость wireshark </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-wireshark-cve-2026-0961-8.0/</description>
               <solution>Установить обновление для пакета(ов) wireshark
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-wireshark-cve-2026-0961-8.0/" type="self" id="ROS-20260216-80-0004" title="ROS-20260216-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0961" type="cve" id="CVE-2026-0961" title="CVE-2026-0961" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="wireshark" epoch="1" version="4.6.3" release="2.red80" arch="x86_64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-1:4.6.3-2.red80.x86_64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.3" release="2.red80" arch="x86_64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-cli-1:4.6.3-2.red80.x86_64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.3" release="2.red80" arch="x86_64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-devel-1:4.6.3-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="wireshark" epoch="1" version="4.6.3" release="2.red80" arch="aarch64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-1:4.6.3-2.red80.aarch64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.3" release="2.red80" arch="aarch64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-cli-1:4.6.3-2.red80.aarch64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.3" release="2.red80" arch="aarch64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-devel-1:4.6.3-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0005</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость wireshark </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-wireshark-cve-2026-0959-8.0/</description>
               <solution>Установить обновление для пакета(ов) wireshark
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-wireshark-cve-2026-0959-8.0/" type="self" id="ROS-20260216-80-0005" title="ROS-20260216-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0959" type="cve" id="CVE-2026-0959" title="CVE-2026-0959" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="wireshark" epoch="1" version="4.6.3" release="2.red80" arch="x86_64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-1:4.6.3-2.red80.x86_64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.3" release="2.red80" arch="x86_64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-cli-1:4.6.3-2.red80.x86_64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.3" release="2.red80" arch="x86_64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-devel-1:4.6.3-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="wireshark" epoch="1" version="4.6.3" release="2.red80" arch="aarch64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-1:4.6.3-2.red80.aarch64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.3" release="2.red80" arch="aarch64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-cli-1:4.6.3-2.red80.aarch64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.3" release="2.red80" arch="aarch64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-devel-1:4.6.3-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0006</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость wireshark </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-wireshark-cve-2026-0960-8.0/</description>
               <solution>Установить обновление для пакета(ов) wireshark
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-wireshark-cve-2026-0960-8.0/" type="self" id="ROS-20260216-80-0006" title="ROS-20260216-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960" type="cve" id="CVE-2026-0960" title="CVE-2026-0960" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="wireshark" epoch="1" version="4.6.3" release="2.red80" arch="x86_64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-1:4.6.3-2.red80.x86_64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.3" release="2.red80" arch="x86_64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-cli-1:4.6.3-2.red80.x86_64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.3" release="2.red80" arch="x86_64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-devel-1:4.6.3-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="wireshark" epoch="1" version="4.6.3" release="2.red80" arch="aarch64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-1:4.6.3-2.red80.aarch64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.3" release="2.red80" arch="aarch64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-cli-1:4.6.3-2.red80.aarch64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.3" release="2.red80" arch="aarch64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-devel-1:4.6.3-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0007</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость wireshark </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-wireshark-cve-2025-13945-8.0/</description>
               <solution>Установить обновление для пакета(ов) wireshark
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-wireshark-cve-2025-13945-8.0/" type="self" id="ROS-20260216-80-0007" title="ROS-20260216-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945" type="cve" id="CVE-2025-13945" title="CVE-2025-13945" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="wireshark" epoch="1" version="4.6.3" release="2.red80" arch="x86_64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-1:4.6.3-2.red80.x86_64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.3" release="2.red80" arch="x86_64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-cli-1:4.6.3-2.red80.x86_64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.3" release="2.red80" arch="x86_64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-devel-1:4.6.3-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="wireshark" epoch="1" version="4.6.3" release="2.red80" arch="aarch64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-1:4.6.3-2.red80.aarch64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.3" release="2.red80" arch="aarch64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-cli-1:4.6.3-2.red80.aarch64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.3" release="2.red80" arch="aarch64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-devel-1:4.6.3-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0008</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость wireshark </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-wireshark-cve-2025-13946-8.0/</description>
               <solution>Установить обновление для пакета(ов) wireshark
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-wireshark-cve-2025-13946-8.0/" type="self" id="ROS-20260216-80-0008" title="ROS-20260216-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946" type="cve" id="CVE-2025-13946" title="CVE-2025-13946" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="wireshark" epoch="1" version="4.6.3" release="2.red80" arch="x86_64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-1:4.6.3-2.red80.x86_64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.3" release="2.red80" arch="x86_64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-cli-1:4.6.3-2.red80.x86_64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.3" release="2.red80" arch="x86_64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-devel-1:4.6.3-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="wireshark" epoch="1" version="4.6.3" release="2.red80" arch="aarch64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-1:4.6.3-2.red80.aarch64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.3" release="2.red80" arch="aarch64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-cli-1:4.6.3-2.red80.aarch64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.3" release="2.red80" arch="aarch64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-devel-1:4.6.3-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0009</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость netty </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в netty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-netty-cve-2025-67735-8.0/</description>
               <solution>Установить обновление для пакета(ов) netty
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-netty-cve-2025-67735-8.0/" type="self" id="ROS-20260216-80-0009" title="ROS-20260216-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67735" type="cve" id="CVE-2025-67735" title="CVE-2025-67735" />
			<reference href="https://bdu.fstec.ru/vul/2026-01632" type="self" id="BDU:2026-01632" title="BDU:2026-01632" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="netty" epoch="0" version="4.1.130" release="1.red80" arch="x86_64" src="netty-4.1.130-1.red80.src.rpm">
					<filename>netty-0:4.1.130-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="netty-javadoc" epoch="0" version="4.1.130" release="1.red80" arch="noarch" src="netty-4.1.130-1.red80.src.rpm">
					<filename>netty-javadoc-0:4.1.130-1.red80.noarch.rpm</filename>
				</package>
				<package name="netty-poms" epoch="0" version="4.1.130" release="1.red80" arch="noarch" src="netty-4.1.130-1.red80.src.rpm">
					<filename>netty-poms-0:4.1.130-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0010</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость avahi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в avahi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-avahi-cve-2025-59529-8.0/</description>
               <solution>Установить обновление для пакета(ов) avahi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-avahi-cve-2025-59529-8.0/" type="self" id="ROS-20260216-80-0010" title="ROS-20260216-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59529" type="cve" id="CVE-2025-59529" title="CVE-2025-59529" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="avahi" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-autoipd-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-libs-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-sharp-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-tools-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-tools-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>python3-avahi-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="avahi" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-autoipd-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-libs-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-sharp-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-tools-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-tools-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>python3-avahi-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0011</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость kubernetes1.32 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kubernetes1.32</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kubernetes1-32-cve-2025-13281-8.0/</description>
               <solution>Установить обновление для пакета(ов) kubernetes1.32
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kubernetes1-32-cve-2025-13281-8.0/" type="self" id="ROS-20260216-80-0011" title="ROS-20260216-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13281" type="cve" id="CVE-2025-13281" title="CVE-2025-13281" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kubernetes1.32" epoch="0" version="1.32.10" release="1.red80" arch="x86_64" src="kubernetes1.32-1.32.10-1.red80.src.rpm">
					<filename>kubernetes1.32-0:1.32.10-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kubernetes1.32-client" epoch="0" version="1.32.10" release="1.red80" arch="x86_64" src="kubernetes1.32-1.32.10-1.red80.src.rpm">
					<filename>kubernetes1.32-client-0:1.32.10-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kubernetes1.32-kubeadm" epoch="0" version="1.32.10" release="1.red80" arch="x86_64" src="kubernetes1.32-1.32.10-1.red80.src.rpm">
					<filename>kubernetes1.32-kubeadm-0:1.32.10-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kubernetes1.32-master" epoch="0" version="1.32.10" release="1.red80" arch="x86_64" src="kubernetes1.32-1.32.10-1.red80.src.rpm">
					<filename>kubernetes1.32-master-0:1.32.10-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kubernetes1.32-node" epoch="0" version="1.32.10" release="1.red80" arch="x86_64" src="kubernetes1.32-1.32.10-1.red80.src.rpm">
					<filename>kubernetes1.32-node-0:1.32.10-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kubernetes1.32" epoch="0" version="1.32.10" release="1.red80" arch="aarch64" src="kubernetes1.32-1.32.10-1.red80.src.rpm">
					<filename>kubernetes1.32-0:1.32.10-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kubernetes1.32-client" epoch="0" version="1.32.10" release="1.red80" arch="aarch64" src="kubernetes1.32-1.32.10-1.red80.src.rpm">
					<filename>kubernetes1.32-client-0:1.32.10-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kubernetes1.32-kubeadm" epoch="0" version="1.32.10" release="1.red80" arch="aarch64" src="kubernetes1.32-1.32.10-1.red80.src.rpm">
					<filename>kubernetes1.32-kubeadm-0:1.32.10-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kubernetes1.32-master" epoch="0" version="1.32.10" release="1.red80" arch="aarch64" src="kubernetes1.32-1.32.10-1.red80.src.rpm">
					<filename>kubernetes1.32-master-0:1.32.10-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kubernetes1.32-node" epoch="0" version="1.32.10" release="1.red80" arch="aarch64" src="kubernetes1.32-1.32.10-1.red80.src.rpm">
					<filename>kubernetes1.32-node-0:1.32.10-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0012</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость avahi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в avahi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-avahi-cve-2025-68471-8.0/</description>
               <solution>Установить обновление для пакета(ов) avahi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-avahi-cve-2025-68471-8.0/" type="self" id="ROS-20260216-80-0012" title="ROS-20260216-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68471" type="cve" id="CVE-2025-68471" title="CVE-2025-68471" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="avahi" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-autoipd-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-libs-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-sharp-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-tools-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-tools-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>python3-avahi-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="avahi" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-autoipd-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-libs-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-sharp-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-tools-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-tools-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>python3-avahi-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0013</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость avahi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в avahi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-avahi-cve-2025-68468-8.0/</description>
               <solution>Установить обновление для пакета(ов) avahi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-avahi-cve-2025-68468-8.0/" type="self" id="ROS-20260216-80-0013" title="ROS-20260216-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68468" type="cve" id="CVE-2025-68468" title="CVE-2025-68468" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="avahi" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-autoipd-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-libs-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-sharp-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-tools-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-tools-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>python3-avahi-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="avahi" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-autoipd-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-libs-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-sharp-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-tools-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-tools-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>python3-avahi-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0014</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость gpac </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gpac-cve-2026-1417-8.0/</description>
               <solution>Установить обновление для пакета(ов) gpac
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gpac-cve-2026-1417-8.0/" type="self" id="ROS-20260216-80-0014" title="ROS-20260216-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1417" type="cve" id="CVE-2026-1417" title="CVE-2026-1417" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gpac" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
				<package name="gpac-devel" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-devel-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
				<package name="gpac-doc" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-doc-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
				<package name="gpac-libs" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-libs-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
				<package name="gpac-static" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-static-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gpac" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
				<package name="gpac-devel" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-devel-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
				<package name="gpac-doc" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-doc-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
				<package name="gpac-libs" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-libs-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
				<package name="gpac-static" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-static-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0015</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость gpac </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gpac-cve-2026-1415-8.0/</description>
               <solution>Установить обновление для пакета(ов) gpac
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gpac-cve-2026-1415-8.0/" type="self" id="ROS-20260216-80-0015" title="ROS-20260216-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1415" type="cve" id="CVE-2026-1415" title="CVE-2026-1415" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gpac" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
				<package name="gpac-devel" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-devel-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
				<package name="gpac-doc" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-doc-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
				<package name="gpac-libs" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-libs-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
				<package name="gpac-static" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-static-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gpac" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
				<package name="gpac-devel" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-devel-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
				<package name="gpac-doc" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-doc-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
				<package name="gpac-libs" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-libs-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
				<package name="gpac-static" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-static-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0016</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость gpac </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gpac-cve-2026-1416-8.0/</description>
               <solution>Установить обновление для пакета(ов) gpac
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gpac-cve-2026-1416-8.0/" type="self" id="ROS-20260216-80-0016" title="ROS-20260216-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1416" type="cve" id="CVE-2026-1416" title="CVE-2026-1416" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gpac" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
				<package name="gpac-devel" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-devel-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
				<package name="gpac-doc" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-doc-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
				<package name="gpac-libs" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-libs-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
				<package name="gpac-static" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-static-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gpac" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
				<package name="gpac-devel" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-devel-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
				<package name="gpac-doc" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-doc-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
				<package name="gpac-libs" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-libs-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
				<package name="gpac-static" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-static-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0017</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость gpac </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gpac</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gpac-cve-2026-1418-8.0/</description>
               <solution>Установить обновление для пакета(ов) gpac
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gpac-cve-2026-1418-8.0/" type="self" id="ROS-20260216-80-0017" title="ROS-20260216-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1418" type="cve" id="CVE-2026-1418" title="CVE-2026-1418" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gpac" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
				<package name="gpac-devel" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-devel-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
				<package name="gpac-doc" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-doc-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
				<package name="gpac-libs" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-libs-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
				<package name="gpac-static" epoch="0" version="2.4.0" release="7.red80" arch="x86_64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-static-0:2.4.0-7.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gpac" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
				<package name="gpac-devel" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-devel-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
				<package name="gpac-doc" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-doc-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
				<package name="gpac-libs" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-libs-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
				<package name="gpac-static" epoch="0" version="2.4.0" release="7.red80" arch="aarch64" src="gpac-2.4.0-7.red80.src.rpm">
					<filename>gpac-static-0:2.4.0-7.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0018</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость zabbix7.2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix7.2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix7-2-cve-2025-49643-8.0/</description>
               <solution>Установить обновление для пакета(ов) zabbix7.2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix7-2-cve-2025-49643-8.0/" type="self" id="ROS-20260216-80-0018" title="ROS-20260216-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49643" type="cve" id="CVE-2025-49643" title="CVE-2025-49643" />
			<reference href="https://bdu.fstec.ru/vul/2025-15873" type="self" id="BDU:2025-15873" title="BDU:2025-15873" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="zabbix7.2-agent" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-agent-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-agent2" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-agent2-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-get" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-get-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk11" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk11-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk17" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk17-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk21" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk21-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-js" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-js-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-mysql" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-proxy-mysql-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-pgsql" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-proxy-pgsql-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-sqlite3" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-proxy-sqlite3-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-sender" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-sender-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-mysql" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-server-mysql-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-pgsql" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-server-pgsql-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-web-service" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-web-service-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="zabbix7.2-agent" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-agent-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-agent2" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-agent2-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-get" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-get-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk11" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk11-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk17" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk17-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk21" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk21-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-js" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-js-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-mysql" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-proxy-mysql-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-pgsql" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-proxy-pgsql-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-sqlite3" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-proxy-sqlite3-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-sender" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-sender-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-mysql" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-server-mysql-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-pgsql" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-server-pgsql-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="zabbix7.2-apache-conf" epoch="1" version="7.2.15" release="1.red80" arch="noarch" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-apache-conf-1:7.2.15-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-nginx-conf" epoch="1" version="7.2.15" release="1.red80" arch="noarch" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-nginx-conf-1:7.2.15-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-selinux-policy" epoch="1" version="7.2.15" release="1.red80" arch="noarch" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-selinux-policy-1:7.2.15-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-sql-scripts" epoch="1" version="7.2.15" release="1.red80" arch="noarch" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-sql-scripts-1:7.2.15-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web" epoch="1" version="7.2.15" release="1.red80" arch="noarch" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-web-1:7.2.15-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-deps" epoch="1" version="7.2.15" release="1.red80" arch="noarch" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-web-deps-1:7.2.15-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-mysql" epoch="1" version="7.2.15" release="1.red80" arch="noarch" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-web-mysql-1:7.2.15-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-pgsql" epoch="1" version="7.2.15" release="1.red80" arch="noarch" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-web-pgsql-1:7.2.15-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0019</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость zabbix7.4 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix7.4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix7-4-cve-2025-49643-8.0/</description>
               <solution>Установить обновление для пакета(ов) zabbix7.4
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix7-4-cve-2025-49643-8.0/" type="self" id="ROS-20260216-80-0019" title="ROS-20260216-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49643" type="cve" id="CVE-2025-49643" title="CVE-2025-49643" />
			<reference href="https://bdu.fstec.ru/vul/2025-15873" type="self" id="BDU:2025-15873" title="BDU:2025-15873" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="zabbix7.4-agent" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-agent-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-agent2" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-agent2-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-get" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-get-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-java-gateway-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk11" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk11-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk17" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk17-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk21" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk21-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-js" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-js-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-mysql" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-proxy-mysql-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-proxy-pgsql-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-sqlite3" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-proxy-sqlite3-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-sender" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-sender-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-mysql" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-server-mysql-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-server-pgsql-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-web-service" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-web-service-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="zabbix7.4-agent" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-agent-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-agent2" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-agent2-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-get" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-get-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-java-gateway-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk11" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk11-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk17" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk17-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk21" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk21-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-js" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-js-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-mysql" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-proxy-mysql-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-proxy-pgsql-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-sqlite3" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-proxy-sqlite3-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-sender" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-sender-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-mysql" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-server-mysql-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-server-pgsql-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="zabbix7.4-apache-conf" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-apache-conf-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-nginx-conf" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-nginx-conf-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-selinux-policy" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-selinux-policy-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-sql-scripts" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-sql-scripts-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-web-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-deps" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-web-deps-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-mysql" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-web-mysql-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-web-pgsql-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0020</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость zabbix-latest </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix-latest</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix-latest-cve-2025-49643-8.0/</description>
               <solution>Установить обновление для пакета(ов) zabbix-latest
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix-latest-cve-2025-49643-8.0/" type="self" id="ROS-20260216-80-0020" title="ROS-20260216-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49643" type="cve" id="CVE-2025-49643" title="CVE-2025-49643" />
			<reference href="https://bdu.fstec.ru/vul/2025-15873" type="self" id="BDU:2025-15873" title="BDU:2025-15873" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="zabbix-latest-agent" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-agent-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-agent2" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-agent2-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-get" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-get-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-java-gateway-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk11" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk11-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk17" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk17-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk21" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk21-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-js" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-js-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-mysql" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-proxy-mysql-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-proxy-pgsql-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-sqlite3" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-proxy-sqlite3-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-sender" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-sender-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-server-mysql" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-server-mysql-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-server-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-server-pgsql-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-web-service" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-web-service-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="zabbix-latest-agent" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-agent-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-agent2" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-agent2-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-get" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-get-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-java-gateway-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk11" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk11-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk17" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk17-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk21" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk21-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-js" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-js-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-mysql" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-proxy-mysql-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-proxy-pgsql-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-sqlite3" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-proxy-sqlite3-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-sender" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-sender-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-server-mysql" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-server-mysql-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-server-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-server-pgsql-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="zabbix-latest-apache-conf" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-apache-conf-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-nginx-conf" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-nginx-conf-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-selinux-policy" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-selinux-policy-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-sql-scripts" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-sql-scripts-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-web-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web-deps" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-web-deps-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web-mysql" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-web-mysql-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-web-pgsql-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0021</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость zabbix-lts </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix-lts</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix-lts-cve-2025-49643-8.0/</description>
               <solution>Установить обновление для пакета(ов) zabbix-lts
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix-lts-cve-2025-49643-8.0/" type="self" id="ROS-20260216-80-0021" title="ROS-20260216-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49643" type="cve" id="CVE-2025-49643" title="CVE-2025-49643" />
			<reference href="https://bdu.fstec.ru/vul/2025-15873" type="self" id="BDU:2025-15873" title="BDU:2025-15873" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="zabbix-lts-agent" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-agent-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-agent2" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-agent2-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-get" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-get-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk11" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk11-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk17" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk17-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk21" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk21-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-js" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-js-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-mysql" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-proxy-mysql-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-pgsql" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-proxy-pgsql-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-sqlite3" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-proxy-sqlite3-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-sender" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-sender-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-mysql" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-server-mysql-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-pgsql" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-server-pgsql-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-web-service" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-web-service-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="zabbix-lts-agent" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-agent-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-agent2" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-agent2-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-get" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-get-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk11" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk11-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk17" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk17-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk21" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk21-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-js" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-js-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-mysql" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-proxy-mysql-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-pgsql" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-proxy-pgsql-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-sqlite3" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-proxy-sqlite3-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-sender" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-sender-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-mysql" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-server-mysql-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-pgsql" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-server-pgsql-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-web-service" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-web-service-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="zabbix-lts-apache-conf" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-apache-conf-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-nginx-conf" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-nginx-conf-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-selinux-policy" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-selinux-policy-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-sql-scripts" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-sql-scripts-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-web-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-deps" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-web-deps-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-mysql" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-web-mysql-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-pgsql" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-web-pgsql-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0022</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость zabbix7.2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix7.2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix7-2-cve-2025-27232-8.0/</description>
               <solution>Установить обновление для пакета(ов) zabbix7.2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix7-2-cve-2025-27232-8.0/" type="self" id="ROS-20260216-80-0022" title="ROS-20260216-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27232" type="cve" id="CVE-2025-27232" title="CVE-2025-27232" />
			<reference href="https://bdu.fstec.ru/vul/2025-15874" type="self" id="BDU:2025-15874" title="BDU:2025-15874" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="zabbix7.2-agent" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-agent-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-agent2" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-agent2-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-get" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-get-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk11" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk11-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk17" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk17-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk21" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk21-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-js" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-js-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-mysql" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-proxy-mysql-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-pgsql" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-proxy-pgsql-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-sqlite3" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-proxy-sqlite3-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-sender" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-sender-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-mysql" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-server-mysql-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-pgsql" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-server-pgsql-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.2-web-service" epoch="1" version="7.2.15" release="1.red80" arch="x86_64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-web-service-1:7.2.15-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="zabbix7.2-agent" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-agent-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-agent2" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-agent2-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-get" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-get-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk11" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk11-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk17" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk17-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-java-gateway-openjdk21" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-java-gateway-openjdk21-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-js" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-js-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-mysql" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-proxy-mysql-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-pgsql" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-proxy-pgsql-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-proxy-sqlite3" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-proxy-sqlite3-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-sender" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-sender-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-mysql" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-server-mysql-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.2-server-pgsql" epoch="1" version="7.2.15" release="1.red80" arch="aarch64" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-server-pgsql-1:7.2.15-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="zabbix7.2-apache-conf" epoch="1" version="7.2.15" release="1.red80" arch="noarch" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-apache-conf-1:7.2.15-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-nginx-conf" epoch="1" version="7.2.15" release="1.red80" arch="noarch" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-nginx-conf-1:7.2.15-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-selinux-policy" epoch="1" version="7.2.15" release="1.red80" arch="noarch" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-selinux-policy-1:7.2.15-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-sql-scripts" epoch="1" version="7.2.15" release="1.red80" arch="noarch" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-sql-scripts-1:7.2.15-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web" epoch="1" version="7.2.15" release="1.red80" arch="noarch" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-web-1:7.2.15-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-deps" epoch="1" version="7.2.15" release="1.red80" arch="noarch" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-web-deps-1:7.2.15-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-mysql" epoch="1" version="7.2.15" release="1.red80" arch="noarch" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-web-mysql-1:7.2.15-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.2-web-pgsql" epoch="1" version="7.2.15" release="1.red80" arch="noarch" src="zabbix7.2-7.2.15-1.red80.src.rpm">
					<filename>zabbix7.2-web-pgsql-1:7.2.15-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0023</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость zabbix7.4 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix7.4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix7-4-cve-2025-27232-8.0/</description>
               <solution>Установить обновление для пакета(ов) zabbix7.4
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix7-4-cve-2025-27232-8.0/" type="self" id="ROS-20260216-80-0023" title="ROS-20260216-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27232" type="cve" id="CVE-2025-27232" title="CVE-2025-27232" />
			<reference href="https://bdu.fstec.ru/vul/2025-15874" type="self" id="BDU:2025-15874" title="BDU:2025-15874" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="zabbix7.4-agent" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-agent-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-agent2" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-agent2-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-get" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-get-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-java-gateway-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk11" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk11-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk17" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk17-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk21" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk21-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-js" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-js-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-mysql" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-proxy-mysql-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-proxy-pgsql-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-sqlite3" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-proxy-sqlite3-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-sender" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-sender-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-mysql" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-server-mysql-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-server-pgsql-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7.4-web-service" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-web-service-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="zabbix7.4-agent" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-agent-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-agent2" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-agent2-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-get" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-get-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-java-gateway-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk11" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk11-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk17" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk17-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-java-gateway-openjdk21" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-java-gateway-openjdk21-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-js" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-js-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-mysql" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-proxy-mysql-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-proxy-pgsql-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-proxy-sqlite3" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-proxy-sqlite3-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-sender" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-sender-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-mysql" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-server-mysql-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7.4-server-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-server-pgsql-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="zabbix7.4-apache-conf" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-apache-conf-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-nginx-conf" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-nginx-conf-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-selinux-policy" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-selinux-policy-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-sql-scripts" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-sql-scripts-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-web-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-deps" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-web-deps-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-mysql" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-web-mysql-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7.4-web-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix7.4-7.4.6-1.red80.src.rpm">
					<filename>zabbix7.4-web-pgsql-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0024</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость zabbix-latest </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix-latest</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix-latest-cve-2025-27232-8.0/</description>
               <solution>Установить обновление для пакета(ов) zabbix-latest
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix-latest-cve-2025-27232-8.0/" type="self" id="ROS-20260216-80-0024" title="ROS-20260216-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27232" type="cve" id="CVE-2025-27232" title="CVE-2025-27232" />
			<reference href="https://bdu.fstec.ru/vul/2025-15874" type="self" id="BDU:2025-15874" title="BDU:2025-15874" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="zabbix-latest-agent" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-agent-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-agent2" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-agent2-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-get" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-get-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-java-gateway-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk11" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk11-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk17" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk17-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk21" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk21-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-js" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-js-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-mysql" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-proxy-mysql-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-proxy-pgsql-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-sqlite3" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-proxy-sqlite3-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-sender" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-sender-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-server-mysql" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-server-mysql-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-server-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-server-pgsql-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-latest-web-service" epoch="1" version="7.4.6" release="1.red80" arch="x86_64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-web-service-1:7.4.6-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="zabbix-latest-agent" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-agent-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-agent2" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-agent2-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-get" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-get-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-java-gateway-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk11" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk11-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk17" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk17-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-java-gateway-openjdk21" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-java-gateway-openjdk21-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-js" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-js-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-mysql" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-proxy-mysql-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-proxy-pgsql-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-proxy-sqlite3" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-proxy-sqlite3-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-sender" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-sender-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-server-mysql" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-server-mysql-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-latest-server-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="aarch64" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-server-pgsql-1:7.4.6-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="zabbix-latest-apache-conf" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-apache-conf-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-nginx-conf" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-nginx-conf-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-selinux-policy" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-selinux-policy-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-sql-scripts" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-sql-scripts-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-web-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web-deps" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-web-deps-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web-mysql" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-web-mysql-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-latest-web-pgsql" epoch="1" version="7.4.6" release="1.red80" arch="noarch" src="zabbix-latest-7.4.6-1.red80.src.rpm">
					<filename>zabbix-latest-web-pgsql-1:7.4.6-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0025</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-1-8-0-openjdk-cve-2026-21947-8.0/</description>
               <solution>Установить обновление для пакета(ов) java-1.8.0-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-1-8-0-openjdk-cve-2026-21947-8.0/" type="self" id="ROS-20260216-80-0025" title="ROS-20260216-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21947" type="cve" id="CVE-2026-21947" title="CVE-2026-21947" />
			<reference href="https://bdu.fstec.ru/vul/2026-00827" type="self" id="BDU:2026-00827" title="BDU:2026-00827" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-demo" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-demo-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-devel" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-devel-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-headless" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-headless-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx-devel" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-devel-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-src" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-src-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-demo" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-demo-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-devel" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-devel-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-headless" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-headless-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-src" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-src-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="java-1.8.0-openjdk-javadoc" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="noarch" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-javadoc-1:1.8.0.482.b03-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0026</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-21-openjdk-cve-2026-21925-8.0/</description>
               <solution>Установить обновление для пакета(ов) java-21-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-21-openjdk-cve-2026-21925-8.0/" type="self" id="ROS-20260216-80-0026" title="ROS-20260216-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925" type="cve" id="CVE-2026-21925" title="CVE-2026-21925" />
			<reference href="https://bdu.fstec.ru/vul/2026-00695" type="self" id="BDU:2026-00695" title="BDU:2026-00695" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-demo" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-demo-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-devel" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-devel-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-headless" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-headless-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-javadoc" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-javadoc-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-jmods" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-jmods-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-src" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-src-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-demo" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-demo-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-devel" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-devel-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-headless" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-headless-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-javadoc" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-javadoc-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-jmods" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-jmods-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-src" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-src-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0027</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-11-openjdk-cve-2026-21925-8.0/</description>
               <solution>Установить обновление для пакета(ов) java-11-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-11-openjdk-cve-2026-21925-8.0/" type="self" id="ROS-20260216-80-0027" title="ROS-20260216-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925" type="cve" id="CVE-2026-21925" title="CVE-2026-21925" />
			<reference href="https://bdu.fstec.ru/vul/2026-00695" type="self" id="BDU:2026-00695" title="BDU:2026-00695" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-demo" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-demo-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-devel" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-devel-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-headless" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-headless-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-javadoc" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-javadoc-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-jmods" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-jmods-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-src" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-src-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-demo" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-demo-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-devel" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-devel-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-headless" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-headless-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-javadoc" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-javadoc-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-jmods" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-jmods-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-src" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-src-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0028</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-17-openjdk-cve-2026-21925-8.0/</description>
               <solution>Установить обновление для пакета(ов) java-17-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-17-openjdk-cve-2026-21925-8.0/" type="self" id="ROS-20260216-80-0028" title="ROS-20260216-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925" type="cve" id="CVE-2026-21925" title="CVE-2026-21925" />
			<reference href="https://bdu.fstec.ru/vul/2026-00695" type="self" id="BDU:2026-00695" title="BDU:2026-00695" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-demo" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-demo-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-devel" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-devel-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-headless" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-headless-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-javadoc" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-javadoc-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-jmods" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-jmods-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-src" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-src-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-demo" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-demo-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-devel" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-devel-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-headless" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-headless-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-javadoc" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-javadoc-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-jmods" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-jmods-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-src" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-src-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0029</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-1-8-0-openjdk-cve-2026-21925-8.0/</description>
               <solution>Установить обновление для пакета(ов) java-1.8.0-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-1-8-0-openjdk-cve-2026-21925-8.0/" type="self" id="ROS-20260216-80-0029" title="ROS-20260216-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925" type="cve" id="CVE-2026-21925" title="CVE-2026-21925" />
			<reference href="https://bdu.fstec.ru/vul/2026-00695" type="self" id="BDU:2026-00695" title="BDU:2026-00695" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-demo" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-demo-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-devel" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-devel-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-headless" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-headless-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx-devel" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-devel-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-src" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-src-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-demo" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-demo-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-devel" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-devel-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-headless" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-headless-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-src" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-src-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="java-1.8.0-openjdk-javadoc" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="noarch" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-javadoc-1:1.8.0.482.b03-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0030</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-21-openjdk-cve-2026-21933-8.0/</description>
               <solution>Установить обновление для пакета(ов) java-21-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-21-openjdk-cve-2026-21933-8.0/" type="self" id="ROS-20260216-80-0030" title="ROS-20260216-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933" type="cve" id="CVE-2026-21933" title="CVE-2026-21933" />
			<reference href="https://bdu.fstec.ru/vul/2026-00694" type="self" id="BDU:2026-00694" title="BDU:2026-00694" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-demo" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-demo-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-devel" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-devel-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-headless" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-headless-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-javadoc" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-javadoc-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-jmods" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-jmods-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-src" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-src-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-demo" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-demo-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-devel" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-devel-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-headless" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-headless-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-javadoc" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-javadoc-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-jmods" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-jmods-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-src" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-src-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0031</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-17-openjdk-cve-2026-21933-8.0/</description>
               <solution>Установить обновление для пакета(ов) java-17-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-17-openjdk-cve-2026-21933-8.0/" type="self" id="ROS-20260216-80-0031" title="ROS-20260216-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933" type="cve" id="CVE-2026-21933" title="CVE-2026-21933" />
			<reference href="https://bdu.fstec.ru/vul/2026-00694" type="self" id="BDU:2026-00694" title="BDU:2026-00694" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-demo" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-demo-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-devel" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-devel-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-headless" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-headless-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-javadoc" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-javadoc-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-jmods" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-jmods-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-src" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-src-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-demo" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-demo-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-devel" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-devel-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-headless" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-headless-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-javadoc" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-javadoc-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-jmods" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-jmods-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-src" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-src-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0032</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-11-openjdk-cve-2026-21933-8.0/</description>
               <solution>Установить обновление для пакета(ов) java-11-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-11-openjdk-cve-2026-21933-8.0/" type="self" id="ROS-20260216-80-0032" title="ROS-20260216-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933" type="cve" id="CVE-2026-21933" title="CVE-2026-21933" />
			<reference href="https://bdu.fstec.ru/vul/2026-00694" type="self" id="BDU:2026-00694" title="BDU:2026-00694" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-demo" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-demo-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-devel" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-devel-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-headless" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-headless-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-javadoc" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-javadoc-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-jmods" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-jmods-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-src" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-src-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-demo" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-demo-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-devel" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-devel-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-headless" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-headless-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-javadoc" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-javadoc-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-jmods" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-jmods-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-src" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-src-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0033</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-1-8-0-openjdk-cve-2026-21933-8.0/</description>
               <solution>Установить обновление для пакета(ов) java-1.8.0-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-1-8-0-openjdk-cve-2026-21933-8.0/" type="self" id="ROS-20260216-80-0033" title="ROS-20260216-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933" type="cve" id="CVE-2026-21933" title="CVE-2026-21933" />
			<reference href="https://bdu.fstec.ru/vul/2026-00694" type="self" id="BDU:2026-00694" title="BDU:2026-00694" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-demo" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-demo-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-devel" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-devel-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-headless" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-headless-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx-devel" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-devel-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-src" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-src-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-demo" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-demo-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-devel" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-devel-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-headless" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-headless-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-src" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-src-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="java-1.8.0-openjdk-javadoc" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="noarch" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-javadoc-1:1.8.0.482.b03-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0034</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-21-openjdk-cve-2026-21932-8.0/</description>
               <solution>Установить обновление для пакета(ов) java-21-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-21-openjdk-cve-2026-21932-8.0/" type="self" id="ROS-20260216-80-0034" title="ROS-20260216-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21932" type="cve" id="CVE-2026-21932" title="CVE-2026-21932" />
			<reference href="https://bdu.fstec.ru/vul/2026-00681" type="self" id="BDU:2026-00681" title="BDU:2026-00681" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-demo" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-demo-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-devel" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-devel-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-headless" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-headless-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-javadoc" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-javadoc-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-jmods" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-jmods-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-src" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-src-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-demo" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-demo-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-devel" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-devel-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-headless" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-headless-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-javadoc" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-javadoc-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-jmods" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-jmods-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-src" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-src-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0035</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-17-openjdk-cve-2026-21932-8.0/</description>
               <solution>Установить обновление для пакета(ов) java-17-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-17-openjdk-cve-2026-21932-8.0/" type="self" id="ROS-20260216-80-0035" title="ROS-20260216-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21932" type="cve" id="CVE-2026-21932" title="CVE-2026-21932" />
			<reference href="https://bdu.fstec.ru/vul/2026-00681" type="self" id="BDU:2026-00681" title="BDU:2026-00681" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-demo" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-demo-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-devel" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-devel-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-headless" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-headless-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-javadoc" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-javadoc-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-jmods" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-jmods-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-src" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-src-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-demo" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-demo-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-devel" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-devel-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-headless" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-headless-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-javadoc" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-javadoc-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-jmods" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-jmods-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-src" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-src-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0036</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-11-openjdk-cve-2026-21932-8.0/</description>
               <solution>Установить обновление для пакета(ов) java-11-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-11-openjdk-cve-2026-21932-8.0/" type="self" id="ROS-20260216-80-0036" title="ROS-20260216-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21932" type="cve" id="CVE-2026-21932" title="CVE-2026-21932" />
			<reference href="https://bdu.fstec.ru/vul/2026-00681" type="self" id="BDU:2026-00681" title="BDU:2026-00681" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-demo" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-demo-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-devel" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-devel-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-headless" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-headless-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-javadoc" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-javadoc-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-jmods" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-jmods-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-src" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-src-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-demo" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-demo-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-devel" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-devel-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-headless" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-headless-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-javadoc" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-javadoc-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-jmods" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-jmods-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-src" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-src-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0037</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-1-8-0-openjdk-cve-2026-21932-8.0/</description>
               <solution>Установить обновление для пакета(ов) java-1.8.0-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-1-8-0-openjdk-cve-2026-21932-8.0/" type="self" id="ROS-20260216-80-0037" title="ROS-20260216-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21932" type="cve" id="CVE-2026-21932" title="CVE-2026-21932" />
			<reference href="https://bdu.fstec.ru/vul/2026-00681" type="self" id="BDU:2026-00681" title="BDU:2026-00681" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-demo" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-demo-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-devel" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-devel-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-headless" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-headless-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx-devel" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-devel-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-src" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-src-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-demo" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-demo-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-devel" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-devel-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-headless" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-headless-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-src" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-src-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="java-1.8.0-openjdk-javadoc" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="noarch" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-javadoc-1:1.8.0.482.b03-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0038</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-21-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-21-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-21-openjdk-cve-2026-21945-8.0/</description>
               <solution>Установить обновление для пакета(ов) java-21-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-21-openjdk-cve-2026-21945-8.0/" type="self" id="ROS-20260216-80-0038" title="ROS-20260216-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945" type="cve" id="CVE-2026-21945" title="CVE-2026-21945" />
			<reference href="https://bdu.fstec.ru/vul/2026-00680" type="self" id="BDU:2026-00680" title="BDU:2026-00680" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-demo" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-demo-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-devel" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-devel-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-headless" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-headless-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-javadoc" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-javadoc-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-jmods" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-jmods-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-21-openjdk-src" epoch="1" version="21.0.10.0.7" release="1.red80" arch="x86_64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-src-1:21.0.10.0.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="java-21-openjdk" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-demo" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-demo-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-devel" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-devel-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-headless" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-headless-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-javadoc" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-javadoc-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-jmods" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-jmods-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-21-openjdk-src" epoch="1" version="21.0.10.0.7" release="1.red80" arch="aarch64" src="java-21-openjdk-21.0.10.0.7-1.red80.src.rpm">
					<filename>java-21-openjdk-src-1:21.0.10.0.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0039</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-17-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-17-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-17-openjdk-cve-2026-21945-8.0/</description>
               <solution>Установить обновление для пакета(ов) java-17-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-17-openjdk-cve-2026-21945-8.0/" type="self" id="ROS-20260216-80-0039" title="ROS-20260216-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945" type="cve" id="CVE-2026-21945" title="CVE-2026-21945" />
			<reference href="https://bdu.fstec.ru/vul/2026-00680" type="self" id="BDU:2026-00680" title="BDU:2026-00680" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-demo" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-demo-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-devel" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-devel-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-headless" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-headless-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-javadoc" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-javadoc-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-jmods" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-jmods-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-17-openjdk-src" epoch="1" version="17.0.18.0.8" release="1.red80" arch="x86_64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-src-1:17.0.18.0.8-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="java-17-openjdk" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-demo" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-demo-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-devel" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-devel-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-headless" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-headless-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-javadoc" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-javadoc-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-jmods" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-jmods-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-17-openjdk-src" epoch="1" version="17.0.18.0.8" release="1.red80" arch="aarch64" src="java-17-openjdk-17.0.18.0.8-1.red80.src.rpm">
					<filename>java-17-openjdk-src-1:17.0.18.0.8-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0040</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-11-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-11-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-11-openjdk-cve-2026-21945-8.0/</description>
               <solution>Установить обновление для пакета(ов) java-11-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-11-openjdk-cve-2026-21945-8.0/" type="self" id="ROS-20260216-80-0040" title="ROS-20260216-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945" type="cve" id="CVE-2026-21945" title="CVE-2026-21945" />
			<reference href="https://bdu.fstec.ru/vul/2026-00680" type="self" id="BDU:2026-00680" title="BDU:2026-00680" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-demo" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-demo-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-devel" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-devel-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-headless" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-headless-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-javadoc" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-javadoc-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-jmods" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-jmods-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-11-openjdk-src" epoch="1" version="11.0.30.0.7" release="1.red80" arch="x86_64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-src-1:11.0.30.0.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="java-11-openjdk" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-demo" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-demo-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-devel" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-devel-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-headless" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-headless-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-javadoc" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-javadoc-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-jmods" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-jmods-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-11-openjdk-src" epoch="1" version="11.0.30.0.7" release="1.red80" arch="aarch64" src="java-11-openjdk-11.0.30.0.7-1.red80.src.rpm">
					<filename>java-11-openjdk-src-1:11.0.30.0.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0041</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость java-1.8.0-openjdk </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в java-1.8.0-openjdk</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-1-8-0-openjdk-cve-2026-21945-8.0/</description>
               <solution>Установить обновление для пакета(ов) java-1.8.0-openjdk
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-java-1-8-0-openjdk-cve-2026-21945-8.0/" type="self" id="ROS-20260216-80-0041" title="ROS-20260216-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945" type="cve" id="CVE-2026-21945" title="CVE-2026-21945" />
			<reference href="https://bdu.fstec.ru/vul/2026-00680" type="self" id="BDU:2026-00680" title="BDU:2026-00680" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-demo" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-demo-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-devel" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-devel-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-headless" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-headless-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-openjfx-devel" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-openjfx-devel-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-src" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-src-1:1.8.0.482.b03-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="java-1.8.0-openjdk" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-demo" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-demo-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-devel" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-devel-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-headless" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-headless-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
				<package name="java-1.8.0-openjdk-src" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-src-1:1.8.0.482.b03-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="java-1.8.0-openjdk-javadoc" epoch="1" version="1.8.0.482.b03" release="1.red80" arch="noarch" src="java-1.8.0-openjdk-1.8.0.482.b03-1.red80.src.rpm">
					<filename>java-1.8.0-openjdk-javadoc-1:1.8.0.482.b03-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0042</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость libsodium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libsodium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libsodium-cve-2025-69277-8.0/</description>
               <solution>Установить обновление для пакета(ов) libsodium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libsodium-cve-2025-69277-8.0/" type="self" id="ROS-20260216-80-0042" title="ROS-20260216-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69277" type="cve" id="CVE-2025-69277" title="CVE-2025-69277" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libsodium" epoch="0" version="1.0.18" release="12.red80" arch="x86_64" src="libsodium-1.0.18-12.red80.src.rpm">
					<filename>libsodium-0:1.0.18-12.red80.x86_64.rpm</filename>
				</package>
				<package name="libsodium-devel" epoch="0" version="1.0.18" release="12.red80" arch="x86_64" src="libsodium-1.0.18-12.red80.src.rpm">
					<filename>libsodium-devel-0:1.0.18-12.red80.x86_64.rpm</filename>
				</package>
				<package name="libsodium-static" epoch="0" version="1.0.18" release="12.red80" arch="x86_64" src="libsodium-1.0.18-12.red80.src.rpm">
					<filename>libsodium-static-0:1.0.18-12.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libsodium" epoch="0" version="1.0.18" release="12.red80" arch="aarch64" src="libsodium-1.0.18-12.red80.src.rpm">
					<filename>libsodium-0:1.0.18-12.red80.aarch64.rpm</filename>
				</package>
				<package name="libsodium-devel" epoch="0" version="1.0.18" release="12.red80" arch="aarch64" src="libsodium-1.0.18-12.red80.src.rpm">
					<filename>libsodium-devel-0:1.0.18-12.red80.aarch64.rpm</filename>
				</package>
				<package name="libsodium-static" epoch="0" version="1.0.18" release="12.red80" arch="aarch64" src="libsodium-1.0.18-12.red80.src.rpm">
					<filename>libsodium-static-0:1.0.18-12.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0043</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость avahi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в avahi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-avahi-cve-2025-68276-8.0/</description>
               <solution>Установить обновление для пакета(ов) avahi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-avahi-cve-2025-68276-8.0/" type="self" id="ROS-20260216-80-0043" title="ROS-20260216-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68276" type="cve" id="CVE-2025-68276" title="CVE-2025-68276" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="avahi" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-autoipd-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-libs-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-sharp-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-tools-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-tools-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>python3-avahi-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="avahi" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-autoipd-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-libs-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-sharp-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-tools-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-tools-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>python3-avahi-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0044</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость opensearch </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в opensearch</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-opensearch-cve-2025-9624-8.0/</description>
               <solution>Установить обновление для пакета(ов) opensearch
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-opensearch-cve-2025-9624-8.0/" type="self" id="ROS-20260216-80-0044" title="ROS-20260216-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9624" type="cve" id="CVE-2025-9624" title="CVE-2025-9624" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="opensearch" epoch="0" version="2.19.2" release="5.red80" arch="x86_64" src="opensearch-2.19.2-5.red80.src.rpm">
					<filename>opensearch-0:2.19.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="opensearch-ingest-attachment-plugin" epoch="0" version="2.19.2" release="5.red80" arch="x86_64" src="opensearch-2.19.2-5.red80.src.rpm">
					<filename>opensearch-ingest-attachment-plugin-0:2.19.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="opensearch-mapper-annotated-text-plugin" epoch="0" version="2.19.2" release="5.red80" arch="x86_64" src="opensearch-2.19.2-5.red80.src.rpm">
					<filename>opensearch-mapper-annotated-text-plugin-0:2.19.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="opensearch-mapper-murmur3-plugin" epoch="0" version="2.19.2" release="5.red80" arch="x86_64" src="opensearch-2.19.2-5.red80.src.rpm">
					<filename>opensearch-mapper-murmur3-plugin-0:2.19.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="opensearch-mapper-size-plugin" epoch="0" version="2.19.2" release="5.red80" arch="x86_64" src="opensearch-2.19.2-5.red80.src.rpm">
					<filename>opensearch-mapper-size-plugin-0:2.19.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="opensearch-repository-hdfs-plugin" epoch="0" version="2.19.2" release="5.red80" arch="x86_64" src="opensearch-2.19.2-5.red80.src.rpm">
					<filename>opensearch-repository-hdfs-plugin-0:2.19.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="opensearch-repository-s3-plugin" epoch="0" version="2.19.2" release="5.red80" arch="x86_64" src="opensearch-2.19.2-5.red80.src.rpm">
					<filename>opensearch-repository-s3-plugin-0:2.19.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="opensearch-store-mb-plugin" epoch="0" version="2.19.2" release="5.red80" arch="x86_64" src="opensearch-2.19.2-5.red80.src.rpm">
					<filename>opensearch-store-mb-plugin-0:2.19.2-5.red80.x86_64.rpm</filename>
				</package>
				<package name="opensearch-transport-nio-plugin" epoch="0" version="2.19.2" release="5.red80" arch="x86_64" src="opensearch-2.19.2-5.red80.src.rpm">
					<filename>opensearch-transport-nio-plugin-0:2.19.2-5.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0045</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость avahi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в avahi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-avahi-cve-2023-38473-8.0/</description>
               <solution>Установить обновление для пакета(ов) avahi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-avahi-cve-2023-38473-8.0/" type="self" id="ROS-20260216-80-0045" title="ROS-20260216-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473" type="cve" id="CVE-2023-38473" title="CVE-2023-38473" />
			<reference href="https://bdu.fstec.ru/vul/2025-03952" type="self" id="BDU:2025-03952" title="BDU:2025-03952" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="avahi" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-autoipd-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-libs-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-sharp-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-tools-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-tools-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>python3-avahi-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="avahi" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-autoipd-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-libs-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-sharp-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-tools-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-tools-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>python3-avahi-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0046</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость avahi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в avahi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-avahi-cve-2021-3468-8.0/</description>
               <solution>Установить обновление для пакета(ов) avahi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-avahi-cve-2021-3468-8.0/" type="self" id="ROS-20260216-80-0046" title="ROS-20260216-80-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468" type="cve" id="CVE-2021-3468" title="CVE-2021-3468" />
			<reference href="https://bdu.fstec.ru/vul/2022-05709" type="self" id="BDU:2022-05709" title="BDU:2022-05709" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="avahi" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-autoipd-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-libs-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-sharp-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-tools-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-tools-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="21.red80" arch="x86_64" src="avahi-0.8-21.red80.src.rpm">
					<filename>python3-avahi-0:0.8-21.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="avahi" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-autoipd" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-autoipd-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-howl" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-howl-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-howl-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-compat-libdns_sd-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-compat-libdns_sd-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-dnsconfd" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-dnsconfd-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-glib" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-glib-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-glib-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-gobject" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-gobject-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-gobject-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-libs" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-libs-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt3" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt3-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt3-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt4" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt4-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt4-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt5" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-qt5-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-qt5-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-sharp" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-sharp-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-tools" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-tools-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-gtk3" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-gtk3-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-sharp-devel" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-sharp-devel-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="avahi-ui-tools" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>avahi-ui-tools-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-avahi" epoch="0" version="0.8" release="21.red80" arch="aarch64" src="avahi-0.8-21.red80.src.rpm">
					<filename>python3-avahi-0:0.8-21.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260216-80-0047</id>
		<issued date="2026-02-16" />
		<updated date="2026-02-16" />
		<title>Уязвимость python-PyPDF2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-PyPDF2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-pypdf2-cve-2026-24688-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-PyPDF2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-pypdf2-cve-2026-24688-8.0/" type="self" id="ROS-20260216-80-0047" title="ROS-20260216-80-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24688" type="cve" id="CVE-2026-24688" title="CVE-2026-24688" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python-PyPDF2-doc" epoch="0" version="1.26.0" release="22.red80" arch="noarch" src="python-PyPDF2-1.26.0-22.red80.src.rpm">
					<filename>python-PyPDF2-doc-0:1.26.0-22.red80.noarch.rpm</filename>
				</package>
				<package name="python3-PyPDF2" epoch="0" version="1.26.0" release="22.red80" arch="noarch" src="python-PyPDF2-1.26.0-22.red80.src.rpm">
					<filename>python3-PyPDF2-0:1.26.0-22.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0001</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38153-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38153-8.0/" type="self" id="ROS-20260220-80-0001" title="ROS-20260220-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38153" type="cve" id="CVE-2025-38153" title="CVE-2025-38153" />
			<reference href="https://bdu.fstec.ru/vul/2025-09614" type="self" id="BDU:2025-09614" title="BDU:2025-09614" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0002</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38154-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38154-8.0/" type="self" id="ROS-20260220-80-0002" title="ROS-20260220-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38154" type="cve" id="CVE-2025-38154" title="CVE-2025-38154" />
			<reference href="https://bdu.fstec.ru/vul/2025-09918" type="self" id="BDU:2025-09918" title="BDU:2025-09918" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0003</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38155-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38155-8.0/" type="self" id="ROS-20260220-80-0003" title="ROS-20260220-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38155" type="cve" id="CVE-2025-38155" title="CVE-2025-38155" />
			<reference href="https://bdu.fstec.ru/vul/2025-10130" type="self" id="BDU:2025-10130" title="BDU:2025-10130" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0004</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38156-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38156-8.0/" type="self" id="ROS-20260220-80-0004" title="ROS-20260220-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38156" type="cve" id="CVE-2025-38156" title="CVE-2025-38156" />
			<reference href="https://bdu.fstec.ru/vul/2025-11765" type="self" id="BDU:2025-11765" title="BDU:2025-11765" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0005</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38157-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38157-8.0/" type="self" id="ROS-20260220-80-0005" title="ROS-20260220-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38157" type="cve" id="CVE-2025-38157" title="CVE-2025-38157" />
			<reference href="https://bdu.fstec.ru/vul/2025-10132" type="self" id="BDU:2025-10132" title="BDU:2025-10132" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0006</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38158-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38158-8.0/" type="self" id="ROS-20260220-80-0006" title="ROS-20260220-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38158" type="cve" id="CVE-2025-38158" title="CVE-2025-38158" />
			<reference href="https://bdu.fstec.ru/vul/2025-10125" type="self" id="BDU:2025-10125" title="BDU:2025-10125" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0007</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38159-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38159-8.0/" type="self" id="ROS-20260220-80-0007" title="ROS-20260220-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38159" type="cve" id="CVE-2025-38159" title="CVE-2025-38159" />
			<reference href="https://bdu.fstec.ru/vul/2025-10128" type="self" id="BDU:2025-10128" title="BDU:2025-10128" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0008</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38160-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38160-8.0/" type="self" id="ROS-20260220-80-0008" title="ROS-20260220-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38160" type="cve" id="CVE-2025-38160" title="CVE-2025-38160" />
			<reference href="https://bdu.fstec.ru/vul/2025-10131" type="self" id="BDU:2025-10131" title="BDU:2025-10131" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0009</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38161-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38161-8.0/" type="self" id="ROS-20260220-80-0009" title="ROS-20260220-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38161" type="cve" id="CVE-2025-38161" title="CVE-2025-38161" />
			<reference href="https://bdu.fstec.ru/vul/2025-09610" type="self" id="BDU:2025-09610" title="BDU:2025-09610" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0010</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38163-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38163-8.0/" type="self" id="ROS-20260220-80-0010" title="ROS-20260220-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38163" type="cve" id="CVE-2025-38163" title="CVE-2025-38163" />
			<reference href="https://bdu.fstec.ru/vul/2025-09616" type="self" id="BDU:2025-09616" title="BDU:2025-09616" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0011</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38164-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38164-8.0/" type="self" id="ROS-20260220-80-0011" title="ROS-20260220-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38164" type="cve" id="CVE-2025-38164" title="CVE-2025-38164" />
			<reference href="https://bdu.fstec.ru/vul/2025-11389" type="self" id="BDU:2025-11389" title="BDU:2025-11389" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0012</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38165-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38165-8.0/" type="self" id="ROS-20260220-80-0012" title="ROS-20260220-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38165" type="cve" id="CVE-2025-38165" title="CVE-2025-38165" />
			<reference href="https://bdu.fstec.ru/vul/2025-10126" type="self" id="BDU:2025-10126" title="BDU:2025-10126" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0013</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38166-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38166-8.0/" type="self" id="ROS-20260220-80-0013" title="ROS-20260220-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38166" type="cve" id="CVE-2025-38166" title="CVE-2025-38166" />
			<reference href="https://bdu.fstec.ru/vul/2025-14099" type="self" id="BDU:2025-14099" title="BDU:2025-14099" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0014</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38167-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38167-8.0/" type="self" id="ROS-20260220-80-0014" title="ROS-20260220-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38167" type="cve" id="CVE-2025-38167" title="CVE-2025-38167" />
			<reference href="https://bdu.fstec.ru/vul/2025-14098" type="self" id="BDU:2025-14098" title="BDU:2025-14098" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0015</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38168-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38168-8.0/" type="self" id="ROS-20260220-80-0015" title="ROS-20260220-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38168" type="cve" id="CVE-2025-38168" title="CVE-2025-38168" />
			<reference href="https://bdu.fstec.ru/vul/2025-11770" type="self" id="BDU:2025-11770" title="BDU:2025-11770" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0016</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38169-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38169-8.0/" type="self" id="ROS-20260220-80-0016" title="ROS-20260220-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38169" type="cve" id="CVE-2025-38169" title="CVE-2025-38169" />
			<reference href="https://bdu.fstec.ru/vul/2025-11767" type="self" id="BDU:2025-11767" title="BDU:2025-11767" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0017</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38170-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38170-8.0/" type="self" id="ROS-20260220-80-0017" title="ROS-20260220-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38170" type="cve" id="CVE-2025-38170" title="CVE-2025-38170" />
			<reference href="https://bdu.fstec.ru/vul/2025-14100" type="self" id="BDU:2025-14100" title="BDU:2025-14100" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0018</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38172-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38172-8.0/" type="self" id="ROS-20260220-80-0018" title="ROS-20260220-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38172" type="cve" id="CVE-2025-38172" title="CVE-2025-38172" />
			<reference href="https://bdu.fstec.ru/vul/2025-11769" type="self" id="BDU:2025-11769" title="BDU:2025-11769" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0019</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38173-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38173-8.0/" type="self" id="ROS-20260220-80-0019" title="ROS-20260220-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38173" type="cve" id="CVE-2025-38173" title="CVE-2025-38173" />
			<reference href="https://bdu.fstec.ru/vul/2025-09835" type="self" id="BDU:2025-09835" title="BDU:2025-09835" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0020</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38174-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38174-8.0/" type="self" id="ROS-20260220-80-0020" title="ROS-20260220-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38174" type="cve" id="CVE-2025-38174" title="CVE-2025-38174" />
			<reference href="https://bdu.fstec.ru/vul/2025-08271" type="self" id="BDU:2025-08271" title="BDU:2025-08271" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0021</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38177-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38177-8.0/" type="self" id="ROS-20260220-80-0021" title="ROS-20260220-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38177" type="cve" id="CVE-2025-38177" title="CVE-2025-38177" />
			<reference href="https://bdu.fstec.ru/vul/2025-12111" type="self" id="BDU:2025-12111" title="BDU:2025-12111" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0022</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38179-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38179-8.0/" type="self" id="ROS-20260220-80-0022" title="ROS-20260220-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38179" type="cve" id="CVE-2025-38179" title="CVE-2025-38179" />
			<reference href="https://bdu.fstec.ru/vul/2025-08805" type="self" id="BDU:2025-08805" title="BDU:2025-08805" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0023</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38180-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38180-8.0/" type="self" id="ROS-20260220-80-0023" title="ROS-20260220-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38180" type="cve" id="CVE-2025-38180" title="CVE-2025-38180" />
			<reference href="https://bdu.fstec.ru/vul/2025-08806" type="self" id="BDU:2025-08806" title="BDU:2025-08806" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0024</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38181-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38181-8.0/" type="self" id="ROS-20260220-80-0024" title="ROS-20260220-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38181" type="cve" id="CVE-2025-38181" title="CVE-2025-38181" />
			<reference href="https://bdu.fstec.ru/vul/2025-09674" type="self" id="BDU:2025-09674" title="BDU:2025-09674" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0025</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38183-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38183-8.0/" type="self" id="ROS-20260220-80-0025" title="ROS-20260220-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38183" type="cve" id="CVE-2025-38183" title="CVE-2025-38183" />
			<reference href="https://bdu.fstec.ru/vul/2025-09665" type="self" id="BDU:2025-09665" title="BDU:2025-09665" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0026</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38184-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38184-8.0/" type="self" id="ROS-20260220-80-0026" title="ROS-20260220-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38184" type="cve" id="CVE-2025-38184" title="CVE-2025-38184" />
			<reference href="https://bdu.fstec.ru/vul/2025-09660" type="self" id="BDU:2025-09660" title="BDU:2025-09660" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0027</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38185-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38185-8.0/" type="self" id="ROS-20260220-80-0027" title="ROS-20260220-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38185" type="cve" id="CVE-2025-38185" title="CVE-2025-38185" />
			<reference href="https://bdu.fstec.ru/vul/2025-09621" type="self" id="BDU:2025-09621" title="BDU:2025-09621" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0028</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38186-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38186-8.0/" type="self" id="ROS-20260220-80-0028" title="ROS-20260220-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38186" type="cve" id="CVE-2025-38186" title="CVE-2025-38186" />
			<reference href="https://bdu.fstec.ru/vul/2025-09620" type="self" id="BDU:2025-09620" title="BDU:2025-09620" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0029</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38188-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38188-8.0/" type="self" id="ROS-20260220-80-0029" title="ROS-20260220-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38188" type="cve" id="CVE-2025-38188" title="CVE-2025-38188" />
			<reference href="https://bdu.fstec.ru/vul/2025-09619" type="self" id="BDU:2025-09619" title="BDU:2025-09619" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0030</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38190-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38190-8.0/" type="self" id="ROS-20260220-80-0030" title="ROS-20260220-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38190" type="cve" id="CVE-2025-38190" title="CVE-2025-38190" />
			<reference href="https://bdu.fstec.ru/vul/2025-09624" type="self" id="BDU:2025-09624" title="BDU:2025-09624" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0031</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38191-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38191-8.0/" type="self" id="ROS-20260220-80-0031" title="ROS-20260220-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38191" type="cve" id="CVE-2025-38191" title="CVE-2025-38191" />
			<reference href="https://bdu.fstec.ru/vul/2025-09626" type="self" id="BDU:2025-09626" title="BDU:2025-09626" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0032</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38193-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38193-8.0/" type="self" id="ROS-20260220-80-0032" title="ROS-20260220-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38193" type="cve" id="CVE-2025-38193" title="CVE-2025-38193" />
			<reference href="https://bdu.fstec.ru/vul/2025-09617" type="self" id="BDU:2025-09617" title="BDU:2025-09617" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0033</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38194-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38194-8.0/" type="self" id="ROS-20260220-80-0033" title="ROS-20260220-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38194" type="cve" id="CVE-2025-38194" title="CVE-2025-38194" />
			<reference href="https://bdu.fstec.ru/vul/2025-13475" type="self" id="BDU:2025-13475" title="BDU:2025-13475" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0034</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38197-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38197-8.0/" type="self" id="ROS-20260220-80-0034" title="ROS-20260220-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38197" type="cve" id="CVE-2025-38197" title="CVE-2025-38197" />
			<reference href="https://bdu.fstec.ru/vul/2025-10763" type="self" id="BDU:2025-10763" title="BDU:2025-10763" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0035</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38198-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38198-8.0/" type="self" id="ROS-20260220-80-0035" title="ROS-20260220-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38198" type="cve" id="CVE-2025-38198" title="CVE-2025-38198" />
			<reference href="https://bdu.fstec.ru/vul/2025-10766" type="self" id="BDU:2025-10766" title="BDU:2025-10766" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0036</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38200-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38200-8.0/" type="self" id="ROS-20260220-80-0036" title="ROS-20260220-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38200" type="cve" id="CVE-2025-38200" title="CVE-2025-38200" />
			<reference href="https://bdu.fstec.ru/vul/2025-09174" type="self" id="BDU:2025-09174" title="BDU:2025-09174" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0037</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38202-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38202-8.0/" type="self" id="ROS-20260220-80-0037" title="ROS-20260220-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38202" type="cve" id="CVE-2025-38202" title="CVE-2025-38202" />
			<reference href="https://bdu.fstec.ru/vul/2025-10764" type="self" id="BDU:2025-10764" title="BDU:2025-10764" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0038</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38210-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38210-8.0/" type="self" id="ROS-20260220-80-0038" title="ROS-20260220-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38210" type="cve" id="CVE-2025-38210" title="CVE-2025-38210" />
			<reference href="https://bdu.fstec.ru/vul/2025-15461" type="self" id="BDU:2025-15461" title="BDU:2025-15461" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0039</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38211-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38211-8.0/" type="self" id="ROS-20260220-80-0039" title="ROS-20260220-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38211" type="cve" id="CVE-2025-38211" title="CVE-2025-38211" />
			<reference href="https://bdu.fstec.ru/vul/2025-15216" type="self" id="BDU:2025-15216" title="BDU:2025-15216" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0040</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38212-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38212-8.0/" type="self" id="ROS-20260220-80-0040" title="ROS-20260220-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38212" type="cve" id="CVE-2025-38212" title="CVE-2025-38212" />
			<reference href="https://bdu.fstec.ru/vul/2025-08999" type="self" id="BDU:2025-08999" title="BDU:2025-08999" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0041</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38213-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38213-8.0/" type="self" id="ROS-20260220-80-0041" title="ROS-20260220-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38213" type="cve" id="CVE-2025-38213" title="CVE-2025-38213" />
			<reference href="https://bdu.fstec.ru/vul/2025-15460" type="self" id="BDU:2025-15460" title="BDU:2025-15460" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0042</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38214-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38214-8.0/" type="self" id="ROS-20260220-80-0042" title="ROS-20260220-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38214" type="cve" id="CVE-2025-38214" title="CVE-2025-38214" />
			<reference href="https://bdu.fstec.ru/vul/2025-13564" type="self" id="BDU:2025-13564" title="BDU:2025-13564" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0043</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38215-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38215-8.0/" type="self" id="ROS-20260220-80-0043" title="ROS-20260220-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38215" type="cve" id="CVE-2025-38215" title="CVE-2025-38215" />
			<reference href="https://bdu.fstec.ru/vul/2025-13563" type="self" id="BDU:2025-13563" title="BDU:2025-13563" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0044</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38216-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38216-8.0/" type="self" id="ROS-20260220-80-0044" title="ROS-20260220-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38216" type="cve" id="CVE-2025-38216" title="CVE-2025-38216" />
			<reference href="https://bdu.fstec.ru/vul/2025-15484" type="self" id="BDU:2025-15484" title="BDU:2025-15484" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0045</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38217-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38217-8.0/" type="self" id="ROS-20260220-80-0045" title="ROS-20260220-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38217" type="cve" id="CVE-2025-38217" title="CVE-2025-38217" />
			<reference href="https://bdu.fstec.ru/vul/2025-13481" type="self" id="BDU:2025-13481" title="BDU:2025-13481" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0046</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38218-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38218-8.0/" type="self" id="ROS-20260220-80-0046" title="ROS-20260220-80-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38218" type="cve" id="CVE-2025-38218" title="CVE-2025-38218" />
			<reference href="https://bdu.fstec.ru/vul/2025-13477" type="self" id="BDU:2025-13477" title="BDU:2025-13477" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0047</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38219-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38219-8.0/" type="self" id="ROS-20260220-80-0047" title="ROS-20260220-80-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38219" type="cve" id="CVE-2025-38219" title="CVE-2025-38219" />
			<reference href="https://bdu.fstec.ru/vul/2025-13482" type="self" id="BDU:2025-13482" title="BDU:2025-13482" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0048</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38220-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38220-8.0/" type="self" id="ROS-20260220-80-0048" title="ROS-20260220-80-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38220" type="cve" id="CVE-2025-38220" title="CVE-2025-38220" />
			<reference href="https://bdu.fstec.ru/vul/2025-10771" type="self" id="BDU:2025-10771" title="BDU:2025-10771" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0049</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38222-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38222-8.0/" type="self" id="ROS-20260220-80-0049" title="ROS-20260220-80-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38222" type="cve" id="CVE-2025-38222" title="CVE-2025-38222" />
			<reference href="https://bdu.fstec.ru/vul/2025-10768" type="self" id="BDU:2025-10768" title="BDU:2025-10768" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260220-80-0050</id>
		<issued date="2026-02-20" />
		<updated date="2026-02-20" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38223-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38223-8.0/" type="self" id="ROS-20260220-80-0050" title="ROS-20260220-80-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38223" type="cve" id="CVE-2025-38223" title="CVE-2025-38223" />
			<reference href="https://bdu.fstec.ru/vul/2025-10769" type="self" id="BDU:2025-10769" title="BDU:2025-10769" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0001</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость krb5 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в krb5</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-krb5-cve-2025-24528-8.0/</description>
               <solution>Установить обновление для пакета(ов) krb5
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-krb5-cve-2025-24528-8.0/" type="self" id="ROS-20260224-80-0001" title="ROS-20260224-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24528" type="cve" id="CVE-2025-24528" title="CVE-2025-24528" />
			<reference href="https://bdu.fstec.ru/vul/2025-12302" type="self" id="BDU:2025-12302" title="BDU:2025-12302" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="krb5-devel" epoch="0" version="1.21.3" release="4.red80" arch="x86_64" src="krb5-1.21.3-4.red80.src.rpm">
					<filename>krb5-devel-0:1.21.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="krb5-libs" epoch="0" version="1.21.3" release="4.red80" arch="x86_64" src="krb5-1.21.3-4.red80.src.rpm">
					<filename>krb5-libs-0:1.21.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="krb5-pkinit" epoch="0" version="1.21.3" release="4.red80" arch="x86_64" src="krb5-1.21.3-4.red80.src.rpm">
					<filename>krb5-pkinit-0:1.21.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="krb5-server" epoch="0" version="1.21.3" release="4.red80" arch="x86_64" src="krb5-1.21.3-4.red80.src.rpm">
					<filename>krb5-server-0:1.21.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="krb5-server-ldap" epoch="0" version="1.21.3" release="4.red80" arch="x86_64" src="krb5-1.21.3-4.red80.src.rpm">
					<filename>krb5-server-ldap-0:1.21.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="krb5-tests" epoch="0" version="1.21.3" release="4.red80" arch="x86_64" src="krb5-1.21.3-4.red80.src.rpm">
					<filename>krb5-tests-0:1.21.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="krb5-workstation" epoch="0" version="1.21.3" release="4.red80" arch="x86_64" src="krb5-1.21.3-4.red80.src.rpm">
					<filename>krb5-workstation-0:1.21.3-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libkadm5" epoch="0" version="1.21.3" release="4.red80" arch="x86_64" src="krb5-1.21.3-4.red80.src.rpm">
					<filename>libkadm5-0:1.21.3-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="krb5-devel" epoch="0" version="1.21.3" release="4.red80" arch="aarch64" src="krb5-1.21.3-4.red80.src.rpm">
					<filename>krb5-devel-0:1.21.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="krb5-libs" epoch="0" version="1.21.3" release="4.red80" arch="aarch64" src="krb5-1.21.3-4.red80.src.rpm">
					<filename>krb5-libs-0:1.21.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="krb5-pkinit" epoch="0" version="1.21.3" release="4.red80" arch="aarch64" src="krb5-1.21.3-4.red80.src.rpm">
					<filename>krb5-pkinit-0:1.21.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="krb5-server" epoch="0" version="1.21.3" release="4.red80" arch="aarch64" src="krb5-1.21.3-4.red80.src.rpm">
					<filename>krb5-server-0:1.21.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="krb5-server-ldap" epoch="0" version="1.21.3" release="4.red80" arch="aarch64" src="krb5-1.21.3-4.red80.src.rpm">
					<filename>krb5-server-ldap-0:1.21.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="krb5-tests" epoch="0" version="1.21.3" release="4.red80" arch="aarch64" src="krb5-1.21.3-4.red80.src.rpm">
					<filename>krb5-tests-0:1.21.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="krb5-workstation" epoch="0" version="1.21.3" release="4.red80" arch="aarch64" src="krb5-1.21.3-4.red80.src.rpm">
					<filename>krb5-workstation-0:1.21.3-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libkadm5" epoch="0" version="1.21.3" release="4.red80" arch="aarch64" src="krb5-1.21.3-4.red80.src.rpm">
					<filename>libkadm5-0:1.21.3-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0002</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость angie </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в angie</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-angie-cve-2025-23419-8.0/</description>
               <solution>Установить обновление для пакета(ов) angie
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-angie-cve-2025-23419-8.0/" type="self" id="ROS-20260224-80-0002" title="ROS-20260224-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23419" type="cve" id="CVE-2025-23419" title="CVE-2025-23419" />
			<reference href="https://bdu.fstec.ru/vul/2025-03281" type="self" id="BDU:2025-03281" title="BDU:2025-03281" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="angie" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-jwt" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-jwt-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-ldap" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-ldap-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-pam" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-pam-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-spnego" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-spnego-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-totp" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-totp-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-brotli" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-brotli-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-cache-purge" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-cache-purge-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-cgi" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-cgi-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-combined-upstreams" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-combined-upstreams-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-dav-ext" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-dav-ext-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-dynamic-limit-req" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-dynamic-limit-req-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-echo" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-echo-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-enhanced-memcached" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-enhanced-memcached-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-eval" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-eval-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-geoip2" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-geoip2-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-headers-more" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-headers-more-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-http-auth-radius" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-http-auth-radius-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-image-filter" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-image-filter-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-keyval" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-keyval-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-lua" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-lua-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-modsecurity" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-modsecurity-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-ndk" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-ndk-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-njs-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs-cli" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-njs-cli-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs-light" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-njs-light-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs-light-cli" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-njs-light-cli-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-opentracing" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-opentracing-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-otel" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-otel-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-perl" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-perl-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-postgres" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-postgres-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-redis2" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-redis2-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-rtmp" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-rtmp-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-set-misc" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-set-misc-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-subs" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-subs-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-testcookie" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-testcookie-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-unbrotli" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-unbrotli-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-upload" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-upload-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-vod" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-vod-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-vts" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-vts-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wamr" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-wamr-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wasm" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-wasm-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wasmtime" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-wasmtime-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-xslt" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-xslt-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-zip" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-zip-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-zstd" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-zstd-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="angie" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-auth-jwt" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-jwt-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-auth-ldap" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-ldap-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-auth-pam" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-pam-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-auth-spnego" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-spnego-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-auth-totp" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-totp-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-brotli" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-brotli-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-cache-purge" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-cache-purge-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-cgi" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-cgi-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-combined-upstreams" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-combined-upstreams-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-dav-ext" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-dav-ext-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-dynamic-limit-req" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-dynamic-limit-req-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-echo" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-echo-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-enhanced-memcached" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-enhanced-memcached-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-eval" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-eval-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-geoip2" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-geoip2-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-headers-more" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-headers-more-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-http-auth-radius" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-http-auth-radius-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-image-filter" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-image-filter-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-keyval" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-keyval-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-lua" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-lua-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-modsecurity" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-modsecurity-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-ndk" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-ndk-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-njs" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-njs-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-njs-cli" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-njs-cli-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-njs-light" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-njs-light-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-njs-light-cli" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-njs-light-cli-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-opentracing" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-opentracing-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-otel" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-otel-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-perl" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-perl-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-postgres" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-postgres-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-redis2" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-redis2-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-rtmp" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-rtmp-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-set-misc" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-set-misc-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-subs" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-subs-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-testcookie" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-testcookie-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-unbrotli" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-unbrotli-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-upload" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-upload-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-vod" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-vod-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-vts" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-vts-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-wamr" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-wamr-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-wasm" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-wasm-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-wasmtime" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-wasmtime-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-xslt" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-xslt-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-zip" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-zip-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-zstd" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-zstd-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0003</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость angie </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в angie</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-angie-cve-2025-53859-8.0/</description>
               <solution>Установить обновление для пакета(ов) angie
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-angie-cve-2025-53859-8.0/" type="self" id="ROS-20260224-80-0003" title="ROS-20260224-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53859" type="cve" id="CVE-2025-53859" title="CVE-2025-53859" />
			<reference href="https://bdu.fstec.ru/vul/2025-16019" type="self" id="BDU:2025-16019" title="BDU:2025-16019" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="angie" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-jwt" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-jwt-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-ldap" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-ldap-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-pam" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-pam-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-spnego" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-spnego-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-totp" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-totp-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-brotli" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-brotli-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-cache-purge" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-cache-purge-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-cgi" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-cgi-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-combined-upstreams" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-combined-upstreams-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-dav-ext" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-dav-ext-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-dynamic-limit-req" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-dynamic-limit-req-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-echo" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-echo-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-enhanced-memcached" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-enhanced-memcached-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-eval" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-eval-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-geoip2" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-geoip2-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-headers-more" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-headers-more-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-http-auth-radius" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-http-auth-radius-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-image-filter" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-image-filter-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-keyval" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-keyval-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-lua" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-lua-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-modsecurity" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-modsecurity-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-ndk" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-ndk-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-njs-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs-cli" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-njs-cli-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs-light" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-njs-light-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs-light-cli" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-njs-light-cli-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-opentracing" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-opentracing-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-otel" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-otel-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-perl" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-perl-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-postgres" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-postgres-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-redis2" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-redis2-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-rtmp" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-rtmp-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-set-misc" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-set-misc-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-subs" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-subs-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-testcookie" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-testcookie-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-unbrotli" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-unbrotli-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-upload" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-upload-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-vod" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-vod-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-vts" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-vts-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wamr" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-wamr-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wasm" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-wasm-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wasmtime" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-wasmtime-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-xslt" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-xslt-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-zip" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-zip-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-zstd" epoch="0" version="1.10.2" release="1.red80" arch="x86_64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-zstd-0:1.10.2-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="angie" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-auth-jwt" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-jwt-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-auth-ldap" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-ldap-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-auth-pam" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-pam-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-auth-spnego" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-spnego-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-auth-totp" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-auth-totp-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-brotli" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-brotli-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-cache-purge" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-cache-purge-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-cgi" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-cgi-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-combined-upstreams" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-combined-upstreams-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-dav-ext" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-dav-ext-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-dynamic-limit-req" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-dynamic-limit-req-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-echo" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-echo-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-enhanced-memcached" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-enhanced-memcached-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-eval" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-eval-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-geoip2" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-geoip2-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-headers-more" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-headers-more-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-http-auth-radius" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-http-auth-radius-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-image-filter" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-image-filter-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-keyval" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-keyval-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-lua" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-lua-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-modsecurity" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-modsecurity-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-ndk" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-ndk-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-njs" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-njs-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-njs-cli" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-njs-cli-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-njs-light" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-njs-light-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-njs-light-cli" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-njs-light-cli-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-opentracing" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-opentracing-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-otel" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-otel-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-perl" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-perl-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-postgres" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-postgres-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-redis2" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-redis2-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-rtmp" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-rtmp-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-set-misc" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-set-misc-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-subs" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-subs-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-testcookie" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-testcookie-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-unbrotli" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-unbrotli-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-upload" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-upload-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-vod" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-vod-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-vts" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-vts-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-wamr" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-wamr-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-wasm" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-wasm-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-wasmtime" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-wasmtime-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-xslt" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-xslt-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-zip" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-zip-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-zstd" epoch="0" version="1.10.2" release="1.red80" arch="aarch64" src="angie-1.10.2-1.red80.src.rpm">
					<filename>angie-module-zstd-0:1.10.2-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0004</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-14425-8.0/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-14425-8.0/" type="self" id="ROS-20260224-80-0004" title="ROS-20260224-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14425" type="cve" id="CVE-2025-14425" title="CVE-2025-14425" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gimp" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gimp" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0005</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-14422-8.0/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-14422-8.0/" type="self" id="ROS-20260224-80-0005" title="ROS-20260224-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14422" type="cve" id="CVE-2025-14422" title="CVE-2025-14422" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gimp" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gimp" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0006</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-14424-8.0/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-14424-8.0/" type="self" id="ROS-20260224-80-0006" title="ROS-20260224-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14424" type="cve" id="CVE-2025-14424" title="CVE-2025-14424" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gimp" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gimp" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0007</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-14423-8.0/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2025-14423-8.0/" type="self" id="ROS-20260224-80-0007" title="ROS-20260224-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14423" type="cve" id="CVE-2025-14423" title="CVE-2025-14423" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gimp" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gimp" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0008</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость xkbcomp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в xkbcomp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-xkbcomp-cve-2018-15853-8.0/</description>
               <solution>Установить обновление для пакета(ов) xkbcomp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-xkbcomp-cve-2018-15853-8.0/" type="self" id="ROS-20260224-80-0008" title="ROS-20260224-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15853" type="cve" id="CVE-2018-15853" title="CVE-2018-15853" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="xkbcomp" epoch="0" version="1.5.0" release="1.red80" arch="x86_64" src="xkbcomp-1.5.0-1.red80.src.rpm">
					<filename>xkbcomp-0:1.5.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="xkbcomp-devel" epoch="0" version="1.5.0" release="1.red80" arch="x86_64" src="xkbcomp-1.5.0-1.red80.src.rpm">
					<filename>xkbcomp-devel-0:1.5.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="xkbcomp" epoch="0" version="1.5.0" release="1.red80" arch="aarch64" src="xkbcomp-1.5.0-1.red80.src.rpm">
					<filename>xkbcomp-0:1.5.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="xkbcomp-devel" epoch="0" version="1.5.0" release="1.red80" arch="aarch64" src="xkbcomp-1.5.0-1.red80.src.rpm">
					<filename>xkbcomp-devel-0:1.5.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0009</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость xkbcomp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в xkbcomp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-xkbcomp-cve-2018-15859-8.0/</description>
               <solution>Установить обновление для пакета(ов) xkbcomp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-xkbcomp-cve-2018-15859-8.0/" type="self" id="ROS-20260224-80-0009" title="ROS-20260224-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15859" type="cve" id="CVE-2018-15859" title="CVE-2018-15859" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="xkbcomp" epoch="0" version="1.5.0" release="1.red80" arch="x86_64" src="xkbcomp-1.5.0-1.red80.src.rpm">
					<filename>xkbcomp-0:1.5.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="xkbcomp-devel" epoch="0" version="1.5.0" release="1.red80" arch="x86_64" src="xkbcomp-1.5.0-1.red80.src.rpm">
					<filename>xkbcomp-devel-0:1.5.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="xkbcomp" epoch="0" version="1.5.0" release="1.red80" arch="aarch64" src="xkbcomp-1.5.0-1.red80.src.rpm">
					<filename>xkbcomp-0:1.5.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="xkbcomp-devel" epoch="0" version="1.5.0" release="1.red80" arch="aarch64" src="xkbcomp-1.5.0-1.red80.src.rpm">
					<filename>xkbcomp-devel-0:1.5.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0010</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость xkbcomp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в xkbcomp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-xkbcomp-cve-2018-15861-8.0/</description>
               <solution>Установить обновление для пакета(ов) xkbcomp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-xkbcomp-cve-2018-15861-8.0/" type="self" id="ROS-20260224-80-0010" title="ROS-20260224-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15861" type="cve" id="CVE-2018-15861" title="CVE-2018-15861" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="xkbcomp" epoch="0" version="1.5.0" release="1.red80" arch="x86_64" src="xkbcomp-1.5.0-1.red80.src.rpm">
					<filename>xkbcomp-0:1.5.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="xkbcomp-devel" epoch="0" version="1.5.0" release="1.red80" arch="x86_64" src="xkbcomp-1.5.0-1.red80.src.rpm">
					<filename>xkbcomp-devel-0:1.5.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="xkbcomp" epoch="0" version="1.5.0" release="1.red80" arch="aarch64" src="xkbcomp-1.5.0-1.red80.src.rpm">
					<filename>xkbcomp-0:1.5.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="xkbcomp-devel" epoch="0" version="1.5.0" release="1.red80" arch="aarch64" src="xkbcomp-1.5.0-1.red80.src.rpm">
					<filename>xkbcomp-devel-0:1.5.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0011</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость xkbcomp </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в xkbcomp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-xkbcomp-cve-2018-15863-8.0/</description>
               <solution>Установить обновление для пакета(ов) xkbcomp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-xkbcomp-cve-2018-15863-8.0/" type="self" id="ROS-20260224-80-0011" title="ROS-20260224-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15863" type="cve" id="CVE-2018-15863" title="CVE-2018-15863" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="xkbcomp" epoch="0" version="1.5.0" release="1.red80" arch="x86_64" src="xkbcomp-1.5.0-1.red80.src.rpm">
					<filename>xkbcomp-0:1.5.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="xkbcomp-devel" epoch="0" version="1.5.0" release="1.red80" arch="x86_64" src="xkbcomp-1.5.0-1.red80.src.rpm">
					<filename>xkbcomp-devel-0:1.5.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="xkbcomp" epoch="0" version="1.5.0" release="1.red80" arch="aarch64" src="xkbcomp-1.5.0-1.red80.src.rpm">
					<filename>xkbcomp-0:1.5.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="xkbcomp-devel" epoch="0" version="1.5.0" release="1.red80" arch="aarch64" src="xkbcomp-1.5.0-1.red80.src.rpm">
					<filename>xkbcomp-devel-0:1.5.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0012</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость glib2 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в glib2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glib2-cve-2025-14087-8.0/</description>
               <solution>Установить обновление для пакета(ов) glib2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glib2-cve-2025-14087-8.0/" type="self" id="ROS-20260224-80-0012" title="ROS-20260224-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14087" type="cve" id="CVE-2025-14087" title="CVE-2025-14087" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="glib2" epoch="0" version="2.84.4" release="2.red80" arch="x86_64" src="glib2-2.84.4-2.red80.src.rpm">
					<filename>glib2-0:2.84.4-2.red80.x86_64.rpm</filename>
				</package>
				<package name="glib2-devel" epoch="0" version="2.84.4" release="2.red80" arch="x86_64" src="glib2-2.84.4-2.red80.src.rpm">
					<filename>glib2-devel-0:2.84.4-2.red80.x86_64.rpm</filename>
				</package>
				<package name="glib2-doc" epoch="0" version="2.84.4" release="2.red80" arch="x86_64" src="glib2-2.84.4-2.red80.src.rpm">
					<filename>glib2-doc-0:2.84.4-2.red80.x86_64.rpm</filename>
				</package>
				<package name="glib2-static" epoch="0" version="2.84.4" release="2.red80" arch="x86_64" src="glib2-2.84.4-2.red80.src.rpm">
					<filename>glib2-static-0:2.84.4-2.red80.x86_64.rpm</filename>
				</package>
				<package name="glib2-tests" epoch="0" version="2.84.4" release="2.red80" arch="x86_64" src="glib2-2.84.4-2.red80.src.rpm">
					<filename>glib2-tests-0:2.84.4-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="glib2" epoch="0" version="2.84.4" release="2.red80" arch="aarch64" src="glib2-2.84.4-2.red80.src.rpm">
					<filename>glib2-0:2.84.4-2.red80.aarch64.rpm</filename>
				</package>
				<package name="glib2-devel" epoch="0" version="2.84.4" release="2.red80" arch="aarch64" src="glib2-2.84.4-2.red80.src.rpm">
					<filename>glib2-devel-0:2.84.4-2.red80.aarch64.rpm</filename>
				</package>
				<package name="glib2-doc" epoch="0" version="2.84.4" release="2.red80" arch="aarch64" src="glib2-2.84.4-2.red80.src.rpm">
					<filename>glib2-doc-0:2.84.4-2.red80.aarch64.rpm</filename>
				</package>
				<package name="glib2-static" epoch="0" version="2.84.4" release="2.red80" arch="aarch64" src="glib2-2.84.4-2.red80.src.rpm">
					<filename>glib2-static-0:2.84.4-2.red80.aarch64.rpm</filename>
				</package>
				<package name="glib2-tests" epoch="0" version="2.84.4" release="2.red80" arch="aarch64" src="glib2-2.84.4-2.red80.src.rpm">
					<filename>glib2-tests-0:2.84.4-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0013</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость kde-connect </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kde-connect</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kde-connect-cve-2025-32900-8.0/</description>
               <solution>Установить обновление для пакета(ов) kde-connect
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kde-connect-cve-2025-32900-8.0/" type="self" id="ROS-20260224-80-0013" title="ROS-20260224-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32900" type="cve" id="CVE-2025-32900" title="CVE-2025-32900" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kde-connect" epoch="0" version="23.08.5" release="3.red80" arch="x86_64" src="kde-connect-23.08.5-3.red80.src.rpm">
					<filename>kde-connect-0:23.08.5-3.red80.x86_64.rpm</filename>
				</package>
				<package name="kde-connect-libs" epoch="0" version="23.08.5" release="3.red80" arch="x86_64" src="kde-connect-23.08.5-3.red80.src.rpm">
					<filename>kde-connect-libs-0:23.08.5-3.red80.x86_64.rpm</filename>
				</package>
				<package name="kde-connect-nautilus" epoch="0" version="23.08.5" release="3.red80" arch="x86_64" src="kde-connect-23.08.5-3.red80.src.rpm">
					<filename>kde-connect-nautilus-0:23.08.5-3.red80.x86_64.rpm</filename>
				</package>
				<package name="kdeconnectd" epoch="0" version="23.08.5" release="3.red80" arch="x86_64" src="kde-connect-23.08.5-3.red80.src.rpm">
					<filename>kdeconnectd-0:23.08.5-3.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kde-connect" epoch="0" version="23.08.5" release="3.red80" arch="aarch64" src="kde-connect-23.08.5-3.red80.src.rpm">
					<filename>kde-connect-0:23.08.5-3.red80.aarch64.rpm</filename>
				</package>
				<package name="kde-connect-libs" epoch="0" version="23.08.5" release="3.red80" arch="aarch64" src="kde-connect-23.08.5-3.red80.src.rpm">
					<filename>kde-connect-libs-0:23.08.5-3.red80.aarch64.rpm</filename>
				</package>
				<package name="kde-connect-nautilus" epoch="0" version="23.08.5" release="3.red80" arch="aarch64" src="kde-connect-23.08.5-3.red80.src.rpm">
					<filename>kde-connect-nautilus-0:23.08.5-3.red80.aarch64.rpm</filename>
				</package>
				<package name="kdeconnectd" epoch="0" version="23.08.5" release="3.red80" arch="aarch64" src="kde-connect-23.08.5-3.red80.src.rpm">
					<filename>kdeconnectd-0:23.08.5-3.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0014</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость libcoap </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libcoap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-65501-8.0/</description>
               <solution>Установить обновление для пакета(ов) libcoap
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-65501-8.0/" type="self" id="ROS-20260224-80-0014" title="ROS-20260224-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65501" type="cve" id="CVE-2025-65501" title="CVE-2025-65501" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libcoap-doc" epoch="0" version="4.3.5a" release="1.red80" arch="noarch" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-doc-0:4.3.5a-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0015</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость libcoap </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libcoap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-65493-8.0/</description>
               <solution>Установить обновление для пакета(ов) libcoap
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-65493-8.0/" type="self" id="ROS-20260224-80-0015" title="ROS-20260224-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65493" type="cve" id="CVE-2025-65493" title="CVE-2025-65493" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libcoap-doc" epoch="0" version="4.3.5a" release="1.red80" arch="noarch" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-doc-0:4.3.5a-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0016</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость libcoap </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libcoap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-34468-8.0/</description>
               <solution>Установить обновление для пакета(ов) libcoap
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-34468-8.0/" type="self" id="ROS-20260224-80-0016" title="ROS-20260224-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-34468" type="cve" id="CVE-2025-34468" title="CVE-2025-34468" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libcoap-doc" epoch="0" version="4.3.5a" release="1.red80" arch="noarch" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-doc-0:4.3.5a-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0017</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость libcoap </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libcoap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-65494-8.0/</description>
               <solution>Установить обновление для пакета(ов) libcoap
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-65494-8.0/" type="self" id="ROS-20260224-80-0017" title="ROS-20260224-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65494" type="cve" id="CVE-2025-65494" title="CVE-2025-65494" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libcoap-doc" epoch="0" version="4.3.5a" release="1.red80" arch="noarch" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-doc-0:4.3.5a-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0018</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость libcoap </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libcoap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-65495-8.0/</description>
               <solution>Установить обновление для пакета(ов) libcoap
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-65495-8.0/" type="self" id="ROS-20260224-80-0018" title="ROS-20260224-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65495" type="cve" id="CVE-2025-65495" title="CVE-2025-65495" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libcoap-doc" epoch="0" version="4.3.5a" release="1.red80" arch="noarch" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-doc-0:4.3.5a-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0019</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость libcoap </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libcoap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-65496-8.0/</description>
               <solution>Установить обновление для пакета(ов) libcoap
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-65496-8.0/" type="self" id="ROS-20260224-80-0019" title="ROS-20260224-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65496" type="cve" id="CVE-2025-65496" title="CVE-2025-65496" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libcoap-doc" epoch="0" version="4.3.5a" release="1.red80" arch="noarch" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-doc-0:4.3.5a-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0020</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость libcoap </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libcoap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-65497-8.0/</description>
               <solution>Установить обновление для пакета(ов) libcoap
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-65497-8.0/" type="self" id="ROS-20260224-80-0020" title="ROS-20260224-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65497" type="cve" id="CVE-2025-65497" title="CVE-2025-65497" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libcoap-doc" epoch="0" version="4.3.5a" release="1.red80" arch="noarch" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-doc-0:4.3.5a-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0021</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость libcoap </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libcoap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-65498-8.0/</description>
               <solution>Установить обновление для пакета(ов) libcoap
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-65498-8.0/" type="self" id="ROS-20260224-80-0021" title="ROS-20260224-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65498" type="cve" id="CVE-2025-65498" title="CVE-2025-65498" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libcoap-doc" epoch="0" version="4.3.5a" release="1.red80" arch="noarch" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-doc-0:4.3.5a-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0022</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость libcoap </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libcoap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-65499-8.0/</description>
               <solution>Установить обновление для пакета(ов) libcoap
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-65499-8.0/" type="self" id="ROS-20260224-80-0022" title="ROS-20260224-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65499" type="cve" id="CVE-2025-65499" title="CVE-2025-65499" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libcoap-doc" epoch="0" version="4.3.5a" release="1.red80" arch="noarch" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-doc-0:4.3.5a-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0023</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость libcoap </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libcoap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-65500-8.0/</description>
               <solution>Установить обновление для пакета(ов) libcoap
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-65500-8.0/" type="self" id="ROS-20260224-80-0023" title="ROS-20260224-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65500" type="cve" id="CVE-2025-65500" title="CVE-2025-65500" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libcoap-doc" epoch="0" version="4.3.5a" release="1.red80" arch="noarch" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-doc-0:4.3.5a-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0024</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость libcoap </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libcoap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-59391-8.0/</description>
               <solution>Установить обновление для пакета(ов) libcoap
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libcoap-cve-2025-59391-8.0/" type="self" id="ROS-20260224-80-0024" title="ROS-20260224-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59391" type="cve" id="CVE-2025-59391" title="CVE-2025-59391" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="x86_64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libcoap" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-devel" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-devel-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libcoap-utils" epoch="0" version="4.3.5a" release="1.red80" arch="aarch64" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-utils-0:4.3.5a-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libcoap-doc" epoch="0" version="4.3.5a" release="1.red80" arch="noarch" src="libcoap-4.3.5a-1.red80.src.rpm">
					<filename>libcoap-doc-0:4.3.5a-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0025</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость kibana </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kibana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2025-37732-8.0/</description>
               <solution>Установить обновление для пакета(ов) kibana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2025-37732-8.0/" type="self" id="ROS-20260224-80-0025" title="ROS-20260224-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37732" type="cve" id="CVE-2025-37732" title="CVE-2025-37732" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kibana" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="kibana-9.2.4-1.red80.src.rpm">
					<filename>kibana-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0026</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость kibana </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kibana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2025-37734-8.0/</description>
               <solution>Установить обновление для пакета(ов) kibana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2025-37734-8.0/" type="self" id="ROS-20260224-80-0026" title="ROS-20260224-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37734" type="cve" id="CVE-2025-37734" title="CVE-2025-37734" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kibana" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="kibana-9.2.4-1.red80.src.rpm">
					<filename>kibana-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0027</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость apache-commons-text </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в apache-commons-text</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-apache-commons-text-cve-2025-46295-8.0/</description>
               <solution>Установить обновление для пакета(ов) apache-commons-text
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-apache-commons-text-cve-2025-46295-8.0/" type="self" id="ROS-20260224-80-0027" title="ROS-20260224-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46295" type="cve" id="CVE-2025-46295" title="CVE-2025-46295" />
			<reference href="https://bdu.fstec.ru/vul/2025-16425" type="self" id="BDU:2025-16425" title="BDU:2025-16425" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="apache-commons-text" epoch="0" version="1.15.0" release="1.red80" arch="noarch" src="apache-commons-text-1.15.0-1.red80.src.rpm">
					<filename>apache-commons-text-0:1.15.0-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0028</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость libsndfile </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libsndfile</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libsndfile-cve-2025-56226-8.0/</description>
               <solution>Установить обновление для пакета(ов) libsndfile
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libsndfile-cve-2025-56226-8.0/" type="self" id="ROS-20260224-80-0028" title="ROS-20260224-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-56226" type="cve" id="CVE-2025-56226" title="CVE-2025-56226" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libsndfile" epoch="0" version="1.1.0" release="6.red80" arch="x86_64" src="libsndfile-1.1.0-6.red80.src.rpm">
					<filename>libsndfile-0:1.1.0-6.red80.x86_64.rpm</filename>
				</package>
				<package name="libsndfile-devel" epoch="0" version="1.1.0" release="6.red80" arch="x86_64" src="libsndfile-1.1.0-6.red80.src.rpm">
					<filename>libsndfile-devel-0:1.1.0-6.red80.x86_64.rpm</filename>
				</package>
				<package name="libsndfile-utils" epoch="0" version="1.1.0" release="6.red80" arch="x86_64" src="libsndfile-1.1.0-6.red80.src.rpm">
					<filename>libsndfile-utils-0:1.1.0-6.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libsndfile" epoch="0" version="1.1.0" release="6.red80" arch="aarch64" src="libsndfile-1.1.0-6.red80.src.rpm">
					<filename>libsndfile-0:1.1.0-6.red80.aarch64.rpm</filename>
				</package>
				<package name="libsndfile-devel" epoch="0" version="1.1.0" release="6.red80" arch="aarch64" src="libsndfile-1.1.0-6.red80.src.rpm">
					<filename>libsndfile-devel-0:1.1.0-6.red80.aarch64.rpm</filename>
				</package>
				<package name="libsndfile-utils" epoch="0" version="1.1.0" release="6.red80" arch="aarch64" src="libsndfile-1.1.0-6.red80.src.rpm">
					<filename>libsndfile-utils-0:1.1.0-6.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0029</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость kde-connect </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kde-connect</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kde-connect-cve-2025-66270-8.0/</description>
               <solution>Установить обновление для пакета(ов) kde-connect
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kde-connect-cve-2025-66270-8.0/" type="self" id="ROS-20260224-80-0029" title="ROS-20260224-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66270" type="cve" id="CVE-2025-66270" title="CVE-2025-66270" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kde-connect" epoch="0" version="23.08.5" release="3.red80" arch="x86_64" src="kde-connect-23.08.5-3.red80.src.rpm">
					<filename>kde-connect-0:23.08.5-3.red80.x86_64.rpm</filename>
				</package>
				<package name="kde-connect-libs" epoch="0" version="23.08.5" release="3.red80" arch="x86_64" src="kde-connect-23.08.5-3.red80.src.rpm">
					<filename>kde-connect-libs-0:23.08.5-3.red80.x86_64.rpm</filename>
				</package>
				<package name="kde-connect-nautilus" epoch="0" version="23.08.5" release="3.red80" arch="x86_64" src="kde-connect-23.08.5-3.red80.src.rpm">
					<filename>kde-connect-nautilus-0:23.08.5-3.red80.x86_64.rpm</filename>
				</package>
				<package name="kdeconnectd" epoch="0" version="23.08.5" release="3.red80" arch="x86_64" src="kde-connect-23.08.5-3.red80.src.rpm">
					<filename>kdeconnectd-0:23.08.5-3.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kde-connect" epoch="0" version="23.08.5" release="3.red80" arch="aarch64" src="kde-connect-23.08.5-3.red80.src.rpm">
					<filename>kde-connect-0:23.08.5-3.red80.aarch64.rpm</filename>
				</package>
				<package name="kde-connect-libs" epoch="0" version="23.08.5" release="3.red80" arch="aarch64" src="kde-connect-23.08.5-3.red80.src.rpm">
					<filename>kde-connect-libs-0:23.08.5-3.red80.aarch64.rpm</filename>
				</package>
				<package name="kde-connect-nautilus" epoch="0" version="23.08.5" release="3.red80" arch="aarch64" src="kde-connect-23.08.5-3.red80.src.rpm">
					<filename>kde-connect-nautilus-0:23.08.5-3.red80.aarch64.rpm</filename>
				</package>
				<package name="kdeconnectd" epoch="0" version="23.08.5" release="3.red80" arch="aarch64" src="kde-connect-23.08.5-3.red80.src.rpm">
					<filename>kdeconnectd-0:23.08.5-3.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0030</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость php-itop </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в php-itop</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-php-itop-cve-2025-47286-8.0/</description>
               <solution>Установить обновление для пакета(ов) php-itop
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-php-itop-cve-2025-47286-8.0/" type="self" id="ROS-20260224-80-0030" title="ROS-20260224-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47286" type="cve" id="CVE-2025-47286" title="CVE-2025-47286" />
			<reference href="https://bdu.fstec.ru/vul/2025-06926" type="self" id="BDU:2025-06926" title="BDU:2025-06926" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="php-itop" epoch="0" version="3.2.2.1.17851" release="3.red80" arch="noarch" src="php-itop-3.2.2.1.17851-3.red80.src.rpm">
					<filename>php-itop-0:3.2.2.1.17851-3.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0031</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость php-itop </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в php-itop</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-php-itop-cve-2025-49145-8.0/</description>
               <solution>Установить обновление для пакета(ов) php-itop
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-php-itop-cve-2025-49145-8.0/" type="self" id="ROS-20260224-80-0031" title="ROS-20260224-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49145" type="cve" id="CVE-2025-49145" title="CVE-2025-49145" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="php-itop" epoch="0" version="3.2.2.1.17851" release="3.red80" arch="noarch" src="php-itop-3.2.2.1.17851-3.red80.src.rpm">
					<filename>php-itop-0:3.2.2.1.17851-3.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0032</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость log4j </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в log4j</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-log4j-cve-2025-68161-8.0/</description>
               <solution>Установить обновление для пакета(ов) log4j
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-log4j-cve-2025-68161-8.0/" type="self" id="ROS-20260224-80-0032" title="ROS-20260224-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68161" type="cve" id="CVE-2025-68161" title="CVE-2025-68161" />
			<reference href="https://bdu.fstec.ru/vul/2026-00009" type="self" id="BDU:2026-00009" title="BDU:2026-00009" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="log4j" epoch="0" version="2.20.0" release="4.red80" arch="noarch" src="log4j-2.20.0-4.red80.src.rpm">
					<filename>log4j-0:2.20.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="log4j-bom" epoch="0" version="2.20.0" release="4.red80" arch="noarch" src="log4j-2.20.0-4.red80.src.rpm">
					<filename>log4j-bom-0:2.20.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="log4j-javadoc" epoch="0" version="2.20.0" release="4.red80" arch="noarch" src="log4j-2.20.0-4.red80.src.rpm">
					<filename>log4j-javadoc-0:2.20.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="log4j-jcl" epoch="0" version="2.20.0" release="4.red80" arch="noarch" src="log4j-2.20.0-4.red80.src.rpm">
					<filename>log4j-jcl-0:2.20.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="log4j-slf4j" epoch="0" version="2.20.0" release="4.red80" arch="noarch" src="log4j-2.20.0-4.red80.src.rpm">
					<filename>log4j-slf4j-0:2.20.0-4.red80.noarch.rpm</filename>
				</package>
				<package name="log4j-web" epoch="0" version="2.20.0" release="4.red80" arch="noarch" src="log4j-2.20.0-4.red80.src.rpm">
					<filename>log4j-web-0:2.20.0-4.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0033</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость kibana </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kibana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2025-68385-8.0/</description>
               <solution>Установить обновление для пакета(ов) kibana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2025-68385-8.0/" type="self" id="ROS-20260224-80-0033" title="ROS-20260224-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68385" type="cve" id="CVE-2025-68385" title="CVE-2025-68385" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kibana" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="kibana-9.2.4-1.red80.src.rpm">
					<filename>kibana-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0034</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость kibana </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kibana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2025-68386-8.0/</description>
               <solution>Установить обновление для пакета(ов) kibana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2025-68386-8.0/" type="self" id="ROS-20260224-80-0034" title="ROS-20260224-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68386" type="cve" id="CVE-2025-68386" title="CVE-2025-68386" />
			<reference href="https://bdu.fstec.ru/vul/2026-00011" type="self" id="BDU:2026-00011" title="BDU:2026-00011" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kibana" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="kibana-9.2.4-1.red80.src.rpm">
					<filename>kibana-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0035</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость kibana </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kibana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2025-68387-8.0/</description>
               <solution>Установить обновление для пакета(ов) kibana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2025-68387-8.0/" type="self" id="ROS-20260224-80-0035" title="ROS-20260224-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68387" type="cve" id="CVE-2025-68387" title="CVE-2025-68387" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kibana" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="kibana-9.2.4-1.red80.src.rpm">
					<filename>kibana-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0036</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость kibana </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kibana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2025-68389-8.0/</description>
               <solution>Установить обновление для пакета(ов) kibana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2025-68389-8.0/" type="self" id="ROS-20260224-80-0036" title="ROS-20260224-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68389" type="cve" id="CVE-2025-68389" title="CVE-2025-68389" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kibana" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="kibana-9.2.4-1.red80.src.rpm">
					<filename>kibana-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0037</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость kibana </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kibana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2025-68422-8.0/</description>
               <solution>Установить обновление для пакета(ов) kibana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2025-68422-8.0/" type="self" id="ROS-20260224-80-0037" title="ROS-20260224-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68422" type="cve" id="CVE-2025-68422" title="CVE-2025-68422" />
			<reference href="https://bdu.fstec.ru/vul/2026-00012" type="self" id="BDU:2026-00012" title="BDU:2026-00012" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kibana" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="kibana-9.2.4-1.red80.src.rpm">
					<filename>kibana-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0038</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость kibana </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kibana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2026-0528-8.0/</description>
               <solution>Установить обновление для пакета(ов) kibana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2026-0528-8.0/" type="self" id="ROS-20260224-80-0038" title="ROS-20260224-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0528" type="cve" id="CVE-2026-0528" title="CVE-2026-0528" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kibana" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="kibana-9.2.4-1.red80.src.rpm">
					<filename>kibana-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0039</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость kibana </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kibana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2026-0530-8.0/</description>
               <solution>Установить обновление для пакета(ов) kibana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2026-0530-8.0/" type="self" id="ROS-20260224-80-0039" title="ROS-20260224-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0530" type="cve" id="CVE-2026-0530" title="CVE-2026-0530" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kibana" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="kibana-9.2.4-1.red80.src.rpm">
					<filename>kibana-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0040</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость kibana </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kibana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2026-0531-8.0/</description>
               <solution>Установить обновление для пакета(ов) kibana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2026-0531-8.0/" type="self" id="ROS-20260224-80-0040" title="ROS-20260224-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0531" type="cve" id="CVE-2026-0531" title="CVE-2026-0531" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kibana" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="kibana-9.2.4-1.red80.src.rpm">
					<filename>kibana-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0041</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость kibana </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kibana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2026-0532-8.0/</description>
               <solution>Установить обновление для пакета(ов) kibana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2026-0532-8.0/" type="self" id="ROS-20260224-80-0041" title="ROS-20260224-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0532" type="cve" id="CVE-2026-0532" title="CVE-2026-0532" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kibana" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="kibana-9.2.4-1.red80.src.rpm">
					<filename>kibana-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0042</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость kibana </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kibana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2026-0543-8.0/</description>
               <solution>Установить обновление для пакета(ов) kibana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kibana-cve-2026-0543-8.0/" type="self" id="ROS-20260224-80-0042" title="ROS-20260224-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0543" type="cve" id="CVE-2026-0543" title="CVE-2026-0543" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kibana" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="kibana-9.2.4-1.red80.src.rpm">
					<filename>kibana-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0043</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-curl-cve-2025-14819-8.0/</description>
               <solution>Установить обновление для пакета(ов) curl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-curl-cve-2025-14819-8.0/" type="self" id="ROS-20260224-80-0043" title="ROS-20260224-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14819" type="cve" id="CVE-2025-14819" title="CVE-2025-14819" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="curl" epoch="0" version="8.0.1" release="16.red80" arch="x86_64" src="curl-8.0.1-16.red80.src.rpm">
					<filename>curl-0:8.0.1-16.red80.x86_64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="8.0.1" release="16.red80" arch="x86_64" src="curl-8.0.1-16.red80.src.rpm">
					<filename>libcurl-0:8.0.1-16.red80.x86_64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="8.0.1" release="16.red80" arch="x86_64" src="curl-8.0.1-16.red80.src.rpm">
					<filename>libcurl-devel-0:8.0.1-16.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="curl" epoch="0" version="8.0.1" release="16.red80" arch="aarch64" src="curl-8.0.1-16.red80.src.rpm">
					<filename>curl-0:8.0.1-16.red80.aarch64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="8.0.1" release="16.red80" arch="aarch64" src="curl-8.0.1-16.red80.src.rpm">
					<filename>libcurl-0:8.0.1-16.red80.aarch64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="8.0.1" release="16.red80" arch="aarch64" src="curl-8.0.1-16.red80.src.rpm">
					<filename>libcurl-devel-0:8.0.1-16.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0044</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67857-8.0/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67857-8.0/" type="self" id="ROS-20260224-80-0044" title="ROS-20260224-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67857" type="cve" id="CVE-2025-67857" title="CVE-2025-67857" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.red80" arch="noarch" src="moodle-5.1.1-1.red80.src.rpm">
					<filename>moodle-0:5.1.1-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0045</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67848-8.0/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67848-8.0/" type="self" id="ROS-20260224-80-0045" title="ROS-20260224-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67848" type="cve" id="CVE-2025-67848" title="CVE-2025-67848" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.red80" arch="noarch" src="moodle-5.1.1-1.red80.src.rpm">
					<filename>moodle-0:5.1.1-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0046</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67851-8.0/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67851-8.0/" type="self" id="ROS-20260224-80-0046" title="ROS-20260224-80-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67851" type="cve" id="CVE-2025-67851" title="CVE-2025-67851" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.red80" arch="noarch" src="moodle-5.1.1-1.red80.src.rpm">
					<filename>moodle-0:5.1.1-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0047</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67853-8.0/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67853-8.0/" type="self" id="ROS-20260224-80-0047" title="ROS-20260224-80-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67853" type="cve" id="CVE-2025-67853" title="CVE-2025-67853" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.red80" arch="noarch" src="moodle-5.1.1-1.red80.src.rpm">
					<filename>moodle-0:5.1.1-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0048</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67855-8.0/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67855-8.0/" type="self" id="ROS-20260224-80-0048" title="ROS-20260224-80-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67855" type="cve" id="CVE-2025-67855" title="CVE-2025-67855" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.red80" arch="noarch" src="moodle-5.1.1-1.red80.src.rpm">
					<filename>moodle-0:5.1.1-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0049</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67852-8.0/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67852-8.0/" type="self" id="ROS-20260224-80-0049" title="ROS-20260224-80-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67852" type="cve" id="CVE-2025-67852" title="CVE-2025-67852" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.red80" arch="noarch" src="moodle-5.1.1-1.red80.src.rpm">
					<filename>moodle-0:5.1.1-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0050</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67856-8.0/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67856-8.0/" type="self" id="ROS-20260224-80-0050" title="ROS-20260224-80-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67856" type="cve" id="CVE-2025-67856" title="CVE-2025-67856" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.red80" arch="noarch" src="moodle-5.1.1-1.red80.src.rpm">
					<filename>moodle-0:5.1.1-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0051</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67849-8.0/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67849-8.0/" type="self" id="ROS-20260224-80-0051" title="ROS-20260224-80-0051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67849" type="cve" id="CVE-2025-67849" title="CVE-2025-67849" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.red80" arch="noarch" src="moodle-5.1.1-1.red80.src.rpm">
					<filename>moodle-0:5.1.1-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0052</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67850-8.0/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67850-8.0/" type="self" id="ROS-20260224-80-0052" title="ROS-20260224-80-0052" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67850" type="cve" id="CVE-2025-67850" title="CVE-2025-67850" />
			<reference href="https://bdu.fstec.ru/vul/2025-11660" type="self" id="BDU:2025-11660" title="BDU:2025-11660" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.red80" arch="noarch" src="moodle-5.1.1-1.red80.src.rpm">
					<filename>moodle-0:5.1.1-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0053</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость moodle </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в moodle</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67847-8.0/</description>
               <solution>Установить обновление для пакета(ов) moodle
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-moodle-cve-2025-67847-8.0/" type="self" id="ROS-20260224-80-0053" title="ROS-20260224-80-0053" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67847" type="cve" id="CVE-2025-67847" title="CVE-2025-67847" />
			<reference href="https://bdu.fstec.ru/vul/2026-00821" type="self" id="BDU:2026-00821" title="BDU:2026-00821" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="moodle" epoch="0" version="5.1.1" release="1.red80" arch="noarch" src="moodle-5.1.1-1.red80.src.rpm">
					<filename>moodle-0:5.1.1-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0054</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-django-cve-2026-1312-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-django-cve-2026-1312-8.0/" type="self" id="ROS-20260224-80-0054" title="ROS-20260224-80-0054" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1312" type="cve" id="CVE-2026-1312" title="CVE-2026-1312" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.28" release="1.red80" arch="noarch" src="python-django-4.2.28-1.red80.src.rpm">
					<filename>python-django-bash-completion-0:4.2.28-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.28" release="1.red80" arch="noarch" src="python-django-4.2.28-1.red80.src.rpm">
					<filename>python3-django-0:4.2.28-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.28" release="1.red80" arch="noarch" src="python-django-4.2.28-1.red80.src.rpm">
					<filename>python3-django-doc-0:4.2.28-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0055</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2026-20912-8.0/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2026-20912-8.0/" type="self" id="ROS-20260224-80-0055" title="ROS-20260224-80-0055" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20912" type="cve" id="CVE-2026-20912" title="CVE-2026-20912" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.red80" arch="x86_64" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-0:1.25.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.red80" arch="aarch64" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-0:1.25.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="gitea-docs" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-docs-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-fish-completion-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0056</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2026-20904-8.0/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2026-20904-8.0/" type="self" id="ROS-20260224-80-0056" title="ROS-20260224-80-0056" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20904" type="cve" id="CVE-2026-20904" title="CVE-2026-20904" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.red80" arch="x86_64" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-0:1.25.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.red80" arch="aarch64" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-0:1.25.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="gitea-docs" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-docs-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-fish-completion-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0057</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2026-20888-8.0/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2026-20888-8.0/" type="self" id="ROS-20260224-80-0057" title="ROS-20260224-80-0057" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20888" type="cve" id="CVE-2026-20888" title="CVE-2026-20888" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.red80" arch="x86_64" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-0:1.25.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.red80" arch="aarch64" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-0:1.25.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="gitea-docs" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-docs-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-fish-completion-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0058</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2026-20883-8.0/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2026-20883-8.0/" type="self" id="ROS-20260224-80-0058" title="ROS-20260224-80-0058" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20883" type="cve" id="CVE-2026-20883" title="CVE-2026-20883" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.red80" arch="x86_64" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-0:1.25.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.red80" arch="aarch64" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-0:1.25.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="gitea-docs" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-docs-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-fish-completion-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0059</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2026-20736-8.0/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2026-20736-8.0/" type="self" id="ROS-20260224-80-0059" title="ROS-20260224-80-0059" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20736" type="cve" id="CVE-2026-20736" title="CVE-2026-20736" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.red80" arch="x86_64" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-0:1.25.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.red80" arch="aarch64" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-0:1.25.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="gitea-docs" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-docs-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-fish-completion-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0060</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2026-20897-8.0/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2026-20897-8.0/" type="self" id="ROS-20260224-80-0060" title="ROS-20260224-80-0060" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20897" type="cve" id="CVE-2026-20897" title="CVE-2026-20897" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.red80" arch="x86_64" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-0:1.25.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.red80" arch="aarch64" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-0:1.25.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="gitea-docs" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-docs-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-fish-completion-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0061</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2026-0798-8.0/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2026-0798-8.0/" type="self" id="ROS-20260224-80-0061" title="ROS-20260224-80-0061" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0798" type="cve" id="CVE-2026-0798" title="CVE-2026-0798" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.red80" arch="x86_64" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-0:1.25.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.red80" arch="aarch64" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-0:1.25.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="gitea-docs" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-docs-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-fish-completion-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0062</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2026-20750-8.0/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2026-20750-8.0/" type="self" id="ROS-20260224-80-0062" title="ROS-20260224-80-0062" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20750" type="cve" id="CVE-2026-20750" title="CVE-2026-20750" />
			<reference href="https://bdu.fstec.ru/vul/2026-01994" type="self" id="BDU:2026-01994" title="BDU:2026-01994" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.red80" arch="x86_64" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-0:1.25.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.red80" arch="aarch64" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-0:1.25.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="gitea-docs" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-docs-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-fish-completion-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260224-80-0063</id>
		<issued date="2026-02-24" />
		<updated date="2026-02-24" />
		<title>Уязвимость gitea </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gitea</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2026-20800-8.0/</description>
               <solution>Установить обновление для пакета(ов) gitea
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gitea-cve-2026-20800-8.0/" type="self" id="ROS-20260224-80-0063" title="ROS-20260224-80-0063" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20800" type="cve" id="CVE-2026-20800" title="CVE-2026-20800" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.red80" arch="x86_64" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-0:1.25.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gitea" epoch="0" version="1.25.4" release="1.red80" arch="aarch64" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-0:1.25.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="gitea-docs" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-docs-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-fish-completion" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-fish-completion-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
				<package name="gitea-zsh-completion" epoch="0" version="1.25.4" release="1.red80" arch="noarch" src="gitea-1.25.4-1.red80.src.rpm">
					<filename>gitea-zsh-completion-0:1.25.4-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0001</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38102-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38102-8.0/" type="self" id="ROS-20260304-80-0001" title="ROS-20260304-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38102" type="cve" id="CVE-2025-38102" title="CVE-2025-38102" />
			<reference href="https://bdu.fstec.ru/vul/2025-10781" type="self" id="BDU:2025-10781" title="BDU:2025-10781" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0002</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38103-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38103-8.0/" type="self" id="ROS-20260304-80-0002" title="ROS-20260304-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38103" type="cve" id="CVE-2025-38103" title="CVE-2025-38103" />
			<reference href="https://bdu.fstec.ru/vul/2025-10779" type="self" id="BDU:2025-10779" title="BDU:2025-10779" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0003</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38106-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38106-8.0/" type="self" id="ROS-20260304-80-0003" title="ROS-20260304-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38106" type="cve" id="CVE-2025-38106" title="CVE-2025-38106" />
			<reference href="https://bdu.fstec.ru/vul/2025-08997" type="self" id="BDU:2025-08997" title="BDU:2025-08997" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0004</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38107-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38107-8.0/" type="self" id="ROS-20260304-80-0004" title="ROS-20260304-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38107" type="cve" id="CVE-2025-38107" title="CVE-2025-38107" />
			<reference href="https://bdu.fstec.ru/vul/2025-10783" type="self" id="BDU:2025-10783" title="BDU:2025-10783" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0005</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38108-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38108-8.0/" type="self" id="ROS-20260304-80-0005" title="ROS-20260304-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38108" type="cve" id="CVE-2025-38108" title="CVE-2025-38108" />
			<reference href="https://bdu.fstec.ru/vul/2025-10774" type="self" id="BDU:2025-10774" title="BDU:2025-10774" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0006</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38109-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38109-8.0/" type="self" id="ROS-20260304-80-0006" title="ROS-20260304-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38109" type="cve" id="CVE-2025-38109" title="CVE-2025-38109" />
			<reference href="https://bdu.fstec.ru/vul/2025-10775" type="self" id="BDU:2025-10775" title="BDU:2025-10775" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0007</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38110-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38110-8.0/" type="self" id="ROS-20260304-80-0007" title="ROS-20260304-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38110" type="cve" id="CVE-2025-38110" title="CVE-2025-38110" />
			<reference href="https://bdu.fstec.ru/vul/2025-09684" type="self" id="BDU:2025-09684" title="BDU:2025-09684" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0008</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38111-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38111-8.0/" type="self" id="ROS-20260304-80-0008" title="ROS-20260304-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38111" type="cve" id="CVE-2025-38111" title="CVE-2025-38111" />
			<reference href="https://bdu.fstec.ru/vul/2025-10777" type="self" id="BDU:2025-10777" title="BDU:2025-10777" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0009</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38112-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38112-8.0/" type="self" id="ROS-20260304-80-0009" title="ROS-20260304-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38112" type="cve" id="CVE-2025-38112" title="CVE-2025-38112" />
			<reference href="https://bdu.fstec.ru/vul/2025-10773" type="self" id="BDU:2025-10773" title="BDU:2025-10773" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0010</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38113-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38113-8.0/" type="self" id="ROS-20260304-80-0010" title="ROS-20260304-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38113" type="cve" id="CVE-2025-38113" title="CVE-2025-38113" />
			<reference href="https://bdu.fstec.ru/vul/2025-10778" type="self" id="BDU:2025-10778" title="BDU:2025-10778" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0011</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38115-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38115-8.0/" type="self" id="ROS-20260304-80-0011" title="ROS-20260304-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38115" type="cve" id="CVE-2025-38115" title="CVE-2025-38115" />
			<reference href="https://bdu.fstec.ru/vul/2025-10780" type="self" id="BDU:2025-10780" title="BDU:2025-10780" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0012</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38118-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38118-8.0/" type="self" id="ROS-20260304-80-0012" title="ROS-20260304-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38118" type="cve" id="CVE-2025-38118" title="CVE-2025-38118" />
			<reference href="https://bdu.fstec.ru/vul/2025-09003" type="self" id="BDU:2025-09003" title="BDU:2025-09003" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0013</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38119-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38119-8.0/" type="self" id="ROS-20260304-80-0013" title="ROS-20260304-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38119" type="cve" id="CVE-2025-38119" title="CVE-2025-38119" />
			<reference href="https://bdu.fstec.ru/vul/2025-09002" type="self" id="BDU:2025-09002" title="BDU:2025-09002" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0014</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38120-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38120-8.0/" type="self" id="ROS-20260304-80-0014" title="ROS-20260304-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38120" type="cve" id="CVE-2025-38120" title="CVE-2025-38120" />
			<reference href="https://bdu.fstec.ru/vul/2025-10784" type="self" id="BDU:2025-10784" title="BDU:2025-10784" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0015</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38122-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38122-8.0/" type="self" id="ROS-20260304-80-0015" title="ROS-20260304-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38122" type="cve" id="CVE-2025-38122" title="CVE-2025-38122" />
			<reference href="https://bdu.fstec.ru/vul/2025-09004" type="self" id="BDU:2025-09004" title="BDU:2025-09004" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0016</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38123-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38123-8.0/" type="self" id="ROS-20260304-80-0016" title="ROS-20260304-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38123" type="cve" id="CVE-2025-38123" title="CVE-2025-38123" />
			<reference href="https://bdu.fstec.ru/vul/2025-09001" type="self" id="BDU:2025-09001" title="BDU:2025-09001" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0017</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38124-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38124-8.0/" type="self" id="ROS-20260304-80-0017" title="ROS-20260304-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38124" type="cve" id="CVE-2025-38124" title="CVE-2025-38124" />
			<reference href="https://bdu.fstec.ru/vul/2025-09605" type="self" id="BDU:2025-09605" title="BDU:2025-09605" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0018</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38126-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38126-8.0/" type="self" id="ROS-20260304-80-0018" title="ROS-20260304-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38126" type="cve" id="CVE-2025-38126" title="CVE-2025-38126" />
			<reference href="https://bdu.fstec.ru/vul/2025-09823" type="self" id="BDU:2025-09823" title="BDU:2025-09823" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0019</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38131-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38131-8.0/" type="self" id="ROS-20260304-80-0019" title="ROS-20260304-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38131" type="cve" id="CVE-2025-38131" title="CVE-2025-38131" />
			<reference href="https://bdu.fstec.ru/vul/2025-09615" type="self" id="BDU:2025-09615" title="BDU:2025-09615" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0020</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38134-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38134-8.0/" type="self" id="ROS-20260304-80-0020" title="ROS-20260304-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38134" type="cve" id="CVE-2025-38134" title="CVE-2025-38134" />
			<reference href="https://bdu.fstec.ru/vul/2025-09627" type="self" id="BDU:2025-09627" title="BDU:2025-09627" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0021</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38135-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38135-8.0/" type="self" id="ROS-20260304-80-0021" title="ROS-20260304-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38135" type="cve" id="CVE-2025-38135" title="CVE-2025-38135" />
			<reference href="https://bdu.fstec.ru/vul/2025-09630" type="self" id="BDU:2025-09630" title="BDU:2025-09630" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0022</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38136-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38136-8.0/" type="self" id="ROS-20260304-80-0022" title="ROS-20260304-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38136" type="cve" id="CVE-2025-38136" title="CVE-2025-38136" />
			<reference href="https://bdu.fstec.ru/vul/2025-09631" type="self" id="BDU:2025-09631" title="BDU:2025-09631" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0023</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38138-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38138-8.0/" type="self" id="ROS-20260304-80-0023" title="ROS-20260304-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38138" type="cve" id="CVE-2025-38138" title="CVE-2025-38138" />
			<reference href="https://bdu.fstec.ru/vul/2025-09632" type="self" id="BDU:2025-09632" title="BDU:2025-09632" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0024</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38139-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38139-8.0/" type="self" id="ROS-20260304-80-0024" title="ROS-20260304-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38139" type="cve" id="CVE-2025-38139" title="CVE-2025-38139" />
			<reference href="https://bdu.fstec.ru/vul/2025-09634" type="self" id="BDU:2025-09634" title="BDU:2025-09634" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0025</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38141-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38141-8.0/" type="self" id="ROS-20260304-80-0025" title="ROS-20260304-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38141" type="cve" id="CVE-2025-38141" title="CVE-2025-38141" />
			<reference href="https://bdu.fstec.ru/vul/2025-09635" type="self" id="BDU:2025-09635" title="BDU:2025-09635" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0026</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38142-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38142-8.0/" type="self" id="ROS-20260304-80-0026" title="ROS-20260304-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38142" type="cve" id="CVE-2025-38142" title="CVE-2025-38142" />
			<reference href="https://bdu.fstec.ru/vul/2025-09636" type="self" id="BDU:2025-09636" title="BDU:2025-09636" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0027</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38143-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38143-8.0/" type="self" id="ROS-20260304-80-0027" title="ROS-20260304-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38143" type="cve" id="CVE-2025-38143" title="CVE-2025-38143" />
			<reference href="https://bdu.fstec.ru/vul/2025-09638" type="self" id="BDU:2025-09638" title="BDU:2025-09638" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0028</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38145-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38145-8.0/" type="self" id="ROS-20260304-80-0028" title="ROS-20260304-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38145" type="cve" id="CVE-2025-38145" title="CVE-2025-38145" />
			<reference href="https://bdu.fstec.ru/vul/2025-09824" type="self" id="BDU:2025-09824" title="BDU:2025-09824" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0029</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38146-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38146-8.0/" type="self" id="ROS-20260304-80-0029" title="ROS-20260304-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38146" type="cve" id="CVE-2025-38146" title="CVE-2025-38146" />
			<reference href="https://bdu.fstec.ru/vul/2025-09609" type="self" id="BDU:2025-09609" title="BDU:2025-09609" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0030</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38148-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38148-8.0/" type="self" id="ROS-20260304-80-0030" title="ROS-20260304-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38148" type="cve" id="CVE-2025-38148" title="CVE-2025-38148" />
			<reference href="https://bdu.fstec.ru/vul/2025-09641" type="self" id="BDU:2025-09641" title="BDU:2025-09641" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0031</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38147-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38147-8.0/" type="self" id="ROS-20260304-80-0031" title="ROS-20260304-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38147" type="cve" id="CVE-2025-38147" title="CVE-2025-38147" />
			<reference href="https://bdu.fstec.ru/vul/2025-09640" type="self" id="BDU:2025-09640" title="BDU:2025-09640" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0032</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38149-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38149-8.0/" type="self" id="ROS-20260304-80-0032" title="ROS-20260304-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38149" type="cve" id="CVE-2025-38149" title="CVE-2025-38149" />
			<reference href="https://bdu.fstec.ru/vul/2025-09611" type="self" id="BDU:2025-09611" title="BDU:2025-09611" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0033</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38225-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38225-8.0/" type="self" id="ROS-20260304-80-0033" title="ROS-20260304-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38225" type="cve" id="CVE-2025-38225" title="CVE-2025-38225" />
			<reference href="https://bdu.fstec.ru/vul/2025-13479" type="self" id="BDU:2025-13479" title="BDU:2025-13479" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0034</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38226-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38226-8.0/" type="self" id="ROS-20260304-80-0034" title="ROS-20260304-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38226" type="cve" id="CVE-2025-38226" title="CVE-2025-38226" />
			<reference href="https://bdu.fstec.ru/vul/2025-13484" type="self" id="BDU:2025-13484" title="BDU:2025-13484" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0035</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38227-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38227-8.0/" type="self" id="ROS-20260304-80-0035" title="ROS-20260304-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38227" type="cve" id="CVE-2025-38227" title="CVE-2025-38227" />
			<reference href="https://bdu.fstec.ru/vul/2025-13485" type="self" id="BDU:2025-13485" title="BDU:2025-13485" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0036</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38228-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38228-8.0/" type="self" id="ROS-20260304-80-0036" title="ROS-20260304-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38228" type="cve" id="CVE-2025-38228" title="CVE-2025-38228" />
			<reference href="https://bdu.fstec.ru/vul/2025-13480" type="self" id="BDU:2025-13480" title="BDU:2025-13480" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0037</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38229-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38229-8.0/" type="self" id="ROS-20260304-80-0037" title="ROS-20260304-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38229" type="cve" id="CVE-2025-38229" title="CVE-2025-38229" />
			<reference href="https://bdu.fstec.ru/vul/2025-10770" type="self" id="BDU:2025-10770" title="BDU:2025-10770" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0038</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38230-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38230-8.0/" type="self" id="ROS-20260304-80-0038" title="ROS-20260304-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38230" type="cve" id="CVE-2025-38230" title="CVE-2025-38230" />
			<reference href="https://bdu.fstec.ru/vul/2025-13486" type="self" id="BDU:2025-13486" title="BDU:2025-13486" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0039</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38231-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38231-8.0/" type="self" id="ROS-20260304-80-0039" title="ROS-20260304-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38231" type="cve" id="CVE-2025-38231" title="CVE-2025-38231" />
			<reference href="https://bdu.fstec.ru/vul/2025-10772" type="self" id="BDU:2025-10772" title="BDU:2025-10772" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0040</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38239-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38239-8.0/" type="self" id="ROS-20260304-80-0040" title="ROS-20260304-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38239" type="cve" id="CVE-2025-38239" title="CVE-2025-38239" />
			<reference href="https://bdu.fstec.ru/vul/2025-10755" type="self" id="BDU:2025-10755" title="BDU:2025-10755" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0041</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38242-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38242-8.0/" type="self" id="ROS-20260304-80-0041" title="ROS-20260304-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38242" type="cve" id="CVE-2025-38242" title="CVE-2025-38242" />
			<reference href="https://bdu.fstec.ru/vul/2025-09166" type="self" id="BDU:2025-09166" title="BDU:2025-09166" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0042</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38245-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38245-8.0/" type="self" id="ROS-20260304-80-0042" title="ROS-20260304-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38245" type="cve" id="CVE-2025-38245" title="CVE-2025-38245" />
			<reference href="https://bdu.fstec.ru/vul/2025-08803" type="self" id="BDU:2025-08803" title="BDU:2025-08803" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0043</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38249-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38249-8.0/" type="self" id="ROS-20260304-80-0043" title="ROS-20260304-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38249" type="cve" id="CVE-2025-38249" title="CVE-2025-38249" />
			<reference href="https://bdu.fstec.ru/vul/2025-09576" type="self" id="BDU:2025-09576" title="BDU:2025-09576" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0044</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38251-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38251-8.0/" type="self" id="ROS-20260304-80-0044" title="ROS-20260304-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38251" type="cve" id="CVE-2025-38251" title="CVE-2025-38251" />
			<reference href="https://bdu.fstec.ru/vul/2025-10749" type="self" id="BDU:2025-10749" title="BDU:2025-10749" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0045</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38253-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38253-8.0/" type="self" id="ROS-20260304-80-0045" title="ROS-20260304-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38253" type="cve" id="CVE-2025-38253" title="CVE-2025-38253" />
			<reference href="https://bdu.fstec.ru/vul/2025-10750" type="self" id="BDU:2025-10750" title="BDU:2025-10750" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0046</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38255-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38255-8.0/" type="self" id="ROS-20260304-80-0046" title="ROS-20260304-80-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38255" type="cve" id="CVE-2025-38255" title="CVE-2025-38255" />
			<reference href="https://bdu.fstec.ru/vul/2025-10751" type="self" id="BDU:2025-10751" title="BDU:2025-10751" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0047</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38256-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38256-8.0/" type="self" id="ROS-20260304-80-0047" title="ROS-20260304-80-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38256" type="cve" id="CVE-2025-38256" title="CVE-2025-38256" />
			<reference href="https://bdu.fstec.ru/vul/2025-10754" type="self" id="BDU:2025-10754" title="BDU:2025-10754" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0048</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38257-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38257-8.0/" type="self" id="ROS-20260304-80-0048" title="ROS-20260304-80-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38257" type="cve" id="CVE-2025-38257" title="CVE-2025-38257" />
			<reference href="https://bdu.fstec.ru/vul/2025-10752" type="self" id="BDU:2025-10752" title="BDU:2025-10752" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0049</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38258-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38258-8.0/" type="self" id="ROS-20260304-80-0049" title="ROS-20260304-80-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38258" type="cve" id="CVE-2025-38258" title="CVE-2025-38258" />
			<reference href="https://bdu.fstec.ru/vul/2025-10753" type="self" id="BDU:2025-10753" title="BDU:2025-10753" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260304-80-0050</id>
		<issued date="2026-03-04" />
		<updated date="2026-03-04" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38259-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38259-8.0/" type="self" id="ROS-20260304-80-0050" title="ROS-20260304-80-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38259" type="cve" id="CVE-2025-38259" title="CVE-2025-38259" />
			<reference href="https://bdu.fstec.ru/vul/2025-13465" type="self" id="BDU:2025-13465" title="BDU:2025-13465" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0001</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37946-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37946-8.0/" type="self" id="ROS-20260306-80-0001" title="ROS-20260306-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37946" type="cve" id="CVE-2025-37946" title="CVE-2025-37946" />
			<reference href="https://bdu.fstec.ru/vul/2025-12067" type="self" id="BDU:2025-12067" title="BDU:2025-12067" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0002</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38267-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38267-8.0/" type="self" id="ROS-20260306-80-0002" title="ROS-20260306-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38267" type="cve" id="CVE-2025-38267" title="CVE-2025-38267" />
			<reference href="https://bdu.fstec.ru/vul/2025-09681" type="self" id="BDU:2025-09681" title="BDU:2025-09681" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0003</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38268-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38268-8.0/" type="self" id="ROS-20260306-80-0003" title="ROS-20260306-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38268" type="cve" id="CVE-2025-38268" title="CVE-2025-38268" />
			<reference href="https://bdu.fstec.ru/vul/2025-09676" type="self" id="BDU:2025-09676" title="BDU:2025-09676" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0004</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38270-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38270-8.0/" type="self" id="ROS-20260306-80-0004" title="ROS-20260306-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38270" type="cve" id="CVE-2025-38270" title="CVE-2025-38270" />
			<reference href="https://bdu.fstec.ru/vul/2025-09521" type="self" id="BDU:2025-09521" title="BDU:2025-09521" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0005</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38274-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38274-8.0/" type="self" id="ROS-20260306-80-0005" title="ROS-20260306-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38274" type="cve" id="CVE-2025-38274" title="CVE-2025-38274" />
			<reference href="https://bdu.fstec.ru/vul/2025-10314" type="self" id="BDU:2025-10314" title="BDU:2025-10314" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0006</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38275-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38275-8.0/" type="self" id="ROS-20260306-80-0006" title="ROS-20260306-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38275" type="cve" id="CVE-2025-38275" title="CVE-2025-38275" />
			<reference href="https://bdu.fstec.ru/vul/2025-09522" type="self" id="BDU:2025-09522" title="BDU:2025-09522" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0007</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38277-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38277-8.0/" type="self" id="ROS-20260306-80-0007" title="ROS-20260306-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38277" type="cve" id="CVE-2025-38277" title="CVE-2025-38277" />
			<reference href="https://bdu.fstec.ru/vul/2025-10310" type="self" id="BDU:2025-10310" title="BDU:2025-10310" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0008</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38278-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38278-8.0/" type="self" id="ROS-20260306-80-0008" title="ROS-20260306-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38278" type="cve" id="CVE-2025-38278" title="CVE-2025-38278" />
			<reference href="https://bdu.fstec.ru/vul/2025-09679" type="self" id="BDU:2025-09679" title="BDU:2025-09679" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0009</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38279-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38279-8.0/" type="self" id="ROS-20260306-80-0009" title="ROS-20260306-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38279" type="cve" id="CVE-2025-38279" title="CVE-2025-38279" />
			<reference href="https://bdu.fstec.ru/vul/2025-09677" type="self" id="BDU:2025-09677" title="BDU:2025-09677" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0010</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38280-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38280-8.0/" type="self" id="ROS-20260306-80-0010" title="ROS-20260306-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38280" type="cve" id="CVE-2025-38280" title="CVE-2025-38280" />
			<reference href="https://bdu.fstec.ru/vul/2025-09683" type="self" id="BDU:2025-09683" title="BDU:2025-09683" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0011</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38282-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38282-8.0/" type="self" id="ROS-20260306-80-0011" title="ROS-20260306-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38282" type="cve" id="CVE-2025-38282" title="CVE-2025-38282" />
			<reference href="https://bdu.fstec.ru/vul/2025-09675" type="self" id="BDU:2025-09675" title="BDU:2025-09675" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0012</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38285-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38285-8.0/" type="self" id="ROS-20260306-80-0012" title="ROS-20260306-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38285" type="cve" id="CVE-2025-38285" title="CVE-2025-38285" />
			<reference href="https://bdu.fstec.ru/vul/2025-08622" type="self" id="BDU:2025-08622" title="BDU:2025-08622" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0013</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38286-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38286-8.0/" type="self" id="ROS-20260306-80-0013" title="ROS-20260306-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38286" type="cve" id="CVE-2025-38286" title="CVE-2025-38286" />
			<reference href="https://bdu.fstec.ru/vul/2025-10311" type="self" id="BDU:2025-10311" title="BDU:2025-10311" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0014</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38288-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38288-8.0/" type="self" id="ROS-20260306-80-0014" title="ROS-20260306-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38288" type="cve" id="CVE-2025-38288" title="CVE-2025-38288" />
			<reference href="https://bdu.fstec.ru/vul/2025-08628" type="self" id="BDU:2025-08628" title="BDU:2025-08628" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0015</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38289-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38289-8.0/" type="self" id="ROS-20260306-80-0015" title="ROS-20260306-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38289" type="cve" id="CVE-2025-38289" title="CVE-2025-38289" />
			<reference href="https://bdu.fstec.ru/vul/2025-08507" type="self" id="BDU:2025-08507" title="BDU:2025-08507" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0016</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38290-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38290-8.0/" type="self" id="ROS-20260306-80-0016" title="ROS-20260306-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38290" type="cve" id="CVE-2025-38290" title="CVE-2025-38290" />
			<reference href="https://bdu.fstec.ru/vul/2025-08629" type="self" id="BDU:2025-08629" title="BDU:2025-08629" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0017</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38292-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38292-8.0/" type="self" id="ROS-20260306-80-0017" title="ROS-20260306-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38292" type="cve" id="CVE-2025-38292" title="CVE-2025-38292" />
			<reference href="https://bdu.fstec.ru/vul/2025-08632" type="self" id="BDU:2025-08632" title="BDU:2025-08632" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0018</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38293-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38293-8.0/" type="self" id="ROS-20260306-80-0018" title="ROS-20260306-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38293" type="cve" id="CVE-2025-38293" title="CVE-2025-38293" />
			<reference href="https://bdu.fstec.ru/vul/2025-08509" type="self" id="BDU:2025-08509" title="BDU:2025-08509" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0019</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38295-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38295-8.0/" type="self" id="ROS-20260306-80-0019" title="ROS-20260306-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38295" type="cve" id="CVE-2025-38295" title="CVE-2025-38295" />
			<reference href="https://bdu.fstec.ru/vul/2025-08627" type="self" id="BDU:2025-08627" title="BDU:2025-08627" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0020</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38297-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38297-8.0/" type="self" id="ROS-20260306-80-0020" title="ROS-20260306-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38297" type="cve" id="CVE-2025-38297" title="CVE-2025-38297" />
			<reference href="https://bdu.fstec.ru/vul/2025-08626" type="self" id="BDU:2025-08626" title="BDU:2025-08626" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0021</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38298-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38298-8.0/" type="self" id="ROS-20260306-80-0021" title="ROS-20260306-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38298" type="cve" id="CVE-2025-38298" title="CVE-2025-38298" />
			<reference href="https://bdu.fstec.ru/vul/2025-13454" type="self" id="BDU:2025-13454" title="BDU:2025-13454" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0022</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38299-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38299-8.0/" type="self" id="ROS-20260306-80-0022" title="ROS-20260306-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38299" type="cve" id="CVE-2025-38299" title="CVE-2025-38299" />
			<reference href="https://bdu.fstec.ru/vul/2025-08508" type="self" id="BDU:2025-08508" title="BDU:2025-08508" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0023</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38300-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38300-8.0/" type="self" id="ROS-20260306-80-0023" title="ROS-20260306-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38300" type="cve" id="CVE-2025-38300" title="CVE-2025-38300" />
			<reference href="https://bdu.fstec.ru/vul/2025-08510" type="self" id="BDU:2025-08510" title="BDU:2025-08510" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0024</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38301-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38301-8.0/" type="self" id="ROS-20260306-80-0024" title="ROS-20260306-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38301" type="cve" id="CVE-2025-38301" title="CVE-2025-38301" />
			<reference href="https://bdu.fstec.ru/vul/2025-11762" type="self" id="BDU:2025-11762" title="BDU:2025-11762" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0025</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38302-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38302-8.0/" type="self" id="ROS-20260306-80-0025" title="ROS-20260306-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38302" type="cve" id="CVE-2025-38302" title="CVE-2025-38302" />
			<reference href="https://bdu.fstec.ru/vul/2025-10740" type="self" id="BDU:2025-10740" title="BDU:2025-10740" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0026</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38304-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38304-8.0/" type="self" id="ROS-20260306-80-0026" title="ROS-20260306-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38304" type="cve" id="CVE-2025-38304" title="CVE-2025-38304" />
			<reference href="https://bdu.fstec.ru/vul/2025-08927" type="self" id="BDU:2025-08927" title="BDU:2025-08927" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0027</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38305-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38305-8.0/" type="self" id="ROS-20260306-80-0027" title="ROS-20260306-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38305" type="cve" id="CVE-2025-38305" title="CVE-2025-38305" />
			<reference href="https://bdu.fstec.ru/vul/2025-10739" type="self" id="BDU:2025-10739" title="BDU:2025-10739" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0028</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38306-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38306-8.0/" type="self" id="ROS-20260306-80-0028" title="ROS-20260306-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38306" type="cve" id="CVE-2025-38306" title="CVE-2025-38306" />
			<reference href="https://bdu.fstec.ru/vul/2025-10738" type="self" id="BDU:2025-10738" title="BDU:2025-10738" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0029</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38307-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38307-8.0/" type="self" id="ROS-20260306-80-0029" title="ROS-20260306-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38307" type="cve" id="CVE-2025-38307" title="CVE-2025-38307" />
			<reference href="https://bdu.fstec.ru/vul/2025-09050" type="self" id="BDU:2025-09050" title="BDU:2025-09050" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0030</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38310-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38310-8.0/" type="self" id="ROS-20260306-80-0030" title="ROS-20260306-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38310" type="cve" id="CVE-2025-38310" title="CVE-2025-38310" />
			<reference href="https://bdu.fstec.ru/vul/2025-09047" type="self" id="BDU:2025-09047" title="BDU:2025-09047" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0031</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38312-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38312-8.0/" type="self" id="ROS-20260306-80-0031" title="ROS-20260306-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38312" type="cve" id="CVE-2025-38312" title="CVE-2025-38312" />
			<reference href="https://bdu.fstec.ru/vul/2025-09059" type="self" id="BDU:2025-09059" title="BDU:2025-09059" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0032</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38313-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38313-8.0/" type="self" id="ROS-20260306-80-0032" title="ROS-20260306-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38313" type="cve" id="CVE-2025-38313" title="CVE-2025-38313" />
			<reference href="https://bdu.fstec.ru/vul/2025-08706" type="self" id="BDU:2025-08706" title="BDU:2025-08706" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0033</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38315-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38315-8.0/" type="self" id="ROS-20260306-80-0033" title="ROS-20260306-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38315" type="cve" id="CVE-2025-38315" title="CVE-2025-38315" />
			<reference href="https://bdu.fstec.ru/vul/2025-09063" type="self" id="BDU:2025-09063" title="BDU:2025-09063" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0034</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38317-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38317-8.0/" type="self" id="ROS-20260306-80-0034" title="ROS-20260306-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38317" type="cve" id="CVE-2025-38317" title="CVE-2025-38317" />
			<reference href="https://bdu.fstec.ru/vul/2025-09053" type="self" id="BDU:2025-09053" title="BDU:2025-09053" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0035</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38318-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38318-8.0/" type="self" id="ROS-20260306-80-0035" title="ROS-20260306-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38318" type="cve" id="CVE-2025-38318" title="CVE-2025-38318" />
			<reference href="https://bdu.fstec.ru/vul/2025-09058" type="self" id="BDU:2025-09058" title="BDU:2025-09058" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0036</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38319-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38319-8.0/" type="self" id="ROS-20260306-80-0036" title="ROS-20260306-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38319" type="cve" id="CVE-2025-38319" title="CVE-2025-38319" />
			<reference href="https://bdu.fstec.ru/vul/2025-09048" type="self" id="BDU:2025-09048" title="BDU:2025-09048" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0037</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38320-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38320-8.0/" type="self" id="ROS-20260306-80-0037" title="ROS-20260306-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38320" type="cve" id="CVE-2025-38320" title="CVE-2025-38320" />
			<reference href="https://bdu.fstec.ru/vul/2025-08924" type="self" id="BDU:2025-08924" title="BDU:2025-08924" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0038</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38323-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38323-8.0/" type="self" id="ROS-20260306-80-0038" title="ROS-20260306-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38323" type="cve" id="CVE-2025-38323" title="CVE-2025-38323" />
			<reference href="https://bdu.fstec.ru/vul/2025-10735" type="self" id="BDU:2025-10735" title="BDU:2025-10735" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0039</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38324-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38324-8.0/" type="self" id="ROS-20260306-80-0039" title="ROS-20260306-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38324" type="cve" id="CVE-2025-38324" title="CVE-2025-38324" />
			<reference href="https://bdu.fstec.ru/vul/2025-10737" type="self" id="BDU:2025-10737" title="BDU:2025-10737" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0040</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38326-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38326-8.0/" type="self" id="ROS-20260306-80-0040" title="ROS-20260306-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38326" type="cve" id="CVE-2025-38326" title="CVE-2025-38326" />
			<reference href="https://bdu.fstec.ru/vul/2025-13456" type="self" id="BDU:2025-13456" title="BDU:2025-13456" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0041</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38328-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38328-8.0/" type="self" id="ROS-20260306-80-0041" title="ROS-20260306-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38328" type="cve" id="CVE-2025-38328" title="CVE-2025-38328" />
			<reference href="https://bdu.fstec.ru/vul/2025-13463" type="self" id="BDU:2025-13463" title="BDU:2025-13463" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0042</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38331-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38331-8.0/" type="self" id="ROS-20260306-80-0042" title="ROS-20260306-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38331" type="cve" id="CVE-2025-38331" title="CVE-2025-38331" />
			<reference href="https://bdu.fstec.ru/vul/2025-13459" type="self" id="BDU:2025-13459" title="BDU:2025-13459" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0043</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38332-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38332-8.0/" type="self" id="ROS-20260306-80-0043" title="ROS-20260306-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38332" type="cve" id="CVE-2025-38332" title="CVE-2025-38332" />
			<reference href="https://bdu.fstec.ru/vul/2025-10743" type="self" id="BDU:2025-10743" title="BDU:2025-10743" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0044</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38334-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38334-8.0/" type="self" id="ROS-20260306-80-0044" title="ROS-20260306-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38334" type="cve" id="CVE-2025-38334" title="CVE-2025-38334" />
			<reference href="https://bdu.fstec.ru/vul/2025-10744" type="self" id="BDU:2025-10744" title="BDU:2025-10744" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0045</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38335-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38335-8.0/" type="self" id="ROS-20260306-80-0045" title="ROS-20260306-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38335" type="cve" id="CVE-2025-38335" title="CVE-2025-38335" />
			<reference href="https://bdu.fstec.ru/vul/2025-10745" type="self" id="BDU:2025-10745" title="BDU:2025-10745" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0046</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38336-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38336-8.0/" type="self" id="ROS-20260306-80-0046" title="ROS-20260306-80-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38336" type="cve" id="CVE-2025-38336" title="CVE-2025-38336" />
			<reference href="https://bdu.fstec.ru/vul/2025-10746" type="self" id="BDU:2025-10746" title="BDU:2025-10746" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0047</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38337-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38337-8.0/" type="self" id="ROS-20260306-80-0047" title="ROS-20260306-80-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38337" type="cve" id="CVE-2025-38337" title="CVE-2025-38337" />
			<reference href="https://bdu.fstec.ru/vul/2025-10747" type="self" id="BDU:2025-10747" title="BDU:2025-10747" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0048</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38338-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38338-8.0/" type="self" id="ROS-20260306-80-0048" title="ROS-20260306-80-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38338" type="cve" id="CVE-2025-38338" title="CVE-2025-38338" />
			<reference href="https://bdu.fstec.ru/vul/2025-08794" type="self" id="BDU:2025-08794" title="BDU:2025-08794" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0049</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38341-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38341-8.0/" type="self" id="ROS-20260306-80-0049" title="ROS-20260306-80-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38341" type="cve" id="CVE-2025-38341" title="CVE-2025-38341" />
			<reference href="https://bdu.fstec.ru/vul/2025-08795" type="self" id="BDU:2025-08795" title="BDU:2025-08795" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0050</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38342-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38342-8.0/" type="self" id="ROS-20260306-80-0050" title="ROS-20260306-80-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38342" type="cve" id="CVE-2025-38342" title="CVE-2025-38342" />
			<reference href="https://bdu.fstec.ru/vul/2025-08796" type="self" id="BDU:2025-08796" title="BDU:2025-08796" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260306-80-0051</id>
		<issued date="2026-03-06" />
		<updated date="2026-03-06" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38344-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38344-8.0/" type="self" id="ROS-20260306-80-0051" title="ROS-20260306-80-0051" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38344" type="cve" id="CVE-2025-38344" title="CVE-2025-38344" />
			<reference href="https://bdu.fstec.ru/vul/2025-08802" type="self" id="BDU:2025-08802" title="BDU:2025-08802" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0001</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость libsndfile </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libsndfile</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libsndfile-cve-2024-11403-8.0/</description>
               <solution>Установить обновление для пакета(ов) libsndfile
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libsndfile-cve-2024-11403-8.0/" type="self" id="ROS-20260310-80-0001" title="ROS-20260310-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11403" type="cve" id="CVE-2024-11403" title="CVE-2024-11403" />
			<reference href="https://bdu.fstec.ru/vul/2024-10890" type="self" id="BDU:2024-10890" title="BDU:2024-10890" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libsndfile" epoch="0" version="1.1.0" release="5.red80" arch="x86_64" src="libsndfile-1.1.0-5.red80.src.rpm">
					<filename>libsndfile-0:1.1.0-5.red80.x86_64.rpm</filename>
				</package>
				<package name="libsndfile-devel" epoch="0" version="1.1.0" release="5.red80" arch="x86_64" src="libsndfile-1.1.0-5.red80.src.rpm">
					<filename>libsndfile-devel-0:1.1.0-5.red80.x86_64.rpm</filename>
				</package>
				<package name="libsndfile-utils" epoch="0" version="1.1.0" release="5.red80" arch="x86_64" src="libsndfile-1.1.0-5.red80.src.rpm">
					<filename>libsndfile-utils-0:1.1.0-5.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libsndfile" epoch="0" version="1.1.0" release="5.red80" arch="aarch64" src="libsndfile-1.1.0-5.red80.src.rpm">
					<filename>libsndfile-0:1.1.0-5.red80.aarch64.rpm</filename>
				</package>
				<package name="libsndfile-devel" epoch="0" version="1.1.0" release="5.red80" arch="aarch64" src="libsndfile-1.1.0-5.red80.src.rpm">
					<filename>libsndfile-devel-0:1.1.0-5.red80.aarch64.rpm</filename>
				</package>
				<package name="libsndfile-utils" epoch="0" version="1.1.0" release="5.red80" arch="aarch64" src="libsndfile-1.1.0-5.red80.src.rpm">
					<filename>libsndfile-utils-0:1.1.0-5.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0002</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость jpegxl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jpegxl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jpegxl-cve-2024-11498-8.0/</description>
               <solution>Установить обновление для пакета(ов) jpegxl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jpegxl-cve-2024-11498-8.0/" type="self" id="ROS-20260310-80-0002" title="ROS-20260310-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11498" type="cve" id="CVE-2024-11498" title="CVE-2024-11498" />
			<reference href="https://bdu.fstec.ru/vul/2024-10487" type="self" id="BDU:2024-10487" title="BDU:2024-10487" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libjxl" epoch="1" version="0.7.0" release="4.red80" arch="x86_64" src="jpegxl-0.7.0-4.red80.src.rpm">
					<filename>libjxl-1:0.7.0-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libjxl" epoch="1" version="0.7.0" release="4.red80" arch="aarch64" src="jpegxl-0.7.0-4.red80.src.rpm">
					<filename>libjxl-1:0.7.0-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0003</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-curl-cve-2024-11053-8.0/</description>
               <solution>Установить обновление для пакета(ов) curl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-curl-cve-2024-11053-8.0/" type="self" id="ROS-20260310-80-0003" title="ROS-20260310-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11053" type="cve" id="CVE-2024-11053" title="CVE-2024-11053" />
			<reference href="https://bdu.fstec.ru/vul/2024-11106" type="self" id="BDU:2024-11106" title="BDU:2024-11106" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="curl" epoch="0" version="8.0.1" release="17.red80" arch="x86_64" src="curl-8.0.1-17.red80.src.rpm">
					<filename>curl-0:8.0.1-17.red80.x86_64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="8.0.1" release="17.red80" arch="x86_64" src="curl-8.0.1-17.red80.src.rpm">
					<filename>libcurl-0:8.0.1-17.red80.x86_64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="8.0.1" release="17.red80" arch="x86_64" src="curl-8.0.1-17.red80.src.rpm">
					<filename>libcurl-devel-0:8.0.1-17.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="curl" epoch="0" version="8.0.1" release="17.red80" arch="aarch64" src="curl-8.0.1-17.red80.src.rpm">
					<filename>curl-0:8.0.1-17.red80.aarch64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="8.0.1" release="17.red80" arch="aarch64" src="curl-8.0.1-17.red80.src.rpm">
					<filename>libcurl-0:8.0.1-17.red80.aarch64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="8.0.1" release="17.red80" arch="aarch64" src="curl-8.0.1-17.red80.src.rpm">
					<filename>libcurl-devel-0:8.0.1-17.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0004</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость mariadb </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mariadb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mariadb-cve-2025-30693-8.0/</description>
               <solution>Установить обновление для пакета(ов) mariadb
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mariadb-cve-2025-30693-8.0/" type="self" id="ROS-20260310-80-0004" title="ROS-20260310-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30693" type="cve" id="CVE-2025-30693" title="CVE-2025-30693" />
			<reference href="https://bdu.fstec.ru/vul/2025-05237" type="self" id="BDU:2025-05237" title="BDU:2025-05237" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="mariadb" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-backup" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-backup-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-common" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-common-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-connect-engine" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-connect-engine-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-cracklib-password-check" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-cracklib-password-check-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-devel" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-devel-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-embedded" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-embedded-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-embedded-devel" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-embedded-devel-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-errmsg" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-errmsg-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-gssapi-server" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-gssapi-server-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-oqgraph-engine" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-oqgraph-engine-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-rocksdb-engine" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-rocksdb-engine-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-s3-engine" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-s3-engine-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-server" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-server-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-server-galera" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-server-galera-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-server-utils" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-server-utils-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-sphinx-engine" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-sphinx-engine-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-test" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-test-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="mariadb" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-backup" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-backup-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-common" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-common-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-connect-engine" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-connect-engine-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-cracklib-password-check" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-cracklib-password-check-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-devel" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-devel-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-embedded" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-embedded-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-embedded-devel" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-embedded-devel-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-errmsg" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-errmsg-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-gssapi-server" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-gssapi-server-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-oqgraph-engine" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-oqgraph-engine-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-s3-engine" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-s3-engine-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-server" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-server-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-server-galera" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-server-galera-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-server-utils" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-server-utils-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-sphinx-engine" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-sphinx-engine-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-test" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-test-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0005</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость mariadb </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mariadb</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mariadb-cve-2025-30722-8.0/</description>
               <solution>Установить обновление для пакета(ов) mariadb
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mariadb-cve-2025-30722-8.0/" type="self" id="ROS-20260310-80-0005" title="ROS-20260310-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30722" type="cve" id="CVE-2025-30722" title="CVE-2025-30722" />
			<reference href="https://bdu.fstec.ru/vul/2025-15829" type="self" id="BDU:2025-15829" title="BDU:2025-15829" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="mariadb" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-backup" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-backup-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-common" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-common-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-connect-engine" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-connect-engine-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-cracklib-password-check" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-cracklib-password-check-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-devel" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-devel-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-embedded" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-embedded-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-embedded-devel" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-embedded-devel-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-errmsg" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-errmsg-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-gssapi-server" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-gssapi-server-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-oqgraph-engine" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-oqgraph-engine-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-rocksdb-engine" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-rocksdb-engine-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-s3-engine" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-s3-engine-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-server" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-server-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-server-galera" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-server-galera-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-server-utils" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-server-utils-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-sphinx-engine" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-sphinx-engine-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mariadb-test" epoch="3" version="10.11.15" release="1.red80" arch="x86_64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-test-3:10.11.15-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="mariadb" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-backup" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-backup-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-common" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-common-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-connect-engine" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-connect-engine-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-cracklib-password-check" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-cracklib-password-check-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-devel" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-devel-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-embedded" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-embedded-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-embedded-devel" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-embedded-devel-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-errmsg" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-errmsg-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-gssapi-server" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-gssapi-server-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-oqgraph-engine" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-oqgraph-engine-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-s3-engine" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-s3-engine-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-server" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-server-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-server-galera" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-server-galera-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-server-utils" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-server-utils-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-sphinx-engine" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-sphinx-engine-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mariadb-test" epoch="3" version="10.11.15" release="1.red80" arch="aarch64" src="mariadb-10.11.15-1.red80.src.rpm">
					<filename>mariadb-test-3:10.11.15-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0006</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость nbdkit </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nbdkit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nbdkit-cve-2025-47711-8.0/</description>
               <solution>Установить обновление для пакета(ов) nbdkit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nbdkit-cve-2025-47711-8.0/" type="self" id="ROS-20260310-80-0006" title="ROS-20260310-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47711" type="cve" id="CVE-2025-47711" title="CVE-2025-47711" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="nbdkit" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-S3-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-S3-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-basic-filters" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-basic-filters-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-basic-plugins" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-basic-plugins-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-cc-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-cc-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-cdi-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-cdi-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-curl-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-curl-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-devel" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-devel-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-example-plugins" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-example-plugins-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ext2-filter" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ext2-filter-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-guestfs-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-guestfs-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-gzip-filter" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-gzip-filter-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-iso-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-iso-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-libvirt-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-libvirt-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-linuxdisk-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-linuxdisk-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-lua-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-lua-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-nbd-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-nbd-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ocaml-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ocaml-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ocaml-plugin-devel" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ocaml-plugin-devel-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-perl-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-perl-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-python-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-python-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ruby-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ruby-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-server" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-server-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ssh-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ssh-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-stats-filter" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-stats-filter-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-tar-filter" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-tar-filter-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-tcl-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-tcl-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-tmpdisk-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-tmpdisk-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-torrent-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-torrent-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-vddk-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-vddk-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-xz-filter" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-xz-filter-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="nbdkit" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-S3-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-S3-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-basic-filters" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-basic-filters-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-basic-plugins" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-basic-plugins-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-cc-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-cc-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-cdi-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-cdi-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-curl-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-curl-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-devel" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-devel-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-example-plugins" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-example-plugins-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-ext2-filter" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ext2-filter-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-guestfs-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-guestfs-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-gzip-filter" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-gzip-filter-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-iso-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-iso-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-libvirt-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-libvirt-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-linuxdisk-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-linuxdisk-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-lua-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-lua-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-nbd-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-nbd-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-ocaml-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ocaml-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-ocaml-plugin-devel" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ocaml-plugin-devel-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-perl-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-perl-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-python-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-python-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-ruby-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ruby-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-server" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-server-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-ssh-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ssh-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-stats-filter" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-stats-filter-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-tar-filter" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-tar-filter-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-tcl-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-tcl-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-tmpdisk-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-tmpdisk-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-torrent-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-torrent-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-xz-filter" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-xz-filter-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="nbdkit-bash-completion" epoch="0" version="1.32.5" release="2.red80" arch="noarch" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-bash-completion-0:1.32.5-2.red80.noarch.rpm</filename>
				</package>
				<package name="nbdkit-srpm-macros" epoch="0" version="1.32.5" release="2.red80" arch="noarch" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-srpm-macros-0:1.32.5-2.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0007</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость nbdkit </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nbdkit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nbdkit-cve-2025-47712-8.0/</description>
               <solution>Установить обновление для пакета(ов) nbdkit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nbdkit-cve-2025-47712-8.0/" type="self" id="ROS-20260310-80-0007" title="ROS-20260310-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47712" type="cve" id="CVE-2025-47712" title="CVE-2025-47712" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="nbdkit" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-S3-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-S3-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-basic-filters" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-basic-filters-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-basic-plugins" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-basic-plugins-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-cc-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-cc-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-cdi-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-cdi-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-curl-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-curl-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-devel" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-devel-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-example-plugins" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-example-plugins-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ext2-filter" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ext2-filter-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-guestfs-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-guestfs-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-gzip-filter" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-gzip-filter-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-iso-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-iso-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-libvirt-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-libvirt-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-linuxdisk-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-linuxdisk-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-lua-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-lua-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-nbd-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-nbd-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ocaml-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ocaml-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ocaml-plugin-devel" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ocaml-plugin-devel-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-perl-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-perl-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-python-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-python-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ruby-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ruby-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-server" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-server-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-ssh-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ssh-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-stats-filter" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-stats-filter-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-tar-filter" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-tar-filter-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-tcl-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-tcl-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-tmpdisk-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-tmpdisk-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-torrent-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-torrent-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-vddk-plugin" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-vddk-plugin-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="nbdkit-xz-filter" epoch="0" version="1.32.5" release="2.red80" arch="x86_64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-xz-filter-0:1.32.5-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="nbdkit" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-S3-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-S3-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-basic-filters" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-basic-filters-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-basic-plugins" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-basic-plugins-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-cc-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-cc-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-cdi-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-cdi-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-curl-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-curl-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-devel" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-devel-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-example-plugins" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-example-plugins-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-ext2-filter" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ext2-filter-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-guestfs-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-guestfs-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-gzip-filter" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-gzip-filter-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-iso-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-iso-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-libvirt-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-libvirt-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-linuxdisk-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-linuxdisk-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-lua-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-lua-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-nbd-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-nbd-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-ocaml-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ocaml-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-ocaml-plugin-devel" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ocaml-plugin-devel-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-perl-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-perl-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-python-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-python-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-ruby-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ruby-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-server" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-server-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-ssh-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-ssh-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-stats-filter" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-stats-filter-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-tar-filter" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-tar-filter-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-tcl-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-tcl-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-tmpdisk-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-tmpdisk-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-torrent-plugin" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-torrent-plugin-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="nbdkit-xz-filter" epoch="0" version="1.32.5" release="2.red80" arch="aarch64" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-xz-filter-0:1.32.5-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="nbdkit-bash-completion" epoch="0" version="1.32.5" release="2.red80" arch="noarch" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-bash-completion-0:1.32.5-2.red80.noarch.rpm</filename>
				</package>
				<package name="nbdkit-srpm-macros" epoch="0" version="1.32.5" release="2.red80" arch="noarch" src="nbdkit-1.32.5-2.red80.src.rpm">
					<filename>nbdkit-srpm-macros-0:1.32.5-2.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0008</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-expat-cve-2025-66382-8.0/</description>
               <solution>Установить обновление для пакета(ов) expat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-expat-cve-2025-66382-8.0/" type="self" id="ROS-20260310-80-0008" title="ROS-20260310-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66382" type="cve" id="CVE-2025-66382" title="CVE-2025-66382" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="expat" epoch="0" version="2.7.4" release="1.red80" arch="x86_64" src="expat-2.7.4-1.red80.src.rpm">
					<filename>expat-0:2.7.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="expat-devel" epoch="0" version="2.7.4" release="1.red80" arch="x86_64" src="expat-2.7.4-1.red80.src.rpm">
					<filename>expat-devel-0:2.7.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="expat-static" epoch="0" version="2.7.4" release="1.red80" arch="x86_64" src="expat-2.7.4-1.red80.src.rpm">
					<filename>expat-static-0:2.7.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="expat" epoch="0" version="2.7.4" release="1.red80" arch="aarch64" src="expat-2.7.4-1.red80.src.rpm">
					<filename>expat-0:2.7.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="expat-devel" epoch="0" version="2.7.4" release="1.red80" arch="aarch64" src="expat-2.7.4-1.red80.src.rpm">
					<filename>expat-devel-0:2.7.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="expat-static" epoch="0" version="2.7.4" release="1.red80" arch="aarch64" src="expat-2.7.4-1.red80.src.rpm">
					<filename>expat-static-0:2.7.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0009</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость wcurl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wcurl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-wcurl-cve-2025-11563-8.0/</description>
               <solution>Установить обновление для пакета(ов) wcurl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-wcurl-cve-2025-11563-8.0/" type="self" id="ROS-20260310-80-0009" title="ROS-20260310-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11563" type="cve" id="CVE-2025-11563" title="CVE-2025-11563" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="wcurl" epoch="0" version="2026.01.05" release="1.red80" arch="noarch" src="wcurl-2026.01.05-1.red80.src.rpm">
					<filename>wcurl-0:2026.01.05-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0010</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0899-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0899-8.0/" type="self" id="ROS-20260310-80-0010" title="ROS-20260310-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0899" type="cve" id="CVE-2026-0899" title="CVE-2026-0899" />
			<reference href="https://bdu.fstec.ru/vul/2026-00514" type="self" id="BDU:2026-00514" title="BDU:2026-00514" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0011</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0900-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0900-8.0/" type="self" id="ROS-20260310-80-0011" title="ROS-20260310-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0900" type="cve" id="CVE-2026-0900" title="CVE-2026-0900" />
			<reference href="https://bdu.fstec.ru/vul/2026-00460" type="self" id="BDU:2026-00460" title="BDU:2026-00460" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0012</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0901-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0901-8.0/" type="self" id="ROS-20260310-80-0012" title="ROS-20260310-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0901" type="cve" id="CVE-2026-0901" title="CVE-2026-0901" />
			<reference href="https://bdu.fstec.ru/vul/2026-00515" type="self" id="BDU:2026-00515" title="BDU:2026-00515" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0013</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0902-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0902-8.0/" type="self" id="ROS-20260310-80-0013" title="ROS-20260310-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0902" type="cve" id="CVE-2026-0902" title="CVE-2026-0902" />
			<reference href="https://bdu.fstec.ru/vul/2026-00513" type="self" id="BDU:2026-00513" title="BDU:2026-00513" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0014</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0904-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0904-8.0/" type="self" id="ROS-20260310-80-0014" title="ROS-20260310-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0904" type="cve" id="CVE-2026-0904" title="CVE-2026-0904" />
			<reference href="https://bdu.fstec.ru/vul/2026-00576" type="self" id="BDU:2026-00576" title="BDU:2026-00576" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0015</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0905-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0905-8.0/" type="self" id="ROS-20260310-80-0015" title="ROS-20260310-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0905" type="cve" id="CVE-2026-0905" title="CVE-2026-0905" />
			<reference href="https://bdu.fstec.ru/vul/2026-00510" type="self" id="BDU:2026-00510" title="BDU:2026-00510" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0016</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0906-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0906-8.0/" type="self" id="ROS-20260310-80-0016" title="ROS-20260310-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0906" type="cve" id="CVE-2026-0906" title="CVE-2026-0906" />
			<reference href="https://bdu.fstec.ru/vul/2026-00511" type="self" id="BDU:2026-00511" title="BDU:2026-00511" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0017</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0907-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0907-8.0/" type="self" id="ROS-20260310-80-0017" title="ROS-20260310-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0907" type="cve" id="CVE-2026-0907" title="CVE-2026-0907" />
			<reference href="https://bdu.fstec.ru/vul/2026-00512" type="self" id="BDU:2026-00512" title="BDU:2026-00512" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0018</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0908-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0908-8.0/" type="self" id="ROS-20260310-80-0018" title="ROS-20260310-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0908" type="cve" id="CVE-2026-0908" title="CVE-2026-0908" />
			<reference href="https://bdu.fstec.ru/vul/2026-00459" type="self" id="BDU:2026-00459" title="BDU:2026-00459" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0019</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость wireshark </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в wireshark</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-wireshark-cve-2026-0962-8.0/</description>
               <solution>Установить обновление для пакета(ов) wireshark
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-wireshark-cve-2026-0962-8.0/" type="self" id="ROS-20260310-80-0019" title="ROS-20260310-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0962" type="cve" id="CVE-2026-0962" title="CVE-2026-0962" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="wireshark" epoch="1" version="4.6.3" release="2.red80" arch="x86_64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-1:4.6.3-2.red80.x86_64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.3" release="2.red80" arch="x86_64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-cli-1:4.6.3-2.red80.x86_64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.3" release="2.red80" arch="x86_64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-devel-1:4.6.3-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="wireshark" epoch="1" version="4.6.3" release="2.red80" arch="aarch64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-1:4.6.3-2.red80.aarch64.rpm</filename>
				</package>
				<package name="wireshark-cli" epoch="1" version="4.6.3" release="2.red80" arch="aarch64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-cli-1:4.6.3-2.red80.aarch64.rpm</filename>
				</package>
				<package name="wireshark-devel" epoch="1" version="4.6.3" release="2.red80" arch="aarch64" src="wireshark-4.6.3-2.red80.src.rpm">
					<filename>wireshark-devel-1:4.6.3-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0020</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость exim </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в exim</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-exim-cve-2025-67896-8.0/</description>
               <solution>Установить обновление для пакета(ов) exim
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-exim-cve-2025-67896-8.0/" type="self" id="ROS-20260310-80-0020" title="ROS-20260310-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67896" type="cve" id="CVE-2025-67896" title="CVE-2025-67896" />
			<reference href="https://bdu.fstec.ru/vul/2026-00906" type="self" id="BDU:2026-00906" title="BDU:2026-00906" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="exim" epoch="0" version="4.99.1" release="1.red80" arch="x86_64" src="exim-4.99.1-1.red80.src.rpm">
					<filename>exim-0:4.99.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="exim-greylist" epoch="0" version="4.99.1" release="1.red80" arch="x86_64" src="exim-4.99.1-1.red80.src.rpm">
					<filename>exim-greylist-0:4.99.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="exim-mon" epoch="0" version="4.99.1" release="1.red80" arch="x86_64" src="exim-4.99.1-1.red80.src.rpm">
					<filename>exim-mon-0:4.99.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="exim-mysql" epoch="0" version="4.99.1" release="1.red80" arch="x86_64" src="exim-4.99.1-1.red80.src.rpm">
					<filename>exim-mysql-0:4.99.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="exim-pgsql" epoch="0" version="4.99.1" release="1.red80" arch="x86_64" src="exim-4.99.1-1.red80.src.rpm">
					<filename>exim-pgsql-0:4.99.1-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="exim" epoch="0" version="4.99.1" release="1.red80" arch="aarch64" src="exim-4.99.1-1.red80.src.rpm">
					<filename>exim-0:4.99.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="exim-greylist" epoch="0" version="4.99.1" release="1.red80" arch="aarch64" src="exim-4.99.1-1.red80.src.rpm">
					<filename>exim-greylist-0:4.99.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="exim-mon" epoch="0" version="4.99.1" release="1.red80" arch="aarch64" src="exim-4.99.1-1.red80.src.rpm">
					<filename>exim-mon-0:4.99.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="exim-mysql" epoch="0" version="4.99.1" release="1.red80" arch="aarch64" src="exim-4.99.1-1.red80.src.rpm">
					<filename>exim-mysql-0:4.99.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="exim-pgsql" epoch="0" version="4.99.1" release="1.red80" arch="aarch64" src="exim-4.99.1-1.red80.src.rpm">
					<filename>exim-pgsql-0:4.99.1-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0021</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость libsoup </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libsoup</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libsoup-cve-2025-14523-8.0/</description>
               <solution>Установить обновление для пакета(ов) libsoup
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libsoup-cve-2025-14523-8.0/" type="self" id="ROS-20260310-80-0021" title="ROS-20260310-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14523" type="cve" id="CVE-2025-14523" title="CVE-2025-14523" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libsoup" epoch="0" version="2.74.3" release="7.red80" arch="x86_64" src="libsoup-2.74.3-7.red80.src.rpm">
					<filename>libsoup-0:2.74.3-7.red80.x86_64.rpm</filename>
				</package>
				<package name="libsoup-devel" epoch="0" version="2.74.3" release="7.red80" arch="x86_64" src="libsoup-2.74.3-7.red80.src.rpm">
					<filename>libsoup-devel-0:2.74.3-7.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libsoup" epoch="0" version="2.74.3" release="7.red80" arch="aarch64" src="libsoup-2.74.3-7.red80.src.rpm">
					<filename>libsoup-0:2.74.3-7.red80.aarch64.rpm</filename>
				</package>
				<package name="libsoup-devel" epoch="0" version="2.74.3" release="7.red80" arch="aarch64" src="libsoup-2.74.3-7.red80.src.rpm">
					<filename>libsoup-devel-0:2.74.3-7.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libsoup-doc" epoch="0" version="2.74.3" release="7.red80" arch="noarch" src="libsoup-2.74.3-7.red80.src.rpm">
					<filename>libsoup-doc-0:2.74.3-7.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0022</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость vsftpd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vsftpd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-vsftpd-cve-2025-14242-8.0/</description>
               <solution>Установить обновление для пакета(ов) vsftpd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-vsftpd-cve-2025-14242-8.0/" type="self" id="ROS-20260310-80-0022" title="ROS-20260310-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14242" type="cve" id="CVE-2025-14242" title="CVE-2025-14242" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="vsftpd" epoch="0" version="3.0.5" release="3.red80" arch="x86_64" src="vsftpd-3.0.5-3.red80.src.rpm">
					<filename>vsftpd-0:3.0.5-3.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="vsftpd" epoch="0" version="3.0.5" release="3.red80" arch="aarch64" src="vsftpd-3.0.5-3.red80.src.rpm">
					<filename>vsftpd-0:3.0.5-3.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0023</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость golang-x-crypto </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang-x-crypto</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-x-crypto-cve-2025-58181-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang-x-crypto
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-x-crypto-cve-2025-58181-8.0/" type="self" id="ROS-20260310-80-0023" title="ROS-20260310-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58181" type="cve" id="CVE-2025-58181" title="CVE-2025-58181" />
			<reference href="https://bdu.fstec.ru/vul/2025-14688" type="self" id="BDU:2025-14688" title="BDU:2025-14688" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="golang-x-crypto-devel" epoch="0" version="0.45.0" release="1.red80" arch="noarch" src="golang-x-crypto-0.45.0-1.red80.src.rpm">
					<filename>golang-x-crypto-devel-0:0.45.0-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0024</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость tinyproxy </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в tinyproxy</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-tinyproxy-cve-2025-63938-8.0/</description>
               <solution>Установить обновление для пакета(ов) tinyproxy
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-tinyproxy-cve-2025-63938-8.0/" type="self" id="ROS-20260310-80-0024" title="ROS-20260310-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-63938" type="cve" id="CVE-2025-63938" title="CVE-2025-63938" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="tinyproxy" epoch="0" version="1.11.2" release="2.red80" arch="x86_64" src="tinyproxy-1.11.2-2.red80.src.rpm">
					<filename>tinyproxy-0:1.11.2-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="tinyproxy" epoch="0" version="1.11.2" release="2.red80" arch="aarch64" src="tinyproxy-1.11.2-2.red80.src.rpm">
					<filename>tinyproxy-0:1.11.2-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0025</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-pymdown-extensions </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-pymdown-extensions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-pymdown-extensions-cve-2025-68142-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-pymdown-extensions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-pymdown-extensions-cve-2025-68142-8.0/" type="self" id="ROS-20260310-80-0025" title="ROS-20260310-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68142" type="cve" id="CVE-2025-68142" title="CVE-2025-68142" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python3-pymdown-extensions" epoch="0" version="10.12" release="2.red80" arch="noarch" src="python-pymdown-extensions-10.12-2.red80.src.rpm">
					<filename>python3-pymdown-extensions-0:10.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="python3-pymdown-extensions+extra" epoch="0" version="10.12" release="2.red80" arch="noarch" src="python-pymdown-extensions-10.12-2.red80.src.rpm">
					<filename>python3-pymdown-extensions+extra-0:10.12-2.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0026</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-filelock </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-filelock</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-filelock-cve-2025-68146-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-filelock
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-filelock-cve-2025-68146-8.0/" type="self" id="ROS-20260310-80-0026" title="ROS-20260310-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68146" type="cve" id="CVE-2025-68146" title="CVE-2025-68146" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python-filelock-doc" epoch="0" version="3.16.1" release="2.red80" arch="noarch" src="python-filelock-3.16.1-2.red80.src.rpm">
					<filename>python-filelock-doc-0:3.16.1-2.red80.noarch.rpm</filename>
				</package>
				<package name="python3-filelock" epoch="0" version="3.16.1" release="2.red80" arch="noarch" src="python-filelock-3.16.1-2.red80.src.rpm">
					<filename>python3-filelock-0:3.16.1-2.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0027</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость coredns </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в coredns</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-coredns-cve-2025-68151-8.0/</description>
               <solution>Установить обновление для пакета(ов) coredns
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-coredns-cve-2025-68151-8.0/" type="self" id="ROS-20260310-80-0027" title="ROS-20260310-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68151" type="cve" id="CVE-2025-68151" title="CVE-2025-68151" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="coredns" epoch="0" version="1.12.1" release="2.red80" arch="x86_64" src="coredns-1.12.1-2.red80.src.rpm">
					<filename>coredns-0:1.12.1-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="coredns" epoch="0" version="1.12.1" release="2.red80" arch="aarch64" src="coredns-1.12.1-2.red80.src.rpm">
					<filename>coredns-0:1.12.1-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0028</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость beats </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в beats</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-beats-cve-2025-68383-8.0/</description>
               <solution>Установить обновление для пакета(ов) beats
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-beats-cve-2025-68383-8.0/" type="self" id="ROS-20260310-80-0028" title="ROS-20260310-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68383" type="cve" id="CVE-2025-68383" title="CVE-2025-68383" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="auditbeat" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>auditbeat-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="auditbeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>auditbeat-docs-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="beats" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>beats-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="filebeat" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>filebeat-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="filebeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>filebeat-docs-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="heartbeat" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>heartbeat-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="heartbeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>heartbeat-docs-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="metricbeat" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>metricbeat-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="metricbeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>metricbeat-docs-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="packetbeat" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>packetbeat-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="packetbeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>packetbeat-docs-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="auditbeat" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>auditbeat-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="auditbeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>auditbeat-docs-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="beats" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>beats-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="filebeat" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>filebeat-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="filebeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>filebeat-docs-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="heartbeat" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>heartbeat-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="heartbeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>heartbeat-docs-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="metricbeat" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>metricbeat-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="metricbeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>metricbeat-docs-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="packetbeat" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>packetbeat-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="packetbeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>packetbeat-docs-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0029</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость beats </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в beats</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-beats-cve-2025-68388-8.0/</description>
               <solution>Установить обновление для пакета(ов) beats
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-beats-cve-2025-68388-8.0/" type="self" id="ROS-20260310-80-0029" title="ROS-20260310-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68388" type="cve" id="CVE-2025-68388" title="CVE-2025-68388" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="auditbeat" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>auditbeat-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="auditbeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>auditbeat-docs-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="beats" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>beats-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="filebeat" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>filebeat-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="filebeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>filebeat-docs-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="heartbeat" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>heartbeat-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="heartbeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>heartbeat-docs-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="metricbeat" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>metricbeat-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="metricbeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>metricbeat-docs-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="packetbeat" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>packetbeat-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="packetbeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="x86_64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>packetbeat-docs-0:9.2.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="auditbeat" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>auditbeat-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="auditbeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>auditbeat-docs-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="beats" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>beats-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="filebeat" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>filebeat-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="filebeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>filebeat-docs-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="heartbeat" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>heartbeat-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="heartbeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>heartbeat-docs-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="metricbeat" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>metricbeat-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="metricbeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>metricbeat-docs-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="packetbeat" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>packetbeat-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="packetbeat-docs" epoch="0" version="9.2.4" release="1.red80" arch="aarch64" src="beats-9.2.4-1.red80.src.rpm">
					<filename>packetbeat-docs-0:9.2.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0030</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость kf5-messagelib </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kf5-messagelib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kf5-messagelib-cve-2025-69412-8.0/</description>
               <solution>Установить обновление для пакета(ов) kf5-messagelib
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kf5-messagelib-cve-2025-69412-8.0/" type="self" id="ROS-20260310-80-0030" title="ROS-20260310-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69412" type="cve" id="CVE-2025-69412" title="CVE-2025-69412" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kf5-messagelib" epoch="0" version="23.08.5" release="2.red80" arch="x86_64" src="kf5-messagelib-23.08.5-2.red80.src.rpm">
					<filename>kf5-messagelib-0:23.08.5-2.red80.x86_64.rpm</filename>
				</package>
				<package name="kf5-messagelib-devel" epoch="0" version="23.08.5" release="2.red80" arch="x86_64" src="kf5-messagelib-23.08.5-2.red80.src.rpm">
					<filename>kf5-messagelib-devel-0:23.08.5-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kf5-messagelib" epoch="0" version="23.08.5" release="2.red80" arch="aarch64" src="kf5-messagelib-23.08.5-2.red80.src.rpm">
					<filename>kf5-messagelib-0:23.08.5-2.red80.aarch64.rpm</filename>
				</package>
				<package name="kf5-messagelib-devel" epoch="0" version="23.08.5" release="2.red80" arch="aarch64" src="kf5-messagelib-23.08.5-2.red80.src.rpm">
					<filename>kf5-messagelib-devel-0:23.08.5-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0031</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость libxml2 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libxml2-cve-2026-0989-8.0/</description>
               <solution>Установить обновление для пакета(ов) libxml2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libxml2-cve-2026-0989-8.0/" type="self" id="ROS-20260310-80-0031" title="ROS-20260310-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0989" type="cve" id="CVE-2026-0989" title="CVE-2026-0989" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libxml2" epoch="0" version="2.10.4" release="12.red80" arch="x86_64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>libxml2-0:2.10.4-12.red80.x86_64.rpm</filename>
				</package>
				<package name="libxml2-devel" epoch="0" version="2.10.4" release="12.red80" arch="x86_64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>libxml2-devel-0:2.10.4-12.red80.x86_64.rpm</filename>
				</package>
				<package name="libxml2-static" epoch="0" version="2.10.4" release="12.red80" arch="x86_64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>libxml2-static-0:2.10.4-12.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-libxml2" epoch="0" version="2.10.4" release="12.red80" arch="x86_64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>python3-libxml2-0:2.10.4-12.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libxml2" epoch="0" version="2.10.4" release="12.red80" arch="aarch64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>libxml2-0:2.10.4-12.red80.aarch64.rpm</filename>
				</package>
				<package name="libxml2-devel" epoch="0" version="2.10.4" release="12.red80" arch="aarch64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>libxml2-devel-0:2.10.4-12.red80.aarch64.rpm</filename>
				</package>
				<package name="libxml2-static" epoch="0" version="2.10.4" release="12.red80" arch="aarch64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>libxml2-static-0:2.10.4-12.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-libxml2" epoch="0" version="2.10.4" release="12.red80" arch="aarch64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>python3-libxml2-0:2.10.4-12.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0032</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость libxml2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libxml2-cve-2026-0990-8.0/</description>
               <solution>Установить обновление для пакета(ов) libxml2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libxml2-cve-2026-0990-8.0/" type="self" id="ROS-20260310-80-0032" title="ROS-20260310-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0990" type="cve" id="CVE-2026-0990" title="CVE-2026-0990" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libxml2" epoch="0" version="2.10.4" release="12.red80" arch="x86_64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>libxml2-0:2.10.4-12.red80.x86_64.rpm</filename>
				</package>
				<package name="libxml2-devel" epoch="0" version="2.10.4" release="12.red80" arch="x86_64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>libxml2-devel-0:2.10.4-12.red80.x86_64.rpm</filename>
				</package>
				<package name="libxml2-static" epoch="0" version="2.10.4" release="12.red80" arch="x86_64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>libxml2-static-0:2.10.4-12.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-libxml2" epoch="0" version="2.10.4" release="12.red80" arch="x86_64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>python3-libxml2-0:2.10.4-12.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libxml2" epoch="0" version="2.10.4" release="12.red80" arch="aarch64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>libxml2-0:2.10.4-12.red80.aarch64.rpm</filename>
				</package>
				<package name="libxml2-devel" epoch="0" version="2.10.4" release="12.red80" arch="aarch64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>libxml2-devel-0:2.10.4-12.red80.aarch64.rpm</filename>
				</package>
				<package name="libxml2-static" epoch="0" version="2.10.4" release="12.red80" arch="aarch64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>libxml2-static-0:2.10.4-12.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-libxml2" epoch="0" version="2.10.4" release="12.red80" arch="aarch64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>python3-libxml2-0:2.10.4-12.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0033</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость libxml2 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в libxml2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libxml2-cve-2026-0992-8.0/</description>
               <solution>Установить обновление для пакета(ов) libxml2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libxml2-cve-2026-0992-8.0/" type="self" id="ROS-20260310-80-0033" title="ROS-20260310-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0992" type="cve" id="CVE-2026-0992" title="CVE-2026-0992" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libxml2" epoch="0" version="2.10.4" release="12.red80" arch="x86_64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>libxml2-0:2.10.4-12.red80.x86_64.rpm</filename>
				</package>
				<package name="libxml2-devel" epoch="0" version="2.10.4" release="12.red80" arch="x86_64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>libxml2-devel-0:2.10.4-12.red80.x86_64.rpm</filename>
				</package>
				<package name="libxml2-static" epoch="0" version="2.10.4" release="12.red80" arch="x86_64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>libxml2-static-0:2.10.4-12.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-libxml2" epoch="0" version="2.10.4" release="12.red80" arch="x86_64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>python3-libxml2-0:2.10.4-12.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libxml2" epoch="0" version="2.10.4" release="12.red80" arch="aarch64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>libxml2-0:2.10.4-12.red80.aarch64.rpm</filename>
				</package>
				<package name="libxml2-devel" epoch="0" version="2.10.4" release="12.red80" arch="aarch64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>libxml2-devel-0:2.10.4-12.red80.aarch64.rpm</filename>
				</package>
				<package name="libxml2-static" epoch="0" version="2.10.4" release="12.red80" arch="aarch64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>libxml2-static-0:2.10.4-12.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-libxml2" epoch="0" version="2.10.4" release="12.red80" arch="aarch64" src="libxml2-2.10.4-12.red80.src.rpm">
					<filename>python3-libxml2-0:2.10.4-12.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0034</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость openldap </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в openldap</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openldap-cve-2026-22185-8.0/</description>
               <solution>Установить обновление для пакета(ов) openldap
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openldap-cve-2026-22185-8.0/" type="self" id="ROS-20260310-80-0034" title="ROS-20260310-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22185" type="cve" id="CVE-2026-22185" title="CVE-2026-22185" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="openldap" epoch="0" version="2.6.12" release="1.red80" arch="x86_64" src="openldap-2.6.12-1.red80.src.rpm">
					<filename>openldap-0:2.6.12-1.red80.x86_64.rpm</filename>
				</package>
				<package name="openldap-clients" epoch="0" version="2.6.12" release="1.red80" arch="x86_64" src="openldap-2.6.12-1.red80.src.rpm">
					<filename>openldap-clients-0:2.6.12-1.red80.x86_64.rpm</filename>
				</package>
				<package name="openldap-compat" epoch="0" version="2.6.12" release="1.red80" arch="x86_64" src="openldap-2.6.12-1.red80.src.rpm">
					<filename>openldap-compat-0:2.6.12-1.red80.x86_64.rpm</filename>
				</package>
				<package name="openldap-devel" epoch="0" version="2.6.12" release="1.red80" arch="x86_64" src="openldap-2.6.12-1.red80.src.rpm">
					<filename>openldap-devel-0:2.6.12-1.red80.x86_64.rpm</filename>
				</package>
				<package name="openldap-servers" epoch="0" version="2.6.12" release="1.red80" arch="x86_64" src="openldap-2.6.12-1.red80.src.rpm">
					<filename>openldap-servers-0:2.6.12-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="openldap" epoch="0" version="2.6.12" release="1.red80" arch="aarch64" src="openldap-2.6.12-1.red80.src.rpm">
					<filename>openldap-0:2.6.12-1.red80.aarch64.rpm</filename>
				</package>
				<package name="openldap-clients" epoch="0" version="2.6.12" release="1.red80" arch="aarch64" src="openldap-2.6.12-1.red80.src.rpm">
					<filename>openldap-clients-0:2.6.12-1.red80.aarch64.rpm</filename>
				</package>
				<package name="openldap-compat" epoch="0" version="2.6.12" release="1.red80" arch="aarch64" src="openldap-2.6.12-1.red80.src.rpm">
					<filename>openldap-compat-0:2.6.12-1.red80.aarch64.rpm</filename>
				</package>
				<package name="openldap-devel" epoch="0" version="2.6.12" release="1.red80" arch="aarch64" src="openldap-2.6.12-1.red80.src.rpm">
					<filename>openldap-devel-0:2.6.12-1.red80.aarch64.rpm</filename>
				</package>
				<package name="openldap-servers" epoch="0" version="2.6.12" release="1.red80" arch="aarch64" src="openldap-2.6.12-1.red80.src.rpm">
					<filename>openldap-servers-0:2.6.12-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0035</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-wheel </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-wheel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-wheel-cve-2026-24049-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-wheel
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-wheel-cve-2026-24049-8.0/" type="self" id="ROS-20260310-80-0035" title="ROS-20260310-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24049" type="cve" id="CVE-2026-24049" title="CVE-2026-24049" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python-wheel-doc" epoch="1" version="0.46.3" release="1.red80" arch="noarch" src="python-wheel-0.46.3-1.red80.src.rpm">
					<filename>python-wheel-doc-1:0.46.3-1.red80.noarch.rpm</filename>
				</package>
				<package name="python-wheel-wheel" epoch="1" version="0.46.3" release="1.red80" arch="noarch" src="python-wheel-0.46.3-1.red80.src.rpm">
					<filename>python-wheel-wheel-1:0.46.3-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-wheel" epoch="1" version="0.46.3" release="1.red80" arch="noarch" src="python-wheel-0.46.3-1.red80.src.rpm">
					<filename>python3-wheel-1:0.46.3-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0036</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость grafana </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-grafana-cve-2026-21720-8.0/</description>
               <solution>Установить обновление для пакета(ов) grafana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-grafana-cve-2026-21720-8.0/" type="self" id="ROS-20260310-80-0036" title="ROS-20260310-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21720" type="cve" id="CVE-2026-21720" title="CVE-2026-21720" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="grafana" epoch="0" version="12.3.3" release="1.red80" arch="x86_64" src="grafana-12.3.3-1.red80.src.rpm">
					<filename>grafana-0:12.3.3-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="grafana" epoch="0" version="12.3.3" release="1.red80" arch="aarch64" src="grafana-12.3.3-1.red80.src.rpm">
					<filename>grafana-0:12.3.3-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="grafana-selinux" epoch="0" version="12.3.3" release="1.red80" arch="noarch" src="grafana-12.3.3-1.red80.src.rpm">
					<filename>grafana-selinux-0:12.3.3-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0037</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-1504-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-1504-8.0/" type="self" id="ROS-20260310-80-0037" title="ROS-20260310-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1504" type="cve" id="CVE-2026-1504" title="CVE-2026-1504" />
			<reference href="https://bdu.fstec.ru/vul/2026-00964" type="self" id="BDU:2026-00964" title="BDU:2026-00964" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0038</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-1861-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-1861-8.0/" type="self" id="ROS-20260310-80-0038" title="ROS-20260310-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1861" type="cve" id="CVE-2026-1861" title="CVE-2026-1861" />
			<reference href="https://bdu.fstec.ru/vul/2026-01937" type="self" id="BDU:2026-01937" title="BDU:2026-01937" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0039</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-1862-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-1862-8.0/" type="self" id="ROS-20260310-80-0039" title="ROS-20260310-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1862" type="cve" id="CVE-2026-1862" title="CVE-2026-1862" />
			<reference href="https://bdu.fstec.ru/vul/2026-01938" type="self" id="BDU:2026-01938" title="BDU:2026-01938" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0040</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-jaraco-context </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-jaraco-context</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-jaraco-context-cve-2026-23949-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-jaraco-context
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-jaraco-context-cve-2026-23949-8.0/" type="self" id="ROS-20260310-80-0040" title="ROS-20260310-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23949" type="cve" id="CVE-2026-23949" title="CVE-2026-23949" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python3-jaraco-context" epoch="0" version="6.1.0" release="1.red80" arch="noarch" src="python-jaraco-context-6.1.0-1.red80.src.rpm">
					<filename>python3-jaraco-context-0:6.1.0-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0041</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-setuptools </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-setuptools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-setuptools-cve-2026-23949-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-setuptools
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-setuptools-cve-2026-23949-8.0/" type="self" id="ROS-20260310-80-0041" title="ROS-20260310-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23949" type="cve" id="CVE-2026-23949" title="CVE-2026-23949" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python-setuptools-wheel" epoch="0" version="78.1.1" release="3.red80" arch="noarch" src="python-setuptools-78.1.1-3.red80.src.rpm">
					<filename>python-setuptools-wheel-0:78.1.1-3.red80.noarch.rpm</filename>
				</package>
				<package name="python3-setuptools" epoch="0" version="78.1.1" release="3.red80" arch="noarch" src="python-setuptools-78.1.1-3.red80.src.rpm">
					<filename>python3-setuptools-0:78.1.1-3.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0042</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-django-cve-2025-13473-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-django-cve-2025-13473-8.0/" type="self" id="ROS-20260310-80-0042" title="ROS-20260310-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13473" type="cve" id="CVE-2025-13473" title="CVE-2025-13473" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.28" release="1.red80" arch="noarch" src="python-django-4.2.28-1.red80.src.rpm">
					<filename>python-django-bash-completion-0:4.2.28-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.28" release="1.red80" arch="noarch" src="python-django-4.2.28-1.red80.src.rpm">
					<filename>python3-django-0:4.2.28-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.28" release="1.red80" arch="noarch" src="python-django-4.2.28-1.red80.src.rpm">
					<filename>python3-django-doc-0:4.2.28-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0043</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-django-cve-2025-14550-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-django-cve-2025-14550-8.0/" type="self" id="ROS-20260310-80-0043" title="ROS-20260310-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14550" type="cve" id="CVE-2025-14550" title="CVE-2025-14550" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.28" release="1.red80" arch="noarch" src="python-django-4.2.28-1.red80.src.rpm">
					<filename>python-django-bash-completion-0:4.2.28-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.28" release="1.red80" arch="noarch" src="python-django-4.2.28-1.red80.src.rpm">
					<filename>python3-django-0:4.2.28-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.28" release="1.red80" arch="noarch" src="python-django-4.2.28-1.red80.src.rpm">
					<filename>python3-django-doc-0:4.2.28-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0044</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-django-cve-2026-1207-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-django-cve-2026-1207-8.0/" type="self" id="ROS-20260310-80-0044" title="ROS-20260310-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1207" type="cve" id="CVE-2026-1207" title="CVE-2026-1207" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.28" release="1.red80" arch="noarch" src="python-django-4.2.28-1.red80.src.rpm">
					<filename>python-django-bash-completion-0:4.2.28-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.28" release="1.red80" arch="noarch" src="python-django-4.2.28-1.red80.src.rpm">
					<filename>python3-django-0:4.2.28-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.28" release="1.red80" arch="noarch" src="python-django-4.2.28-1.red80.src.rpm">
					<filename>python3-django-doc-0:4.2.28-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0045</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-django-cve-2026-1285-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-django-cve-2026-1285-8.0/" type="self" id="ROS-20260310-80-0045" title="ROS-20260310-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1285" type="cve" id="CVE-2026-1285" title="CVE-2026-1285" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.28" release="1.red80" arch="noarch" src="python-django-4.2.28-1.red80.src.rpm">
					<filename>python-django-bash-completion-0:4.2.28-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.28" release="1.red80" arch="noarch" src="python-django-4.2.28-1.red80.src.rpm">
					<filename>python3-django-0:4.2.28-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.28" release="1.red80" arch="noarch" src="python-django-4.2.28-1.red80.src.rpm">
					<filename>python3-django-doc-0:4.2.28-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0046</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость python-django </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в python-django</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-django-cve-2026-1287-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-django
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-django-cve-2026-1287-8.0/" type="self" id="ROS-20260310-80-0046" title="ROS-20260310-80-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1287" type="cve" id="CVE-2026-1287" title="CVE-2026-1287" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python-django-bash-completion" epoch="0" version="4.2.28" release="1.red80" arch="noarch" src="python-django-4.2.28-1.red80.src.rpm">
					<filename>python-django-bash-completion-0:4.2.28-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-django" epoch="0" version="4.2.28" release="1.red80" arch="noarch" src="python-django-4.2.28-1.red80.src.rpm">
					<filename>python3-django-0:4.2.28-1.red80.noarch.rpm</filename>
				</package>
				<package name="python3-django-doc" epoch="0" version="4.2.28" release="1.red80" arch="noarch" src="python-django-4.2.28-1.red80.src.rpm">
					<filename>python3-django-doc-0:4.2.28-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0047</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость golang-k8s-ingress-nginx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-k8s-ingress-nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-k8s-ingress-nginx-cve-2026-1580-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang-k8s-ingress-nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-k8s-ingress-nginx-cve-2026-1580-8.0/" type="self" id="ROS-20260310-80-0047" title="ROS-20260310-80-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1580" type="cve" id="CVE-2026-1580" title="CVE-2026-1580" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="golang-k8s-ingress-nginx" epoch="0" version="1.13.7" release="1.red80" arch="x86_64" src="golang-k8s-ingress-nginx-1.13.7-1.red80.src.rpm">
					<filename>golang-k8s-ingress-nginx-0:1.13.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="golang-k8s-ingress-nginx" epoch="0" version="1.13.7" release="1.red80" arch="aarch64" src="golang-k8s-ingress-nginx-1.13.7-1.red80.src.rpm">
					<filename>golang-k8s-ingress-nginx-0:1.13.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0048</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость golang-k8s-ingress-nginx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-k8s-ingress-nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-k8s-ingress-nginx-cve-2025-15566-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang-k8s-ingress-nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-k8s-ingress-nginx-cve-2025-15566-8.0/" type="self" id="ROS-20260310-80-0048" title="ROS-20260310-80-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15566" type="cve" id="CVE-2025-15566" title="CVE-2025-15566" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="golang-k8s-ingress-nginx" epoch="0" version="1.13.7" release="1.red80" arch="x86_64" src="golang-k8s-ingress-nginx-1.13.7-1.red80.src.rpm">
					<filename>golang-k8s-ingress-nginx-0:1.13.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="golang-k8s-ingress-nginx" epoch="0" version="1.13.7" release="1.red80" arch="aarch64" src="golang-k8s-ingress-nginx-1.13.7-1.red80.src.rpm">
					<filename>golang-k8s-ingress-nginx-0:1.13.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0049</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2025-61732-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2025-61732-8.0/" type="self" id="ROS-20260310-80-0049" title="ROS-20260310-80-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61732" type="cve" id="CVE-2025-61732" title="CVE-2025-61732" />
			<reference href="https://bdu.fstec.ru/vul/2026-02553" type="self" id="BDU:2026-02553" title="BDU:2026-02553" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="golang" epoch="0" version="1.25.7" release="1.red80" arch="x86_64" src="golang-1.25.7-1.red80.src.rpm">
					<filename>golang-0:1.25.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.7" release="1.red80" arch="x86_64" src="golang-1.25.7-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.7" release="1.red80" arch="x86_64" src="golang-1.25.7-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="golang" epoch="0" version="1.25.7" release="1.red80" arch="aarch64" src="golang-1.25.7-1.red80.src.rpm">
					<filename>golang-0:1.25.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.7" release="1.red80" arch="aarch64" src="golang-1.25.7-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.7" release="1.red80" arch="aarch64" src="golang-1.25.7-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="golang-docs" epoch="0" version="1.25.7" release="1.red80" arch="noarch" src="golang-1.25.7-1.red80.src.rpm">
					<filename>golang-docs-0:1.25.7-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.7" release="1.red80" arch="noarch" src="golang-1.25.7-1.red80.src.rpm">
					<filename>golang-misc-0:1.25.7-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.7" release="1.red80" arch="noarch" src="golang-1.25.7-1.red80.src.rpm">
					<filename>golang-src-0:1.25.7-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.7" release="1.red80" arch="noarch" src="golang-1.25.7-1.red80.src.rpm">
					<filename>golang-tests-0:1.25.7-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260310-80-0050</id>
		<issued date="2026-03-10" />
		<updated date="2026-03-10" />
		<title>Уязвимость angie </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в angie</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-angie-cve-2026-1642-8.0/</description>
               <solution>Установить обновление для пакета(ов) angie
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-angie-cve-2026-1642-8.0/" type="self" id="ROS-20260310-80-0050" title="ROS-20260310-80-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1642" type="cve" id="CVE-2026-1642" title="CVE-2026-1642" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="angie" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-jwt" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-auth-jwt-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-ldap" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-auth-ldap-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-pam" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-auth-pam-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-spnego" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-auth-spnego-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-auth-totp" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-auth-totp-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-brotli" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-brotli-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-cache-purge" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-cache-purge-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-cgi" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-cgi-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-combined-upstreams" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-combined-upstreams-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-dav-ext" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-dav-ext-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-dynamic-limit-req" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-dynamic-limit-req-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-echo" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-echo-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-enhanced-memcached" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-enhanced-memcached-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-eval" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-eval-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-geoip2" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-geoip2-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-headers-more" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-headers-more-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-http-auth-radius" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-http-auth-radius-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-image-filter" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-image-filter-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-keyval" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-keyval-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-lua" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-lua-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-modsecurity" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-modsecurity-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-ndk" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-ndk-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-njs-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs-cli" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-njs-cli-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs-light" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-njs-light-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-njs-light-cli" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-njs-light-cli-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-opentracing" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-opentracing-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-otel" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-otel-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-perl" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-perl-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-postgres" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-postgres-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-redis2" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-redis2-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-rtmp" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-rtmp-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-set-misc" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-set-misc-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-subs" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-subs-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-testcookie" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-testcookie-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-unbrotli" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-unbrotli-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-upload" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-upload-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-vod" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-vod-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-vts" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-vts-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wamr" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-wamr-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wasm" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-wasm-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-wasmtime" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-wasmtime-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-xslt" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-xslt-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-zip" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-zip-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
				<package name="angie-module-zstd" epoch="0" version="1.11.3" release="1.red80" arch="x86_64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-zstd-0:1.11.3-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="angie" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-auth-jwt" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-auth-jwt-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-auth-ldap" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-auth-ldap-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-auth-pam" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-auth-pam-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-auth-spnego" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-auth-spnego-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-auth-totp" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-auth-totp-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-brotli" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-brotli-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-cache-purge" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-cache-purge-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-cgi" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-cgi-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-combined-upstreams" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-combined-upstreams-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-dav-ext" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-dav-ext-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-dynamic-limit-req" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-dynamic-limit-req-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-echo" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-echo-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-enhanced-memcached" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-enhanced-memcached-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-eval" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-eval-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-geoip2" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-geoip2-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-headers-more" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-headers-more-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-http-auth-radius" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-http-auth-radius-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-image-filter" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-image-filter-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-keyval" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-keyval-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-lua" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-lua-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-modsecurity" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-modsecurity-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-ndk" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-ndk-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-njs" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-njs-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-njs-cli" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-njs-cli-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-njs-light" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-njs-light-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-njs-light-cli" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-njs-light-cli-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-opentracing" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-opentracing-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-otel" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-otel-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-perl" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-perl-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-postgres" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-postgres-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-redis2" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-redis2-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-rtmp" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-rtmp-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-set-misc" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-set-misc-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-subs" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-subs-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-testcookie" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-testcookie-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-unbrotli" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-unbrotli-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-upload" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-upload-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-vod" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-vod-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-vts" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-vts-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-wamr" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-wamr-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-wasm" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-wasm-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-wasmtime" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-wasmtime-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-xslt" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-xslt-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-zip" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-zip-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
				<package name="angie-module-zstd" epoch="0" version="1.11.3" release="1.red80" arch="aarch64" src="angie-1.11.3-1.red80.src.rpm">
					<filename>angie-module-zstd-0:1.11.3-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-80-0001</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2026-1847-8.0/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2026-1847-8.0/" type="self" id="ROS-20260311-80-0001" title="ROS-20260311-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1847" type="cve" id="CVE-2026-1847" title="CVE-2026-1847" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-80-0002</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2026-1848-8.0/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2026-1848-8.0/" type="self" id="ROS-20260311-80-0002" title="ROS-20260311-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1848" type="cve" id="CVE-2026-1848" title="CVE-2026-1848" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-80-0003</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2026-25609-8.0/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2026-25609-8.0/" type="self" id="ROS-20260311-80-0003" title="ROS-20260311-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25609" type="cve" id="CVE-2026-25609" title="CVE-2026-25609" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-80-0004</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2020-25710-8.0/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2020-25710-8.0/" type="self" id="ROS-20260311-80-0004" title="ROS-20260311-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25710" type="cve" id="CVE-2020-25710" title="CVE-2020-25710" />
			<reference href="https://bdu.fstec.ru/vul/2022-00230" type="self" id="BDU:2022-00230" title="BDU:2022-00230" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-80-0005</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2026-25611-8.0/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2026-25611-8.0/" type="self" id="ROS-20260311-80-0005" title="ROS-20260311-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25611" type="cve" id="CVE-2026-25611" title="CVE-2026-25611" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-80-0006</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2026-25610-8.0/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2026-25610-8.0/" type="self" id="ROS-20260311-80-0006" title="ROS-20260311-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25610" type="cve" id="CVE-2026-25610" title="CVE-2026-25610" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-80-0007</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2026-25612-8.0/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2026-25612-8.0/" type="self" id="ROS-20260311-80-0007" title="ROS-20260311-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25612" type="cve" id="CVE-2026-25612" title="CVE-2026-25612" />
			<reference href="https://bdu.fstec.ru/vul/2026-01954" type="self" id="BDU:2026-01954" title="BDU:2026-01954" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-80-0008</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2026-1849-8.0/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2026-1849-8.0/" type="self" id="ROS-20260311-80-0008" title="ROS-20260311-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1849" type="cve" id="CVE-2026-1849" title="CVE-2026-1849" />
			<reference href="https://bdu.fstec.ru/vul/2026-01873" type="self" id="BDU:2026-01873" title="BDU:2026-01873" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-80-0009</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2026-1850-8.0/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2026-1850-8.0/" type="self" id="ROS-20260311-80-0009" title="ROS-20260311-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1850" type="cve" id="CVE-2026-1850" title="CVE-2026-1850" />
			<reference href="https://bdu.fstec.ru/vul/2026-01863" type="self" id="BDU:2026-01863" title="BDU:2026-01863" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-80-0010</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость mongodb-org </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongodb-org</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2026-25613-8.0/</description>
               <solution>Установить обновление для пакета(ов) mongodb-org
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongodb-org-cve-2026-25613-8.0/" type="self" id="ROS-20260311-80-0010" title="ROS-20260311-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25613" type="cve" id="CVE-2026-25613" title="CVE-2026-25613" />
			<reference href="https://bdu.fstec.ru/vul/2026-01862" type="self" id="BDU:2026-01862" title="BDU:2026-01862" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="x86_64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="mongodb-org" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-mongos" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-mongos-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-server" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-server-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
				<package name="mongodb-org-shell" epoch="0" version="7.0.30" release="1.red80" arch="aarch64" src="mongodb-org-7.0.30-1.red80.src.rpm">
					<filename>mongodb-org-shell-0:7.0.30-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-80-0011</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость grafana </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-grafana-cve-2025-41117-8.0/</description>
               <solution>Установить обновление для пакета(ов) grafana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-grafana-cve-2025-41117-8.0/" type="self" id="ROS-20260311-80-0011" title="ROS-20260311-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-41117" type="cve" id="CVE-2025-41117" title="CVE-2025-41117" />
			<reference href="https://bdu.fstec.ru/vul/2026-02010" type="self" id="BDU:2026-02010" title="BDU:2026-02010" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="grafana" epoch="0" version="12.3.3" release="1.red80" arch="x86_64" src="grafana-12.3.3-1.red80.src.rpm">
					<filename>grafana-0:12.3.3-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="grafana" epoch="0" version="12.3.3" release="1.red80" arch="aarch64" src="grafana-12.3.3-1.red80.src.rpm">
					<filename>grafana-0:12.3.3-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="grafana-selinux" epoch="0" version="12.3.3" release="1.red80" arch="noarch" src="grafana-12.3.3-1.red80.src.rpm">
					<filename>grafana-selinux-0:12.3.3-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-80-0012</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость grafana </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в grafana</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-grafana-cve-2026-21721-8.0/</description>
               <solution>Установить обновление для пакета(ов) grafana
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-grafana-cve-2026-21721-8.0/" type="self" id="ROS-20260311-80-0012" title="ROS-20260311-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21721" type="cve" id="CVE-2026-21721" title="CVE-2026-21721" />
			<reference href="https://bdu.fstec.ru/vul/2026-01120" type="self" id="BDU:2026-01120" title="BDU:2026-01120" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="grafana" epoch="0" version="12.3.3" release="1.red80" arch="x86_64" src="grafana-12.3.3-1.red80.src.rpm">
					<filename>grafana-0:12.3.3-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="grafana" epoch="0" version="12.3.3" release="1.red80" arch="aarch64" src="grafana-12.3.3-1.red80.src.rpm">
					<filename>grafana-0:12.3.3-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="grafana-selinux" epoch="0" version="12.3.3" release="1.red80" arch="noarch" src="grafana-12.3.3-1.red80.src.rpm">
					<filename>grafana-selinux-0:12.3.3-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-80-0013</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость python-aiohttp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-aiohttp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-aiohttp-cve-2025-53643-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-aiohttp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-aiohttp-cve-2025-53643-8.0/" type="self" id="ROS-20260311-80-0013" title="ROS-20260311-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53643" type="cve" id="CVE-2025-53643" title="CVE-2025-53643" />
			<reference href="https://bdu.fstec.ru/vul/2025-15590" type="self" id="BDU:2025-15590" title="BDU:2025-15590" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="python3-aiohttp" epoch="0" version="3.10.11" release="2.red80" arch="x86_64" src="python-aiohttp-3.10.11-2.red80.src.rpm">
					<filename>python3-aiohttp-0:3.10.11-2.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-aiohttp+speedups" epoch="0" version="3.10.11" release="2.red80" arch="x86_64" src="python-aiohttp-3.10.11-2.red80.src.rpm">
					<filename>python3-aiohttp+speedups-0:3.10.11-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="python3-aiohttp" epoch="0" version="3.10.11" release="2.red80" arch="aarch64" src="python-aiohttp-3.10.11-2.red80.src.rpm">
					<filename>python3-aiohttp-0:3.10.11-2.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-aiohttp+speedups" epoch="0" version="3.10.11" release="2.red80" arch="aarch64" src="python-aiohttp-3.10.11-2.red80.src.rpm">
					<filename>python3-aiohttp+speedups-0:3.10.11-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-80-0014</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость golang-k8s-ingress-nginx </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-k8s-ingress-nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-k8s-ingress-nginx-cve-2026-24512-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang-k8s-ingress-nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-k8s-ingress-nginx-cve-2026-24512-8.0/" type="self" id="ROS-20260311-80-0014" title="ROS-20260311-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24512" type="cve" id="CVE-2026-24512" title="CVE-2026-24512" />
			<reference href="https://bdu.fstec.ru/vul/2026-01287" type="self" id="BDU:2026-01287" title="BDU:2026-01287" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="golang-k8s-ingress-nginx" epoch="0" version="1.13.7" release="1.red80" arch="x86_64" src="golang-k8s-ingress-nginx-1.13.7-1.red80.src.rpm">
					<filename>golang-k8s-ingress-nginx-0:1.13.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="golang-k8s-ingress-nginx" epoch="0" version="1.13.7" release="1.red80" arch="aarch64" src="golang-k8s-ingress-nginx-1.13.7-1.red80.src.rpm">
					<filename>golang-k8s-ingress-nginx-0:1.13.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-80-0015</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость golang-k8s-ingress-nginx </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в golang-k8s-ingress-nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-k8s-ingress-nginx-cve-2026-24513-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang-k8s-ingress-nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-k8s-ingress-nginx-cve-2026-24513-8.0/" type="self" id="ROS-20260311-80-0015" title="ROS-20260311-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24513" type="cve" id="CVE-2026-24513" title="CVE-2026-24513" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="golang-k8s-ingress-nginx" epoch="0" version="1.13.7" release="1.red80" arch="x86_64" src="golang-k8s-ingress-nginx-1.13.7-1.red80.src.rpm">
					<filename>golang-k8s-ingress-nginx-0:1.13.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="golang-k8s-ingress-nginx" epoch="0" version="1.13.7" release="1.red80" arch="aarch64" src="golang-k8s-ingress-nginx-1.13.7-1.red80.src.rpm">
					<filename>golang-k8s-ingress-nginx-0:1.13.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-80-0016</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость golang-k8s-ingress-nginx </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang-k8s-ingress-nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-k8s-ingress-nginx-cve-2026-24514-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang-k8s-ingress-nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-k8s-ingress-nginx-cve-2026-24514-8.0/" type="self" id="ROS-20260311-80-0016" title="ROS-20260311-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24514" type="cve" id="CVE-2026-24514" title="CVE-2026-24514" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="golang-k8s-ingress-nginx" epoch="0" version="1.13.7" release="1.red80" arch="x86_64" src="golang-k8s-ingress-nginx-1.13.7-1.red80.src.rpm">
					<filename>golang-k8s-ingress-nginx-0:1.13.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="golang-k8s-ingress-nginx" epoch="0" version="1.13.7" release="1.red80" arch="aarch64" src="golang-k8s-ingress-nginx-1.13.7-1.red80.src.rpm">
					<filename>golang-k8s-ingress-nginx-0:1.13.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-80-0017</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-expat-cve-2026-25210-8.0/</description>
               <solution>Установить обновление для пакета(ов) expat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-expat-cve-2026-25210-8.0/" type="self" id="ROS-20260311-80-0017" title="ROS-20260311-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25210" type="cve" id="CVE-2026-25210" title="CVE-2026-25210" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="expat" epoch="0" version="2.7.4" release="1.red80" arch="x86_64" src="expat-2.7.4-1.red80.src.rpm">
					<filename>expat-0:2.7.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="expat-devel" epoch="0" version="2.7.4" release="1.red80" arch="x86_64" src="expat-2.7.4-1.red80.src.rpm">
					<filename>expat-devel-0:2.7.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="expat-static" epoch="0" version="2.7.4" release="1.red80" arch="x86_64" src="expat-2.7.4-1.red80.src.rpm">
					<filename>expat-static-0:2.7.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="expat" epoch="0" version="2.7.4" release="1.red80" arch="aarch64" src="expat-2.7.4-1.red80.src.rpm">
					<filename>expat-0:2.7.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="expat-devel" epoch="0" version="2.7.4" release="1.red80" arch="aarch64" src="expat-2.7.4-1.red80.src.rpm">
					<filename>expat-devel-0:2.7.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="expat-static" epoch="0" version="2.7.4" release="1.red80" arch="aarch64" src="expat-2.7.4-1.red80.src.rpm">
					<filename>expat-static-0:2.7.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260311-80-0018</id>
		<issued date="2026-03-11" />
		<updated date="2026-03-11" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-expat-cve-2026-24515-8.0/</description>
               <solution>Установить обновление для пакета(ов) expat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-expat-cve-2026-24515-8.0/" type="self" id="ROS-20260311-80-0018" title="ROS-20260311-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24515" type="cve" id="CVE-2026-24515" title="CVE-2026-24515" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="expat" epoch="0" version="2.7.4" release="1.red80" arch="x86_64" src="expat-2.7.4-1.red80.src.rpm">
					<filename>expat-0:2.7.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="expat-devel" epoch="0" version="2.7.4" release="1.red80" arch="x86_64" src="expat-2.7.4-1.red80.src.rpm">
					<filename>expat-devel-0:2.7.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="expat-static" epoch="0" version="2.7.4" release="1.red80" arch="x86_64" src="expat-2.7.4-1.red80.src.rpm">
					<filename>expat-static-0:2.7.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="expat" epoch="0" version="2.7.4" release="1.red80" arch="aarch64" src="expat-2.7.4-1.red80.src.rpm">
					<filename>expat-0:2.7.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="expat-devel" epoch="0" version="2.7.4" release="1.red80" arch="aarch64" src="expat-2.7.4-1.red80.src.rpm">
					<filename>expat-devel-0:2.7.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="expat-static" epoch="0" version="2.7.4" release="1.red80" arch="aarch64" src="expat-2.7.4-1.red80.src.rpm">
					<filename>expat-static-0:2.7.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0001</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38386-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38386-8.0/" type="self" id="ROS-20260313-80-0001" title="ROS-20260313-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38386" type="cve" id="CVE-2025-38386" title="CVE-2025-38386" />
			<reference href="https://bdu.fstec.ru/vul/2025-10801" type="self" id="BDU:2025-10801" title="BDU:2025-10801" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0002</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38387-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38387-8.0/" type="self" id="ROS-20260313-80-0002" title="ROS-20260313-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38387" type="cve" id="CVE-2025-38387" title="CVE-2025-38387" />
			<reference href="https://bdu.fstec.ru/vul/2025-10794" type="self" id="BDU:2025-10794" title="BDU:2025-10794" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0003</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38389-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38389-8.0/" type="self" id="ROS-20260313-80-0003" title="ROS-20260313-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38389" type="cve" id="CVE-2025-38389" title="CVE-2025-38389" />
			<reference href="https://bdu.fstec.ru/vul/2025-13498" type="self" id="BDU:2025-13498" title="BDU:2025-13498" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0004</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38391-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38391-8.0/" type="self" id="ROS-20260313-80-0004" title="ROS-20260313-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38391" type="cve" id="CVE-2025-38391" title="CVE-2025-38391" />
			<reference href="https://bdu.fstec.ru/vul/2025-10800" type="self" id="BDU:2025-10800" title="BDU:2025-10800" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0005</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38393-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38393-8.0/" type="self" id="ROS-20260313-80-0005" title="ROS-20260313-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38393" type="cve" id="CVE-2025-38393" title="CVE-2025-38393" />
			<reference href="https://bdu.fstec.ru/vul/2025-10799" type="self" id="BDU:2025-10799" title="BDU:2025-10799" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0006</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38395-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38395-8.0/" type="self" id="ROS-20260313-80-0006" title="ROS-20260313-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38395" type="cve" id="CVE-2025-38395" title="CVE-2025-38395" />
			<reference href="https://bdu.fstec.ru/vul/2025-11113" type="self" id="BDU:2025-11113" title="BDU:2025-11113" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0007</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38396-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38396-8.0/" type="self" id="ROS-20260313-80-0007" title="ROS-20260313-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38396" type="cve" id="CVE-2025-38396" title="CVE-2025-38396" />
			<reference href="https://bdu.fstec.ru/vul/2025-10787" type="self" id="BDU:2025-10787" title="BDU:2025-10787" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0008</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38399-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38399-8.0/" type="self" id="ROS-20260313-80-0008" title="ROS-20260313-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38399" type="cve" id="CVE-2025-38399" title="CVE-2025-38399" />
			<reference href="https://bdu.fstec.ru/vul/2025-10789" type="self" id="BDU:2025-10789" title="BDU:2025-10789" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0009</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38400-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38400-8.0/" type="self" id="ROS-20260313-80-0009" title="ROS-20260313-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38400" type="cve" id="CVE-2025-38400" title="CVE-2025-38400" />
			<reference href="https://bdu.fstec.ru/vul/2025-10791" type="self" id="BDU:2025-10791" title="BDU:2025-10791" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0010</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38401-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38401-8.0/" type="self" id="ROS-20260313-80-0010" title="ROS-20260313-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38401" type="cve" id="CVE-2025-38401" title="CVE-2025-38401" />
			<reference href="https://bdu.fstec.ru/vul/2025-13493" type="self" id="BDU:2025-13493" title="BDU:2025-13493" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0011</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38403-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38403-8.0/" type="self" id="ROS-20260313-80-0011" title="ROS-20260313-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38403" type="cve" id="CVE-2025-38403" title="CVE-2025-38403" />
			<reference href="https://bdu.fstec.ru/vul/2025-10792" type="self" id="BDU:2025-10792" title="BDU:2025-10792" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0012</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38406-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38406-8.0/" type="self" id="ROS-20260313-80-0012" title="ROS-20260313-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38406" type="cve" id="CVE-2025-38406" title="CVE-2025-38406" />
			<reference href="https://bdu.fstec.ru/vul/2025-13494" type="self" id="BDU:2025-13494" title="BDU:2025-13494" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0013</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38409-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38409-8.0/" type="self" id="ROS-20260313-80-0013" title="ROS-20260313-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38409" type="cve" id="CVE-2025-38409" title="CVE-2025-38409" />
			<reference href="https://bdu.fstec.ru/vul/2025-09128" type="self" id="BDU:2025-09128" title="BDU:2025-09128" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0014</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38410-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38410-8.0/" type="self" id="ROS-20260313-80-0014" title="ROS-20260313-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38410" type="cve" id="CVE-2025-38410" title="CVE-2025-38410" />
			<reference href="https://bdu.fstec.ru/vul/2025-09130" type="self" id="BDU:2025-09130" title="BDU:2025-09130" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0015</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38412-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38412-8.0/" type="self" id="ROS-20260313-80-0015" title="ROS-20260313-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38412" type="cve" id="CVE-2025-38412" title="CVE-2025-38412" />
			<reference href="https://bdu.fstec.ru/vul/2025-10600" type="self" id="BDU:2025-10600" title="BDU:2025-10600" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0016</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38437-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38437-8.0/" type="self" id="ROS-20260313-80-0016" title="ROS-20260313-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38437" type="cve" id="CVE-2025-38437" title="CVE-2025-38437" />
			<reference href="https://bdu.fstec.ru/vul/2025-09194" type="self" id="BDU:2025-09194" title="BDU:2025-09194" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0017</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38440-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38440-8.0/" type="self" id="ROS-20260313-80-0017" title="ROS-20260313-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38440" type="cve" id="CVE-2025-38440" title="CVE-2025-38440" />
			<reference href="https://bdu.fstec.ru/vul/2025-09230" type="self" id="BDU:2025-09230" title="BDU:2025-09230" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0018</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38439-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38439-8.0/" type="self" id="ROS-20260313-80-0018" title="ROS-20260313-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38439" type="cve" id="CVE-2025-38439" title="CVE-2025-38439" />
			<reference href="https://bdu.fstec.ru/vul/2025-09199" type="self" id="BDU:2025-09199" title="BDU:2025-09199" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0019</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38441-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38441-8.0/" type="self" id="ROS-20260313-80-0019" title="ROS-20260313-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38441" type="cve" id="CVE-2025-38441" title="CVE-2025-38441" />
			<reference href="https://bdu.fstec.ru/vul/2025-09228" type="self" id="BDU:2025-09228" title="BDU:2025-09228" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0020</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38443-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38443-8.0/" type="self" id="ROS-20260313-80-0020" title="ROS-20260313-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38443" type="cve" id="CVE-2025-38443" title="CVE-2025-38443" />
			<reference href="https://bdu.fstec.ru/vul/2025-09225" type="self" id="BDU:2025-09225" title="BDU:2025-09225" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0021</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38444-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38444-8.0/" type="self" id="ROS-20260313-80-0021" title="ROS-20260313-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38444" type="cve" id="CVE-2025-38444" title="CVE-2025-38444" />
			<reference href="https://bdu.fstec.ru/vul/2025-09183" type="self" id="BDU:2025-09183" title="BDU:2025-09183" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0022</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38445-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38445-8.0/" type="self" id="ROS-20260313-80-0022" title="ROS-20260313-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38445" type="cve" id="CVE-2025-38445" title="CVE-2025-38445" />
			<reference href="https://bdu.fstec.ru/vul/2025-09190" type="self" id="BDU:2025-09190" title="BDU:2025-09190" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0023</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38446-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38446-8.0/" type="self" id="ROS-20260313-80-0023" title="ROS-20260313-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38446" type="cve" id="CVE-2025-38446" title="CVE-2025-38446" />
			<reference href="https://bdu.fstec.ru/vul/2025-09234" type="self" id="BDU:2025-09234" title="BDU:2025-09234" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0024</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38448-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38448-8.0/" type="self" id="ROS-20260313-80-0024" title="ROS-20260313-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38448" type="cve" id="CVE-2025-38448" title="CVE-2025-38448" />
			<reference href="https://bdu.fstec.ru/vul/2025-09187" type="self" id="BDU:2025-09187" title="BDU:2025-09187" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0025</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38450-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38450-8.0/" type="self" id="ROS-20260313-80-0025" title="ROS-20260313-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38450" type="cve" id="CVE-2025-38450" title="CVE-2025-38450" />
			<reference href="https://bdu.fstec.ru/vul/2025-11509" type="self" id="BDU:2025-11509" title="BDU:2025-11509" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0026</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38451-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38451-8.0/" type="self" id="ROS-20260313-80-0026" title="ROS-20260313-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38451" type="cve" id="CVE-2025-38451" title="CVE-2025-38451" />
			<reference href="https://bdu.fstec.ru/vul/2025-09235" type="self" id="BDU:2025-09235" title="BDU:2025-09235" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0027</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38452-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38452-8.0/" type="self" id="ROS-20260313-80-0027" title="ROS-20260313-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38452" type="cve" id="CVE-2025-38452" title="CVE-2025-38452" />
			<reference href="https://bdu.fstec.ru/vul/2025-09186" type="self" id="BDU:2025-09186" title="BDU:2025-09186" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0028</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38453-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38453-8.0/" type="self" id="ROS-20260313-80-0028" title="ROS-20260313-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38453" type="cve" id="CVE-2025-38453" title="CVE-2025-38453" />
			<reference href="https://bdu.fstec.ru/vul/2025-11508" type="self" id="BDU:2025-11508" title="BDU:2025-11508" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0029</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38454-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38454-8.0/" type="self" id="ROS-20260313-80-0029" title="ROS-20260313-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38454" type="cve" id="CVE-2025-38454" title="CVE-2025-38454" />
			<reference href="https://bdu.fstec.ru/vul/2025-11502" type="self" id="BDU:2025-11502" title="BDU:2025-11502" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0030</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38455-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38455-8.0/" type="self" id="ROS-20260313-80-0030" title="ROS-20260313-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38455" type="cve" id="CVE-2025-38455" title="CVE-2025-38455" />
			<reference href="https://bdu.fstec.ru/vul/2025-09811" type="self" id="BDU:2025-09811" title="BDU:2025-09811" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0031</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38456-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38456-8.0/" type="self" id="ROS-20260313-80-0031" title="ROS-20260313-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38456" type="cve" id="CVE-2025-38456" title="CVE-2025-38456" />
			<reference href="https://bdu.fstec.ru/vul/2025-09812" type="self" id="BDU:2025-09812" title="BDU:2025-09812" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0032</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38457-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38457-8.0/" type="self" id="ROS-20260313-80-0032" title="ROS-20260313-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38457" type="cve" id="CVE-2025-38457" title="CVE-2025-38457" />
			<reference href="https://bdu.fstec.ru/vul/2025-11503" type="self" id="BDU:2025-11503" title="BDU:2025-11503" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0033</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38458-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38458-8.0/" type="self" id="ROS-20260313-80-0033" title="ROS-20260313-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38458" type="cve" id="CVE-2025-38458" title="CVE-2025-38458" />
			<reference href="https://bdu.fstec.ru/vul/2025-11504" type="self" id="BDU:2025-11504" title="BDU:2025-11504" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0034</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38459-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38459-8.0/" type="self" id="ROS-20260313-80-0034" title="ROS-20260313-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38459" type="cve" id="CVE-2025-38459" title="CVE-2025-38459" />
			<reference href="https://bdu.fstec.ru/vul/2025-09813" type="self" id="BDU:2025-09813" title="BDU:2025-09813" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0035</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38460-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38460-8.0/" type="self" id="ROS-20260313-80-0035" title="ROS-20260313-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38460" type="cve" id="CVE-2025-38460" title="CVE-2025-38460" />
			<reference href="https://bdu.fstec.ru/vul/2025-09814" type="self" id="BDU:2025-09814" title="BDU:2025-09814" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0036</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38461-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38461-8.0/" type="self" id="ROS-20260313-80-0036" title="ROS-20260313-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38461" type="cve" id="CVE-2025-38461" title="CVE-2025-38461" />
			<reference href="https://bdu.fstec.ru/vul/2025-09815" type="self" id="BDU:2025-09815" title="BDU:2025-09815" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0037</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38462-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38462-8.0/" type="self" id="ROS-20260313-80-0037" title="ROS-20260313-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38462" type="cve" id="CVE-2025-38462" title="CVE-2025-38462" />
			<reference href="https://bdu.fstec.ru/vul/2025-14090" type="self" id="BDU:2025-14090" title="BDU:2025-14090" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0038</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38463-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38463-8.0/" type="self" id="ROS-20260313-80-0038" title="ROS-20260313-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38463" type="cve" id="CVE-2025-38463" title="CVE-2025-38463" />
			<reference href="https://bdu.fstec.ru/vul/2025-09816" type="self" id="BDU:2025-09816" title="BDU:2025-09816" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0039</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38464-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38464-8.0/" type="self" id="ROS-20260313-80-0039" title="ROS-20260313-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38464" type="cve" id="CVE-2025-38464" title="CVE-2025-38464" />
			<reference href="https://bdu.fstec.ru/vul/2025-09817" type="self" id="BDU:2025-09817" title="BDU:2025-09817" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0040</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38465-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38465-8.0/" type="self" id="ROS-20260313-80-0040" title="ROS-20260313-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38465" type="cve" id="CVE-2025-38465" title="CVE-2025-38465" />
			<reference href="https://bdu.fstec.ru/vul/2025-09818" type="self" id="BDU:2025-09818" title="BDU:2025-09818" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0041</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38466-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38466-8.0/" type="self" id="ROS-20260313-80-0041" title="ROS-20260313-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38466" type="cve" id="CVE-2025-38466" title="CVE-2025-38466" />
			<reference href="https://bdu.fstec.ru/vul/2025-09819" type="self" id="BDU:2025-09819" title="BDU:2025-09819" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0042</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38467-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38467-8.0/" type="self" id="ROS-20260313-80-0042" title="ROS-20260313-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38467" type="cve" id="CVE-2025-38467" title="CVE-2025-38467" />
			<reference href="https://bdu.fstec.ru/vul/2025-11506" type="self" id="BDU:2025-11506" title="BDU:2025-11506" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0043</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38468-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38468-8.0/" type="self" id="ROS-20260313-80-0043" title="ROS-20260313-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38468" type="cve" id="CVE-2025-38468" title="CVE-2025-38468" />
			<reference href="https://bdu.fstec.ru/vul/2025-09175" type="self" id="BDU:2025-09175" title="BDU:2025-09175" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0044</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38469-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38469-8.0/" type="self" id="ROS-20260313-80-0044" title="ROS-20260313-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38469" type="cve" id="CVE-2025-38469" title="CVE-2025-38469" />
			<reference href="https://bdu.fstec.ru/vul/2025-13509" type="self" id="BDU:2025-13509" title="BDU:2025-13509" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0045</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38470-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38470-8.0/" type="self" id="ROS-20260313-80-0045" title="ROS-20260313-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38470" type="cve" id="CVE-2025-38470" title="CVE-2025-38470" />
			<reference href="https://bdu.fstec.ru/vul/2025-10795" type="self" id="BDU:2025-10795" title="BDU:2025-10795" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0046</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38471-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38471-8.0/" type="self" id="ROS-20260313-80-0046" title="ROS-20260313-80-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38471" type="cve" id="CVE-2025-38471" title="CVE-2025-38471" />
			<reference href="https://bdu.fstec.ru/vul/2025-10796" type="self" id="BDU:2025-10796" title="BDU:2025-10796" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0047</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38472-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38472-8.0/" type="self" id="ROS-20260313-80-0047" title="ROS-20260313-80-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38472" type="cve" id="CVE-2025-38472" title="CVE-2025-38472" />
			<reference href="https://bdu.fstec.ru/vul/2025-10797" type="self" id="BDU:2025-10797" title="BDU:2025-10797" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0048</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38473-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38473-8.0/" type="self" id="ROS-20260313-80-0048" title="ROS-20260313-80-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38473" type="cve" id="CVE-2025-38473" title="CVE-2025-38473" />
			<reference href="https://bdu.fstec.ru/vul/2025-10798" type="self" id="BDU:2025-10798" title="BDU:2025-10798" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260313-80-0049</id>
		<issued date="2026-03-13" />
		<updated date="2026-03-13" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38474-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38474-8.0/" type="self" id="ROS-20260313-80-0049" title="ROS-20260313-80-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38474" type="cve" id="CVE-2025-38474" title="CVE-2025-38474" />
			<reference href="https://bdu.fstec.ru/vul/2025-09176" type="self" id="BDU:2025-09176" title="BDU:2025-09176" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0001</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38265-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38265-8.0/" type="self" id="ROS-20260317-80-0001" title="ROS-20260317-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38265" type="cve" id="CVE-2025-38265" title="CVE-2025-38265" />
			<reference href="https://bdu.fstec.ru/vul/2025-10560" type="self" id="BDU:2025-10560" title="BDU:2025-10560" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0002</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38345-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38345-8.0/" type="self" id="ROS-20260317-80-0002" title="ROS-20260317-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38345" type="cve" id="CVE-2025-38345" title="CVE-2025-38345" />
			<reference href="https://bdu.fstec.ru/vul/2025-09628" type="self" id="BDU:2025-09628" title="BDU:2025-09628" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0003</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38346-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38346-8.0/" type="self" id="ROS-20260317-80-0003" title="ROS-20260317-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38346" type="cve" id="CVE-2025-38346" title="CVE-2025-38346" />
			<reference href="https://bdu.fstec.ru/vul/2025-09917" type="self" id="BDU:2025-09917" title="BDU:2025-09917" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0004</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38347-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38347-8.0/" type="self" id="ROS-20260317-80-0004" title="ROS-20260317-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38347" type="cve" id="CVE-2025-38347" title="CVE-2025-38347" />
			<reference href="https://bdu.fstec.ru/vul/2025-08807" type="self" id="BDU:2025-08807" title="BDU:2025-08807" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0005</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38348-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38348-8.0/" type="self" id="ROS-20260317-80-0005" title="ROS-20260317-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38348" type="cve" id="CVE-2025-38348" title="CVE-2025-38348" />
			<reference href="https://bdu.fstec.ru/vul/2025-09657" type="self" id="BDU:2025-09657" title="BDU:2025-09657" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0006</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38351-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38351-8.0/" type="self" id="ROS-20260317-80-0006" title="ROS-20260317-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38351" type="cve" id="CVE-2025-38351" title="CVE-2025-38351" />
			<reference href="https://bdu.fstec.ru/vul/2025-13472" type="self" id="BDU:2025-13472" title="BDU:2025-13472" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0007</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38361-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38361-8.0/" type="self" id="ROS-20260317-80-0007" title="ROS-20260317-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38361" type="cve" id="CVE-2025-38361" title="CVE-2025-38361" />
			<reference href="https://bdu.fstec.ru/vul/2025-16076" type="self" id="BDU:2025-16076" title="BDU:2025-16076" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0008</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38364-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38364-8.0/" type="self" id="ROS-20260317-80-0008" title="ROS-20260317-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38364" type="cve" id="CVE-2025-38364" title="CVE-2025-38364" />
			<reference href="https://bdu.fstec.ru/vul/2025-09245" type="self" id="BDU:2025-09245" title="BDU:2025-09245" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0009</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38371-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38371-8.0/" type="self" id="ROS-20260317-80-0009" title="ROS-20260317-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38371" type="cve" id="CVE-2025-38371" title="CVE-2025-38371" />
			<reference href="https://bdu.fstec.ru/vul/2025-09143" type="self" id="BDU:2025-09143" title="BDU:2025-09143" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0010</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38375-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38375-8.0/" type="self" id="ROS-20260317-80-0010" title="ROS-20260317-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38375" type="cve" id="CVE-2025-38375" title="CVE-2025-38375" />
			<reference href="https://bdu.fstec.ru/vul/2025-09140" type="self" id="BDU:2025-09140" title="BDU:2025-09140" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0011</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38377-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38377-8.0/" type="self" id="ROS-20260317-80-0011" title="ROS-20260317-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38377" type="cve" id="CVE-2025-38377" title="CVE-2025-38377" />
			<reference href="https://bdu.fstec.ru/vul/2025-13512" type="self" id="BDU:2025-13512" title="BDU:2025-13512" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0012</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38380-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38380-8.0/" type="self" id="ROS-20260317-80-0012" title="ROS-20260317-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38380" type="cve" id="CVE-2025-38380" title="CVE-2025-38380" />
			<reference href="https://bdu.fstec.ru/vul/2025-09138" type="self" id="BDU:2025-09138" title="BDU:2025-09138" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0013</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38382-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38382-8.0/" type="self" id="ROS-20260317-80-0013" title="ROS-20260317-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38382" type="cve" id="CVE-2025-38382" title="CVE-2025-38382" />
			<reference href="https://bdu.fstec.ru/vul/2025-09172" type="self" id="BDU:2025-09172" title="BDU:2025-09172" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0014</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38384-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38384-8.0/" type="self" id="ROS-20260317-80-0014" title="ROS-20260317-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38384" type="cve" id="CVE-2025-38384" title="CVE-2025-38384" />
			<reference href="https://bdu.fstec.ru/vul/2025-11114" type="self" id="BDU:2025-11114" title="BDU:2025-11114" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0015</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38385-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38385-8.0/" type="self" id="ROS-20260317-80-0015" title="ROS-20260317-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38385" type="cve" id="CVE-2025-38385" title="CVE-2025-38385" />
			<reference href="https://bdu.fstec.ru/vul/2025-10802" type="self" id="BDU:2025-10802" title="BDU:2025-10802" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0016</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38408-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38408-8.0/" type="self" id="ROS-20260317-80-0016" title="ROS-20260317-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38408" type="cve" id="CVE-2025-38408" title="CVE-2025-38408" />
			<reference href="https://bdu.fstec.ru/vul/2025-09131" type="self" id="BDU:2025-09131" title="BDU:2025-09131" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0017</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38475-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38475-8.0/" type="self" id="ROS-20260317-80-0017" title="ROS-20260317-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38475" type="cve" id="CVE-2025-38475" title="CVE-2025-38475" />
			<reference href="https://bdu.fstec.ru/vul/2025-10806" type="self" id="BDU:2025-10806" title="BDU:2025-10806" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0018</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38476-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38476-8.0/" type="self" id="ROS-20260317-80-0018" title="ROS-20260317-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38476" type="cve" id="CVE-2025-38476" title="CVE-2025-38476" />
			<reference href="https://bdu.fstec.ru/vul/2025-13511" type="self" id="BDU:2025-13511" title="BDU:2025-13511" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0019</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38477-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38477-8.0/" type="self" id="ROS-20260317-80-0019" title="ROS-20260317-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38477" type="cve" id="CVE-2025-38477" title="CVE-2025-38477" />
			<reference href="https://bdu.fstec.ru/vul/2025-09177" type="self" id="BDU:2025-09177" title="BDU:2025-09177" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0020</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38478-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38478-8.0/" type="self" id="ROS-20260317-80-0020" title="ROS-20260317-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38478" type="cve" id="CVE-2025-38478" title="CVE-2025-38478" />
			<reference href="https://bdu.fstec.ru/vul/2025-10804" type="self" id="BDU:2025-10804" title="BDU:2025-10804" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0021</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38480-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38480-8.0/" type="self" id="ROS-20260317-80-0021" title="ROS-20260317-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38480" type="cve" id="CVE-2025-38480" title="CVE-2025-38480" />
			<reference href="https://bdu.fstec.ru/vul/2025-09178" type="self" id="BDU:2025-09178" title="BDU:2025-09178" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0022</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38481-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38481-8.0/" type="self" id="ROS-20260317-80-0022" title="ROS-20260317-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38481" type="cve" id="CVE-2025-38481" title="CVE-2025-38481" />
			<reference href="https://bdu.fstec.ru/vul/2025-09179" type="self" id="BDU:2025-09179" title="BDU:2025-09179" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0023</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38482-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38482-8.0/" type="self" id="ROS-20260317-80-0023" title="ROS-20260317-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38482" type="cve" id="CVE-2025-38482" title="CVE-2025-38482" />
			<reference href="https://bdu.fstec.ru/vul/2025-09180" type="self" id="BDU:2025-09180" title="BDU:2025-09180" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0024</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38483-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38483-8.0/" type="self" id="ROS-20260317-80-0024" title="ROS-20260317-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38483" type="cve" id="CVE-2025-38483" title="CVE-2025-38483" />
			<reference href="https://bdu.fstec.ru/vul/2025-09181" type="self" id="BDU:2025-09181" title="BDU:2025-09181" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0025</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38484-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38484-8.0/" type="self" id="ROS-20260317-80-0025" title="ROS-20260317-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38484" type="cve" id="CVE-2025-38484" title="CVE-2025-38484" />
			<reference href="https://bdu.fstec.ru/vul/2025-09242" type="self" id="BDU:2025-09242" title="BDU:2025-09242" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0026</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38485-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38485-8.0/" type="self" id="ROS-20260317-80-0026" title="ROS-20260317-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38485" type="cve" id="CVE-2025-38485" title="CVE-2025-38485" />
			<reference href="https://bdu.fstec.ru/vul/2025-13513" type="self" id="BDU:2025-13513" title="BDU:2025-13513" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0027</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38487-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38487-8.0/" type="self" id="ROS-20260317-80-0027" title="ROS-20260317-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38487" type="cve" id="CVE-2025-38487" title="CVE-2025-38487" />
			<reference href="https://bdu.fstec.ru/vul/2025-13514" type="self" id="BDU:2025-13514" title="BDU:2025-13514" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0028</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38488-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38488-8.0/" type="self" id="ROS-20260317-80-0028" title="ROS-20260317-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38488" type="cve" id="CVE-2025-38488" title="CVE-2025-38488" />
			<reference href="https://bdu.fstec.ru/vul/2025-10805" type="self" id="BDU:2025-10805" title="BDU:2025-10805" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0029</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38489-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38489-8.0/" type="self" id="ROS-20260317-80-0029" title="ROS-20260317-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38489" type="cve" id="CVE-2025-38489" title="CVE-2025-38489" />
			<reference href="https://bdu.fstec.ru/vul/2025-13515" type="self" id="BDU:2025-13515" title="BDU:2025-13515" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0030</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38490-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38490-8.0/" type="self" id="ROS-20260317-80-0030" title="ROS-20260317-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38490" type="cve" id="CVE-2025-38490" title="CVE-2025-38490" />
			<reference href="https://bdu.fstec.ru/vul/2025-11512" type="self" id="BDU:2025-11512" title="BDU:2025-11512" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0031</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38491-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38491-8.0/" type="self" id="ROS-20260317-80-0031" title="ROS-20260317-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38491" type="cve" id="CVE-2025-38491" title="CVE-2025-38491" />
			<reference href="https://bdu.fstec.ru/vul/2025-13520" type="self" id="BDU:2025-13520" title="BDU:2025-13520" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0032</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38493-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38493-8.0/" type="self" id="ROS-20260317-80-0032" title="ROS-20260317-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38493" type="cve" id="CVE-2025-38493" title="CVE-2025-38493" />
			<reference href="https://bdu.fstec.ru/vul/2025-13521" type="self" id="BDU:2025-13521" title="BDU:2025-13521" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0033</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38494-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38494-8.0/" type="self" id="ROS-20260317-80-0033" title="ROS-20260317-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38494" type="cve" id="CVE-2025-38494" title="CVE-2025-38494" />
			<reference href="https://bdu.fstec.ru/vul/2025-13522" type="self" id="BDU:2025-13522" title="BDU:2025-13522" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0034</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38495-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38495-8.0/" type="self" id="ROS-20260317-80-0034" title="ROS-20260317-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38495" type="cve" id="CVE-2025-38495" title="CVE-2025-38495" />
			<reference href="https://bdu.fstec.ru/vul/2025-13517" type="self" id="BDU:2025-13517" title="BDU:2025-13517" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0035</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38496-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38496-8.0/" type="self" id="ROS-20260317-80-0035" title="ROS-20260317-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38496" type="cve" id="CVE-2025-38496" title="CVE-2025-38496" />
			<reference href="https://bdu.fstec.ru/vul/2025-13523" type="self" id="BDU:2025-13523" title="BDU:2025-13523" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0036</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38497-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38497-8.0/" type="self" id="ROS-20260317-80-0036" title="ROS-20260317-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38497" type="cve" id="CVE-2025-38497" title="CVE-2025-38497" />
			<reference href="https://bdu.fstec.ru/vul/2025-11510" type="self" id="BDU:2025-11510" title="BDU:2025-11510" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0037</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38500-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38500-8.0/" type="self" id="ROS-20260317-80-0037" title="ROS-20260317-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38500" type="cve" id="CVE-2025-38500" title="CVE-2025-38500" />
			<reference href="https://bdu.fstec.ru/vul/2025-15162" type="self" id="BDU:2025-15162" title="BDU:2025-15162" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0038</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38499-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38499-8.0/" type="self" id="ROS-20260317-80-0038" title="ROS-20260317-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38499" type="cve" id="CVE-2025-38499" title="CVE-2025-38499" />
			<reference href="https://bdu.fstec.ru/vul/2025-15160" type="self" id="BDU:2025-15160" title="BDU:2025-15160" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0039</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38501-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38501-8.0/" type="self" id="ROS-20260317-80-0039" title="ROS-20260317-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38501" type="cve" id="CVE-2025-38501" title="CVE-2025-38501" />
			<reference href="https://bdu.fstec.ru/vul/2025-15555" type="self" id="BDU:2025-15555" title="BDU:2025-15555" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0040</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38502-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38502-8.0/" type="self" id="ROS-20260317-80-0040" title="ROS-20260317-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38502" type="cve" id="CVE-2025-38502" title="CVE-2025-38502" />
			<reference href="https://bdu.fstec.ru/vul/2025-10441" type="self" id="BDU:2025-10441" title="BDU:2025-10441" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0041</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38503-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38503-8.0/" type="self" id="ROS-20260317-80-0041" title="ROS-20260317-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38503" type="cve" id="CVE-2025-38503" title="CVE-2025-38503" />
			<reference href="https://bdu.fstec.ru/vul/2025-10444" type="self" id="BDU:2025-10444" title="BDU:2025-10444" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0042</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38505-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38505-8.0/" type="self" id="ROS-20260317-80-0042" title="ROS-20260317-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38505" type="cve" id="CVE-2025-38505" title="CVE-2025-38505" />
			<reference href="https://bdu.fstec.ru/vul/2025-10443" type="self" id="BDU:2025-10443" title="BDU:2025-10443" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0043</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38506-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38506-8.0/" type="self" id="ROS-20260317-80-0043" title="ROS-20260317-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38506" type="cve" id="CVE-2025-38506" title="CVE-2025-38506" />
			<reference href="https://bdu.fstec.ru/vul/2025-10442" type="self" id="BDU:2025-10442" title="BDU:2025-10442" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0044</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38510-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38510-8.0/" type="self" id="ROS-20260317-80-0044" title="ROS-20260317-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38510" type="cve" id="CVE-2025-38510" title="CVE-2025-38510" />
			<reference href="https://bdu.fstec.ru/vul/2025-11349" type="self" id="BDU:2025-11349" title="BDU:2025-11349" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0045</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38511-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38511-8.0/" type="self" id="ROS-20260317-80-0045" title="ROS-20260317-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38511" type="cve" id="CVE-2025-38511" title="CVE-2025-38511" />
			<reference href="https://bdu.fstec.ru/vul/2025-11350" type="self" id="BDU:2025-11350" title="BDU:2025-11350" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0046</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38512-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38512-8.0/" type="self" id="ROS-20260317-80-0046" title="ROS-20260317-80-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38512" type="cve" id="CVE-2025-38512" title="CVE-2025-38512" />
			<reference href="https://bdu.fstec.ru/vul/2025-11343" type="self" id="BDU:2025-11343" title="BDU:2025-11343" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260317-80-0047</id>
		<issued date="2026-03-17" />
		<updated date="2026-03-17" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38513-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38513-8.0/" type="self" id="ROS-20260317-80-0047" title="ROS-20260317-80-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38513" type="cve" id="CVE-2025-38513" title="CVE-2025-38513" />
			<reference href="https://bdu.fstec.ru/vul/2025-11348" type="self" id="BDU:2025-11348" title="BDU:2025-11348" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260318-80-0001</id>
		<issued date="2026-03-18" />
		<updated date="2026-03-18" />
		<title>Уязвимость busybox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в busybox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-busybox-cve-2025-60876-8.0/</description>
               <solution>Установить обновление для пакета(ов) busybox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-busybox-cve-2025-60876-8.0/" type="self" id="ROS-20260318-80-0001" title="ROS-20260318-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-60876" type="cve" id="CVE-2025-60876" title="CVE-2025-60876" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="busybox" epoch="1" version="1.37.0" release="1.red80" arch="x86_64" src="busybox-1.37.0-1.red80.src.rpm">
					<filename>busybox-1:1.37.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="busybox-petitboot" epoch="1" version="1.37.0" release="1.red80" arch="x86_64" src="busybox-1.37.0-1.red80.src.rpm">
					<filename>busybox-petitboot-1:1.37.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="busybox" epoch="1" version="1.37.0" release="1.red80" arch="aarch64" src="busybox-1.37.0-1.red80.src.rpm">
					<filename>busybox-1:1.37.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="busybox-petitboot" epoch="1" version="1.37.0" release="1.red80" arch="aarch64" src="busybox-1.37.0-1.red80.src.rpm">
					<filename>busybox-petitboot-1:1.37.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0001</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость gimp </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в gimp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2026-2047-8.0/</description>
               <solution>Установить обновление для пакета(ов) gimp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gimp-cve-2026-2047-8.0/" type="self" id="ROS-20260319-80-0001" title="ROS-20260319-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2047" type="cve" id="CVE-2026-2047" title="CVE-2026-2047" />
			<reference href="https://bdu.fstec.ru/vul/2026-02554" type="self" id="BDU:2026-02554" title="BDU:2026-02554" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gimp" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.8" release="1.red80" arch="x86_64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.8-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gimp" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-devel-tools" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-devel-tools-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gimp-libs" epoch="2" version="3.0.8" release="1.red80" arch="aarch64" src="gimp-3.0.8-1.red80.src.rpm">
					<filename>gimp-libs-2:3.0.8-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0002</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость jetty </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в jetty</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jetty-cve-2023-44487-8.0/</description>
               <solution>Установить обновление для пакета(ов) jetty
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jetty-cve-2023-44487-8.0/" type="self" id="ROS-20260319-80-0002" title="ROS-20260319-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" type="cve" id="CVE-2023-44487" title="CVE-2023-44487" />
			<reference href="https://bdu.fstec.ru/vul/2023-06559" type="self" id="BDU:2023-06559" title="BDU:2023-06559" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="jetty" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-client" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-client-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-continuation" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-continuation-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-http" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-http-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-io" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-io-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-jaas" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-jaas-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-javadoc" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-javadoc-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-jmx" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-jmx-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-security" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-security-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-server" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-server-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-servlet" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-servlet-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-util" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-util-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-util-ajax" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-util-ajax-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-webapp" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-webapp-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
				<package name="jetty-xml" epoch="0" version="9.4.58" release="1.red80" arch="noarch" src="jetty-9.4.58-1.red80.src.rpm">
					<filename>jetty-xml-0:9.4.58-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0003</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость grub2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grub2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-grub2-cve-2025-54770-8.0/</description>
               <solution>Установить обновление для пакета(ов) grub2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-grub2-cve-2025-54770-8.0/" type="self" id="ROS-20260319-80-0003" title="ROS-20260319-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54770" type="cve" id="CVE-2025-54770" title="CVE-2025-54770" />
			<reference href="https://bdu.fstec.ru/vul/2025-14789" type="self" id="BDU:2025-14789" title="BDU:2025-14789" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="grub2-efi-ia32" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-ia32-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-cdboot" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-ia32-cdboot-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-x64-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64-cdboot" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-x64-cdboot-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu-modules" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-modules-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-pc" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-pc-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-efi" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-efi-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-extra" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-extra-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-minimal" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-minimal-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="grub2-efi-aa64" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-aa64-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-efi-aa64-cdboot" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-aa64-cdboot-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-emu" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-emu-modules" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-modules-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-tools" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-tools-extra" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-extra-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-tools-minimal" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-minimal-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="grub2-common" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-common-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-aa64-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-aa64-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-ia32-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-x64-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-x64-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-pc-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-pc-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-xen-x64-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-xen-x64-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-xen_pvh-i386-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-xen_pvh-i386-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0004</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость nodejs22 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в nodejs22</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nodejs22-cve-2025-47279-8.0/</description>
               <solution>Установить обновление для пакета(ов) nodejs22
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nodejs22-cve-2025-47279-8.0/" type="self" id="ROS-20260319-80-0004" title="ROS-20260319-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47279" type="cve" id="CVE-2025-47279" title="CVE-2025-47279" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="nodejs" epoch="1" version="22.19.0" release="1.red80" arch="x86_64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-1:22.19.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nodejs-devel" epoch="1" version="22.19.0" release="1.red80" arch="x86_64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-devel-1:22.19.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nodejs-full-i18n" epoch="1" version="22.19.0" release="1.red80" arch="x86_64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-full-i18n-1:22.19.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nodejs-libs" epoch="1" version="22.19.0" release="1.red80" arch="x86_64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-libs-1:22.19.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nodejs-npm" epoch="1" version="10.9.3" release="1.22.19.0.1.red80" arch="x86_64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-npm-1:10.9.3-1.22.19.0.1.red80.x86_64.rpm</filename>
				</package>
				<package name="v8-12.4-devel" epoch="3" version="12.4.254.21" release="1.22.19.0.1.red80" arch="x86_64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>v8-12.4-devel-3:12.4.254.21-1.22.19.0.1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="nodejs" epoch="1" version="22.19.0" release="1.red80" arch="aarch64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-1:22.19.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nodejs-devel" epoch="1" version="22.19.0" release="1.red80" arch="aarch64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-devel-1:22.19.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nodejs-full-i18n" epoch="1" version="22.19.0" release="1.red80" arch="aarch64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-full-i18n-1:22.19.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nodejs-libs" epoch="1" version="22.19.0" release="1.red80" arch="aarch64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-libs-1:22.19.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nodejs-npm" epoch="1" version="10.9.3" release="1.22.19.0.1.red80" arch="aarch64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-npm-1:10.9.3-1.22.19.0.1.red80.aarch64.rpm</filename>
				</package>
				<package name="v8-12.4-devel" epoch="3" version="12.4.254.21" release="1.22.19.0.1.red80" arch="aarch64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>v8-12.4-devel-3:12.4.254.21-1.22.19.0.1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="nodejs-docs" epoch="1" version="22.19.0" release="1.red80" arch="noarch" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-docs-1:22.19.0-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0005</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glpi-cve-2025-64516-8.0/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glpi-cve-2025-64516-8.0/" type="self" id="ROS-20260319-80-0005" title="ROS-20260319-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64516" type="cve" id="CVE-2025-64516" title="CVE-2025-64516" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="glpi" epoch="0" version="11.0.5" release="1.red80" arch="noarch" src="glpi-11.0.5-1.red80.src.rpm">
					<filename>glpi-0:11.0.5-1.red80.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.5" release="1.red80" arch="noarch" src="glpi-11.0.5-1.red80.src.rpm">
					<filename>glpi-marketplace-0:11.0.5-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0006</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glpi-cve-2025-66417-8.0/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glpi-cve-2025-66417-8.0/" type="self" id="ROS-20260319-80-0006" title="ROS-20260319-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66417" type="cve" id="CVE-2025-66417" title="CVE-2025-66417" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="glpi" epoch="0" version="11.0.5" release="1.red80" arch="noarch" src="glpi-11.0.5-1.red80.src.rpm">
					<filename>glpi-0:11.0.5-1.red80.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.5" release="1.red80" arch="noarch" src="glpi-11.0.5-1.red80.src.rpm">
					<filename>glpi-marketplace-0:11.0.5-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0007</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость fluent-bit </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в fluent-bit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-fluent-bit-cve-2025-12970-8.0/</description>
               <solution>Установить обновление для пакета(ов) fluent-bit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-fluent-bit-cve-2025-12970-8.0/" type="self" id="ROS-20260319-80-0007" title="ROS-20260319-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12970" type="cve" id="CVE-2025-12970" title="CVE-2025-12970" />
			<reference href="https://bdu.fstec.ru/vul/2025-15407" type="self" id="BDU:2025-15407" title="BDU:2025-15407" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="fluent-bit" epoch="0" version="4.2.2" release="1.red80" arch="x86_64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-0:4.2.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="fluent-bit-devel" epoch="0" version="4.2.2" release="1.red80" arch="x86_64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-devel-0:4.2.2-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="fluent-bit" epoch="0" version="4.2.2" release="1.red80" arch="aarch64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-0:4.2.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="fluent-bit-devel" epoch="0" version="4.2.2" release="1.red80" arch="aarch64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-devel-0:4.2.2-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0008</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость fluent-bit </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в fluent-bit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-fluent-bit-cve-2025-12972-8.0/</description>
               <solution>Установить обновление для пакета(ов) fluent-bit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-fluent-bit-cve-2025-12972-8.0/" type="self" id="ROS-20260319-80-0008" title="ROS-20260319-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12972" type="cve" id="CVE-2025-12972" title="CVE-2025-12972" />
			<reference href="https://bdu.fstec.ru/vul/2025-15408" type="self" id="BDU:2025-15408" title="BDU:2025-15408" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="fluent-bit" epoch="0" version="4.2.2" release="1.red80" arch="x86_64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-0:4.2.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="fluent-bit-devel" epoch="0" version="4.2.2" release="1.red80" arch="x86_64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-devel-0:4.2.2-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="fluent-bit" epoch="0" version="4.2.2" release="1.red80" arch="aarch64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-0:4.2.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="fluent-bit-devel" epoch="0" version="4.2.2" release="1.red80" arch="aarch64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-devel-0:4.2.2-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0009</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость fluent-bit </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в fluent-bit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-fluent-bit-cve-2025-12969-8.0/</description>
               <solution>Установить обновление для пакета(ов) fluent-bit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-fluent-bit-cve-2025-12969-8.0/" type="self" id="ROS-20260319-80-0009" title="ROS-20260319-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12969" type="cve" id="CVE-2025-12969" title="CVE-2025-12969" />
			<reference href="https://bdu.fstec.ru/vul/2025-15406" type="self" id="BDU:2025-15406" title="BDU:2025-15406" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="fluent-bit" epoch="0" version="4.2.2" release="1.red80" arch="x86_64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-0:4.2.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="fluent-bit-devel" epoch="0" version="4.2.2" release="1.red80" arch="x86_64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-devel-0:4.2.2-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="fluent-bit" epoch="0" version="4.2.2" release="1.red80" arch="aarch64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-0:4.2.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="fluent-bit-devel" epoch="0" version="4.2.2" release="1.red80" arch="aarch64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-devel-0:4.2.2-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0010</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость fluent-bit </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в fluent-bit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-fluent-bit-cve-2025-12977-8.0/</description>
               <solution>Установить обновление для пакета(ов) fluent-bit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-fluent-bit-cve-2025-12977-8.0/" type="self" id="ROS-20260319-80-0010" title="ROS-20260319-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12977" type="cve" id="CVE-2025-12977" title="CVE-2025-12977" />
			<reference href="https://bdu.fstec.ru/vul/2025-14810" type="self" id="BDU:2025-14810" title="BDU:2025-14810" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="fluent-bit" epoch="0" version="4.2.2" release="1.red80" arch="x86_64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-0:4.2.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="fluent-bit-devel" epoch="0" version="4.2.2" release="1.red80" arch="x86_64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-devel-0:4.2.2-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="fluent-bit" epoch="0" version="4.2.2" release="1.red80" arch="aarch64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-0:4.2.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="fluent-bit-devel" epoch="0" version="4.2.2" release="1.red80" arch="aarch64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-devel-0:4.2.2-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0011</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость fluent-bit </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в fluent-bit</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-fluent-bit-cve-2025-12978-8.0/</description>
               <solution>Установить обновление для пакета(ов) fluent-bit
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-fluent-bit-cve-2025-12978-8.0/" type="self" id="ROS-20260319-80-0011" title="ROS-20260319-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12978" type="cve" id="CVE-2025-12978" title="CVE-2025-12978" />
			<reference href="https://bdu.fstec.ru/vul/2025-15445" type="self" id="BDU:2025-15445" title="BDU:2025-15445" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="fluent-bit" epoch="0" version="4.2.2" release="1.red80" arch="x86_64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-0:4.2.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="fluent-bit-devel" epoch="0" version="4.2.2" release="1.red80" arch="x86_64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-devel-0:4.2.2-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="fluent-bit" epoch="0" version="4.2.2" release="1.red80" arch="aarch64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-0:4.2.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="fluent-bit-devel" epoch="0" version="4.2.2" release="1.red80" arch="aarch64" src="fluent-bit-4.2.2-1.red80.src.rpm">
					<filename>fluent-bit-devel-0:4.2.2-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0012</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glpi-cve-2025-59935-8.0/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glpi-cve-2025-59935-8.0/" type="self" id="ROS-20260319-80-0012" title="ROS-20260319-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59935" type="cve" id="CVE-2025-59935" title="CVE-2025-59935" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="glpi" epoch="0" version="11.0.5" release="1.red80" arch="noarch" src="glpi-11.0.5-1.red80.src.rpm">
					<filename>glpi-0:11.0.5-1.red80.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.5" release="1.red80" arch="noarch" src="glpi-11.0.5-1.red80.src.rpm">
					<filename>glpi-marketplace-0:11.0.5-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0013</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glpi-cve-2025-64520-8.0/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glpi-cve-2025-64520-8.0/" type="self" id="ROS-20260319-80-0013" title="ROS-20260319-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64520" type="cve" id="CVE-2025-64520" title="CVE-2025-64520" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="glpi" epoch="0" version="11.0.5" release="1.red80" arch="noarch" src="glpi-11.0.5-1.red80.src.rpm">
					<filename>glpi-0:11.0.5-1.red80.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.5" release="1.red80" arch="noarch" src="glpi-11.0.5-1.red80.src.rpm">
					<filename>glpi-marketplace-0:11.0.5-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0014</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость grub2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grub2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-grub2-cve-2025-54771-8.0/</description>
               <solution>Установить обновление для пакета(ов) grub2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-grub2-cve-2025-54771-8.0/" type="self" id="ROS-20260319-80-0014" title="ROS-20260319-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54771" type="cve" id="CVE-2025-54771" title="CVE-2025-54771" />
			<reference href="https://bdu.fstec.ru/vul/2025-14788" type="self" id="BDU:2025-14788" title="BDU:2025-14788" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="grub2-efi-ia32" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-ia32-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-cdboot" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-ia32-cdboot-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-x64-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64-cdboot" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-x64-cdboot-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu-modules" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-modules-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-pc" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-pc-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-efi" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-efi-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-extra" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-extra-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-minimal" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-minimal-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="grub2-efi-aa64" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-aa64-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-efi-aa64-cdboot" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-aa64-cdboot-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-emu" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-emu-modules" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-modules-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-tools" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-tools-extra" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-extra-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-tools-minimal" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-minimal-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="grub2-common" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-common-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-aa64-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-aa64-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-ia32-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-x64-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-x64-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-pc-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-pc-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-xen-x64-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-xen-x64-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-xen_pvh-i386-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-xen_pvh-i386-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0015</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость grub2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grub2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-grub2-cve-2025-61663-8.0/</description>
               <solution>Установить обновление для пакета(ов) grub2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-grub2-cve-2025-61663-8.0/" type="self" id="ROS-20260319-80-0015" title="ROS-20260319-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61663" type="cve" id="CVE-2025-61663" title="CVE-2025-61663" />
			<reference href="https://bdu.fstec.ru/vul/2025-14787" type="self" id="BDU:2025-14787" title="BDU:2025-14787" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="grub2-efi-ia32" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-ia32-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-cdboot" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-ia32-cdboot-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-x64-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64-cdboot" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-x64-cdboot-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu-modules" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-modules-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-pc" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-pc-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-efi" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-efi-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-extra" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-extra-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-minimal" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-minimal-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="grub2-efi-aa64" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-aa64-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-efi-aa64-cdboot" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-aa64-cdboot-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-emu" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-emu-modules" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-modules-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-tools" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-tools-extra" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-extra-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-tools-minimal" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-minimal-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="grub2-common" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-common-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-aa64-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-aa64-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-ia32-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-x64-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-x64-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-pc-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-pc-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-xen-x64-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-xen-x64-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-xen_pvh-i386-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-xen_pvh-i386-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0016</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость grub2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grub2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-grub2-cve-2025-61664-8.0/</description>
               <solution>Установить обновление для пакета(ов) grub2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-grub2-cve-2025-61664-8.0/" type="self" id="ROS-20260319-80-0016" title="ROS-20260319-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61664" type="cve" id="CVE-2025-61664" title="CVE-2025-61664" />
			<reference href="https://bdu.fstec.ru/vul/2025-14784" type="self" id="BDU:2025-14784" title="BDU:2025-14784" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="grub2-efi-ia32" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-ia32-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-cdboot" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-ia32-cdboot-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-x64-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64-cdboot" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-x64-cdboot-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu-modules" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-modules-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-pc" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-pc-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-efi" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-efi-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-extra" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-extra-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-minimal" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-minimal-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="grub2-efi-aa64" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-aa64-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-efi-aa64-cdboot" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-aa64-cdboot-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-emu" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-emu-modules" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-modules-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-tools" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-tools-extra" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-extra-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-tools-minimal" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-minimal-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="grub2-common" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-common-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-aa64-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-aa64-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-ia32-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-x64-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-x64-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-pc-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-pc-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-xen-x64-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-xen-x64-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-xen_pvh-i386-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-xen_pvh-i386-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0017</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость grub2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grub2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-grub2-cve-2025-61661-8.0/</description>
               <solution>Установить обновление для пакета(ов) grub2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-grub2-cve-2025-61661-8.0/" type="self" id="ROS-20260319-80-0017" title="ROS-20260319-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61661" type="cve" id="CVE-2025-61661" title="CVE-2025-61661" />
			<reference href="https://bdu.fstec.ru/vul/2025-14785" type="self" id="BDU:2025-14785" title="BDU:2025-14785" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="grub2-efi-ia32" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-ia32-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-cdboot" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-ia32-cdboot-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-x64-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64-cdboot" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-x64-cdboot-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu-modules" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-modules-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-pc" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-pc-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-efi" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-efi-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-extra" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-extra-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-minimal" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-minimal-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="grub2-efi-aa64" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-aa64-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-efi-aa64-cdboot" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-aa64-cdboot-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-emu" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-emu-modules" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-modules-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-tools" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-tools-extra" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-extra-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-tools-minimal" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-minimal-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="grub2-common" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-common-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-aa64-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-aa64-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-ia32-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-x64-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-x64-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-pc-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-pc-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-xen-x64-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-xen-x64-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-xen_pvh-i386-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-xen_pvh-i386-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0018</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость grub2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в grub2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-grub2-cve-2025-61662-8.0/</description>
               <solution>Установить обновление для пакета(ов) grub2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-grub2-cve-2025-61662-8.0/" type="self" id="ROS-20260319-80-0018" title="ROS-20260319-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61662" type="cve" id="CVE-2025-61662" title="CVE-2025-61662" />
			<reference href="https://bdu.fstec.ru/vul/2025-14786" type="self" id="BDU:2025-14786" title="BDU:2025-14786" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="grub2-efi-ia32" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-ia32-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-cdboot" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-ia32-cdboot-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-x64-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-efi-x64-cdboot" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-x64-cdboot-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-emu-modules" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-modules-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-pc" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-pc-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-efi" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-efi-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-extra" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-extra-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
				<package name="grub2-tools-minimal" epoch="1" version="2.12" release="2.red80" arch="x86_64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-minimal-1:2.12-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="grub2-efi-aa64" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-aa64-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-efi-aa64-cdboot" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-aa64-cdboot-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-emu" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-emu-modules" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-emu-modules-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-tools" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-tools-extra" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-extra-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
				<package name="grub2-tools-minimal" epoch="1" version="2.12" release="2.red80" arch="aarch64" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-tools-minimal-1:2.12-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="grub2-common" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-common-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-aa64-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-aa64-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-ia32-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-ia32-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-efi-x64-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-efi-x64-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-pc-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-pc-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-xen-x64-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-xen-x64-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
				<package name="grub2-xen_pvh-i386-modules" epoch="1" version="2.12" release="2.red80" arch="noarch" src="grub2-2.12-2.red80.src.rpm">
					<filename>grub2-xen_pvh-i386-modules-1:2.12-2.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0019</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость ffmpeg </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в ffmpeg</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-ffmpeg-cve-2025-63757-8.0/</description>
               <solution>Установить обновление для пакета(ов) ffmpeg
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-ffmpeg-cve-2025-63757-8.0/" type="self" id="ROS-20260319-80-0019" title="ROS-20260319-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-63757" type="cve" id="CVE-2025-63757" title="CVE-2025-63757" />
			<reference href="https://bdu.fstec.ru/vul/2026-03013" type="self" id="BDU:2026-03013" title="BDU:2026-03013" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="ffmpeg" epoch="0" version="6.0.1" release="7.red80" arch="x86_64" src="ffmpeg-6.0.1-7.red80.src.rpm">
					<filename>ffmpeg-0:6.0.1-7.red80.x86_64.rpm</filename>
				</package>
				<package name="ffmpeg-devel" epoch="0" version="6.0.1" release="7.red80" arch="x86_64" src="ffmpeg-6.0.1-7.red80.src.rpm">
					<filename>ffmpeg-devel-0:6.0.1-7.red80.x86_64.rpm</filename>
				</package>
				<package name="ffmpeg-libs" epoch="0" version="6.0.1" release="7.red80" arch="x86_64" src="ffmpeg-6.0.1-7.red80.src.rpm">
					<filename>ffmpeg-libs-0:6.0.1-7.red80.x86_64.rpm</filename>
				</package>
				<package name="libavcodec-freeworld" epoch="0" version="6.0.1" release="7.red80" arch="x86_64" src="ffmpeg-6.0.1-7.red80.src.rpm">
					<filename>libavcodec-freeworld-0:6.0.1-7.red80.x86_64.rpm</filename>
				</package>
				<package name="libavdevice" epoch="0" version="6.0.1" release="7.red80" arch="x86_64" src="ffmpeg-6.0.1-7.red80.src.rpm">
					<filename>libavdevice-0:6.0.1-7.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="ffmpeg" epoch="0" version="6.0.1" release="7.red80" arch="aarch64" src="ffmpeg-6.0.1-7.red80.src.rpm">
					<filename>ffmpeg-0:6.0.1-7.red80.aarch64.rpm</filename>
				</package>
				<package name="ffmpeg-devel" epoch="0" version="6.0.1" release="7.red80" arch="aarch64" src="ffmpeg-6.0.1-7.red80.src.rpm">
					<filename>ffmpeg-devel-0:6.0.1-7.red80.aarch64.rpm</filename>
				</package>
				<package name="ffmpeg-libs" epoch="0" version="6.0.1" release="7.red80" arch="aarch64" src="ffmpeg-6.0.1-7.red80.src.rpm">
					<filename>ffmpeg-libs-0:6.0.1-7.red80.aarch64.rpm</filename>
				</package>
				<package name="libavcodec-freeworld" epoch="0" version="6.0.1" release="7.red80" arch="aarch64" src="ffmpeg-6.0.1-7.red80.src.rpm">
					<filename>libavcodec-freeworld-0:6.0.1-7.red80.aarch64.rpm</filename>
				</package>
				<package name="libavdevice" epoch="0" version="6.0.1" release="7.red80" arch="aarch64" src="ffmpeg-6.0.1-7.red80.src.rpm">
					<filename>libavdevice-0:6.0.1-7.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0020</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость compat-ffmpeg5 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в compat-ffmpeg5</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-compat-ffmpeg5-cve-2025-63757-8.0/</description>
               <solution>Установить обновление для пакета(ов) compat-ffmpeg5
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-compat-ffmpeg5-cve-2025-63757-8.0/" type="self" id="ROS-20260319-80-0020" title="ROS-20260319-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-63757" type="cve" id="CVE-2025-63757" title="CVE-2025-63757" />
			<reference href="https://bdu.fstec.ru/vul/2026-03013" type="self" id="BDU:2026-03013" title="BDU:2026-03013" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="compat-ffmpeg5" epoch="0" version="5.1.6" release="5.red80" arch="x86_64" src="compat-ffmpeg5-5.1.6-5.red80.src.rpm">
					<filename>compat-ffmpeg5-0:5.1.6-5.red80.x86_64.rpm</filename>
				</package>
				<package name="compat-ffmpeg5-devel" epoch="0" version="5.1.6" release="5.red80" arch="x86_64" src="compat-ffmpeg5-5.1.6-5.red80.src.rpm">
					<filename>compat-ffmpeg5-devel-0:5.1.6-5.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="compat-ffmpeg5" epoch="0" version="5.1.6" release="5.red80" arch="aarch64" src="compat-ffmpeg5-5.1.6-5.red80.src.rpm">
					<filename>compat-ffmpeg5-0:5.1.6-5.red80.aarch64.rpm</filename>
				</package>
				<package name="compat-ffmpeg5-devel" epoch="0" version="5.1.6" release="5.red80" arch="aarch64" src="compat-ffmpeg5-5.1.6-5.red80.src.rpm">
					<filename>compat-ffmpeg5-devel-0:5.1.6-5.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0021</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость compat-ffmpeg4 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в compat-ffmpeg4</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-compat-ffmpeg4-cve-2025-63757-8.0/</description>
               <solution>Установить обновление для пакета(ов) compat-ffmpeg4
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-compat-ffmpeg4-cve-2025-63757-8.0/" type="self" id="ROS-20260319-80-0021" title="ROS-20260319-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-63757" type="cve" id="CVE-2025-63757" title="CVE-2025-63757" />
			<reference href="https://bdu.fstec.ru/vul/2026-03013" type="self" id="BDU:2026-03013" title="BDU:2026-03013" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="compat-ffmpeg4" epoch="0" version="4.4.4" release="7.red80" arch="x86_64" src="compat-ffmpeg4-4.4.4-7.red80.src.rpm">
					<filename>compat-ffmpeg4-0:4.4.4-7.red80.x86_64.rpm</filename>
				</package>
				<package name="compat-ffmpeg4-devel" epoch="0" version="4.4.4" release="7.red80" arch="x86_64" src="compat-ffmpeg4-4.4.4-7.red80.src.rpm">
					<filename>compat-ffmpeg4-devel-0:4.4.4-7.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="compat-ffmpeg4" epoch="0" version="4.4.4" release="7.red80" arch="aarch64" src="compat-ffmpeg4-4.4.4-7.red80.src.rpm">
					<filename>compat-ffmpeg4-0:4.4.4-7.red80.aarch64.rpm</filename>
				</package>
				<package name="compat-ffmpeg4-devel" epoch="0" version="4.4.4" release="7.red80" arch="aarch64" src="compat-ffmpeg4-4.4.4-7.red80.src.rpm">
					<filename>compat-ffmpeg4-devel-0:4.4.4-7.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0022</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2026-21986-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2026-21986-8.0/" type="self" id="ROS-20260319-80-0022" title="ROS-20260319-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21986" type="cve" id="CVE-2026-21986" title="CVE-2026-21986" />
			<reference href="https://bdu.fstec.ru/vul/2026-00736" type="self" id="BDU:2026-00736" title="BDU:2026-00736" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-devel-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-server-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>python3-VirtualBox-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.16" release="1.red80" arch="noarch" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.16-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0023</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2026-21986-8.0/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2026-21986-8.0/" type="self" id="ROS-20260319-80-0023" title="ROS-20260319-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21986" type="cve" id="CVE-2026-21986" title="CVE-2026-21986" />
			<reference href="https://bdu.fstec.ru/vul/2026-00736" type="self" id="BDU:2026-00736" title="BDU:2026-00736" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="virtualbox-guest-additions-7.1.16-1.red80.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0024</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2026-21986-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2026-21986-8.0/" type="self" id="ROS-20260319-80-0024" title="ROS-20260319-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21986" type="cve" id="CVE-2026-21986" title="CVE-2026-21986" />
			<reference href="https://bdu.fstec.ru/vul/2026-00736" type="self" id="BDU:2026-00736" title="BDU:2026-00736" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.12.69-1.red80.x86_64" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-kmod_6.12.69-1.red80.x86_64-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0025</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2026-21963-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2026-21963-8.0/" type="self" id="ROS-20260319-80-0025" title="ROS-20260319-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21963" type="cve" id="CVE-2026-21963" title="CVE-2026-21963" />
			<reference href="https://bdu.fstec.ru/vul/2026-00722" type="self" id="BDU:2026-00722" title="BDU:2026-00722" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-devel-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-server-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>python3-VirtualBox-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.16" release="1.red80" arch="noarch" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.16-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0026</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2026-21963-8.0/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2026-21963-8.0/" type="self" id="ROS-20260319-80-0026" title="ROS-20260319-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21963" type="cve" id="CVE-2026-21963" title="CVE-2026-21963" />
			<reference href="https://bdu.fstec.ru/vul/2026-00722" type="self" id="BDU:2026-00722" title="BDU:2026-00722" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="virtualbox-guest-additions-7.1.16-1.red80.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0027</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2026-21963-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2026-21963-8.0/" type="self" id="ROS-20260319-80-0027" title="ROS-20260319-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21963" type="cve" id="CVE-2026-21963" title="CVE-2026-21963" />
			<reference href="https://bdu.fstec.ru/vul/2026-00722" type="self" id="BDU:2026-00722" title="BDU:2026-00722" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.12.69-1.red80.x86_64" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-kmod_6.12.69-1.red80.x86_64-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0028</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2026-21985-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2026-21985-8.0/" type="self" id="ROS-20260319-80-0028" title="ROS-20260319-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21985" type="cve" id="CVE-2026-21985" title="CVE-2026-21985" />
			<reference href="https://bdu.fstec.ru/vul/2026-00841" type="self" id="BDU:2026-00841" title="BDU:2026-00841" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-devel-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-server-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>python3-VirtualBox-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.16" release="1.red80" arch="noarch" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.16-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0029</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2026-21985-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2026-21985-8.0/" type="self" id="ROS-20260319-80-0029" title="ROS-20260319-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21985" type="cve" id="CVE-2026-21985" title="CVE-2026-21985" />
			<reference href="https://bdu.fstec.ru/vul/2026-00841" type="self" id="BDU:2026-00841" title="BDU:2026-00841" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.12.69-1.red80.x86_64" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-kmod_6.12.69-1.red80.x86_64-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0030</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2026-21985-8.0/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2026-21985-8.0/" type="self" id="ROS-20260319-80-0030" title="ROS-20260319-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21985" type="cve" id="CVE-2026-21985" title="CVE-2026-21985" />
			<reference href="https://bdu.fstec.ru/vul/2026-00841" type="self" id="BDU:2026-00841" title="BDU:2026-00841" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="virtualbox-guest-additions-7.1.16-1.red80.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0031</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость VirtualBox </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2026-21981-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-cve-2026-21981-8.0/" type="self" id="ROS-20260319-80-0031" title="ROS-20260319-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21981" type="cve" id="CVE-2026-21981" title="CVE-2026-21981" />
			<reference href="https://bdu.fstec.ru/vul/2026-00721" type="self" id="BDU:2026-00721" title="BDU:2026-00721" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-devel" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-devel-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-server" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-server-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-vnc" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-vnc-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-webservice" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-webservice-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-VirtualBox" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>python3-VirtualBox-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="VirtualBox-kmodsrc" epoch="0" version="7.1.16" release="1.red80" arch="noarch" src="VirtualBox-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-kmodsrc-0:7.1.16-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0032</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость VirtualBox-kmod </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в VirtualBox-kmod</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2026-21981-8.0/</description>
               <solution>Установить обновление для пакета(ов) VirtualBox-kmod
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-kmod-cve-2026-21981-8.0/" type="self" id="ROS-20260319-80-0032" title="ROS-20260319-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21981" type="cve" id="CVE-2026-21981" title="CVE-2026-21981" />
			<reference href="https://bdu.fstec.ru/vul/2026-00721" type="self" id="BDU:2026-00721" title="BDU:2026-00721" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="VirtualBox-kmod" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-kmod-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
				<package name="VirtualBox-kmod_6.12.69-1.red80.x86_64" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="VirtualBox-kmod-7.1.16-1.red80.src.rpm">
					<filename>VirtualBox-kmod_6.12.69-1.red80.x86_64-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0033</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость virtualbox-guest-additions </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в virtualbox-guest-additions</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2026-21981-8.0/</description>
               <solution>Установить обновление для пакета(ов) virtualbox-guest-additions
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-virtualbox-guest-additions-cve-2026-21981-8.0/" type="self" id="ROS-20260319-80-0033" title="ROS-20260319-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21981" type="cve" id="CVE-2026-21981" title="CVE-2026-21981" />
			<reference href="https://bdu.fstec.ru/vul/2026-00721" type="self" id="BDU:2026-00721" title="BDU:2026-00721" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="virtualbox-guest-additions" epoch="0" version="7.1.16" release="1.red80" arch="x86_64" src="virtualbox-guest-additions-7.1.16-1.red80.src.rpm">
					<filename>virtualbox-guest-additions-0:7.1.16-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0034</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glpi-cve-2026-22044-8.0/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glpi-cve-2026-22044-8.0/" type="self" id="ROS-20260319-80-0034" title="ROS-20260319-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22044" type="cve" id="CVE-2026-22044" title="CVE-2026-22044" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="glpi" epoch="0" version="11.0.5" release="1.red80" arch="noarch" src="glpi-11.0.5-1.red80.src.rpm">
					<filename>glpi-0:11.0.5-1.red80.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.5" release="1.red80" arch="noarch" src="glpi-11.0.5-1.red80.src.rpm">
					<filename>glpi-marketplace-0:11.0.5-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0035</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glpi-cve-2026-22247-8.0/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glpi-cve-2026-22247-8.0/" type="self" id="ROS-20260319-80-0035" title="ROS-20260319-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22247" type="cve" id="CVE-2026-22247" title="CVE-2026-22247" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="glpi" epoch="0" version="11.0.5" release="1.red80" arch="noarch" src="glpi-11.0.5-1.red80.src.rpm">
					<filename>glpi-0:11.0.5-1.red80.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.5" release="1.red80" arch="noarch" src="glpi-11.0.5-1.red80.src.rpm">
					<filename>glpi-marketplace-0:11.0.5-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0036</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glpi-cve-2026-23624-8.0/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glpi-cve-2026-23624-8.0/" type="self" id="ROS-20260319-80-0036" title="ROS-20260319-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23624" type="cve" id="CVE-2026-23624" title="CVE-2026-23624" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="glpi" epoch="0" version="11.0.5" release="1.red80" arch="noarch" src="glpi-11.0.5-1.red80.src.rpm">
					<filename>glpi-0:11.0.5-1.red80.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.5" release="1.red80" arch="noarch" src="glpi-11.0.5-1.red80.src.rpm">
					<filename>glpi-marketplace-0:11.0.5-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0037</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость beats </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в beats</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-beats-cve-2025-68381-8.0/</description>
               <solution>Установить обновление для пакета(ов) beats
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-beats-cve-2025-68381-8.0/" type="self" id="ROS-20260319-80-0037" title="ROS-20260319-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68381" type="cve" id="CVE-2025-68381" title="CVE-2025-68381" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="auditbeat" epoch="0" version="9.2.4" release="2.red80" arch="x86_64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>auditbeat-0:9.2.4-2.red80.x86_64.rpm</filename>
				</package>
				<package name="auditbeat-docs" epoch="0" version="9.2.4" release="2.red80" arch="x86_64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>auditbeat-docs-0:9.2.4-2.red80.x86_64.rpm</filename>
				</package>
				<package name="beats" epoch="0" version="9.2.4" release="2.red80" arch="x86_64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>beats-0:9.2.4-2.red80.x86_64.rpm</filename>
				</package>
				<package name="filebeat" epoch="0" version="9.2.4" release="2.red80" arch="x86_64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>filebeat-0:9.2.4-2.red80.x86_64.rpm</filename>
				</package>
				<package name="filebeat-docs" epoch="0" version="9.2.4" release="2.red80" arch="x86_64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>filebeat-docs-0:9.2.4-2.red80.x86_64.rpm</filename>
				</package>
				<package name="heartbeat" epoch="0" version="9.2.4" release="2.red80" arch="x86_64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>heartbeat-0:9.2.4-2.red80.x86_64.rpm</filename>
				</package>
				<package name="heartbeat-docs" epoch="0" version="9.2.4" release="2.red80" arch="x86_64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>heartbeat-docs-0:9.2.4-2.red80.x86_64.rpm</filename>
				</package>
				<package name="metricbeat" epoch="0" version="9.2.4" release="2.red80" arch="x86_64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>metricbeat-0:9.2.4-2.red80.x86_64.rpm</filename>
				</package>
				<package name="metricbeat-docs" epoch="0" version="9.2.4" release="2.red80" arch="x86_64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>metricbeat-docs-0:9.2.4-2.red80.x86_64.rpm</filename>
				</package>
				<package name="packetbeat" epoch="0" version="9.2.4" release="2.red80" arch="x86_64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>packetbeat-0:9.2.4-2.red80.x86_64.rpm</filename>
				</package>
				<package name="packetbeat-docs" epoch="0" version="9.2.4" release="2.red80" arch="x86_64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>packetbeat-docs-0:9.2.4-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="auditbeat" epoch="0" version="9.2.4" release="2.red80" arch="aarch64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>auditbeat-0:9.2.4-2.red80.aarch64.rpm</filename>
				</package>
				<package name="auditbeat-docs" epoch="0" version="9.2.4" release="2.red80" arch="aarch64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>auditbeat-docs-0:9.2.4-2.red80.aarch64.rpm</filename>
				</package>
				<package name="beats" epoch="0" version="9.2.4" release="2.red80" arch="aarch64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>beats-0:9.2.4-2.red80.aarch64.rpm</filename>
				</package>
				<package name="filebeat" epoch="0" version="9.2.4" release="2.red80" arch="aarch64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>filebeat-0:9.2.4-2.red80.aarch64.rpm</filename>
				</package>
				<package name="filebeat-docs" epoch="0" version="9.2.4" release="2.red80" arch="aarch64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>filebeat-docs-0:9.2.4-2.red80.aarch64.rpm</filename>
				</package>
				<package name="heartbeat" epoch="0" version="9.2.4" release="2.red80" arch="aarch64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>heartbeat-0:9.2.4-2.red80.aarch64.rpm</filename>
				</package>
				<package name="heartbeat-docs" epoch="0" version="9.2.4" release="2.red80" arch="aarch64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>heartbeat-docs-0:9.2.4-2.red80.aarch64.rpm</filename>
				</package>
				<package name="metricbeat" epoch="0" version="9.2.4" release="2.red80" arch="aarch64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>metricbeat-0:9.2.4-2.red80.aarch64.rpm</filename>
				</package>
				<package name="metricbeat-docs" epoch="0" version="9.2.4" release="2.red80" arch="aarch64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>metricbeat-docs-0:9.2.4-2.red80.aarch64.rpm</filename>
				</package>
				<package name="packetbeat" epoch="0" version="9.2.4" release="2.red80" arch="aarch64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>packetbeat-0:9.2.4-2.red80.aarch64.rpm</filename>
				</package>
				<package name="packetbeat-docs" epoch="0" version="9.2.4" release="2.red80" arch="aarch64" src="beats-9.2.4-2.red80.src.rpm">
					<filename>packetbeat-docs-0:9.2.4-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0038</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость vim </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vim</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-vim-cve-2026-25749-8.0/</description>
               <solution>Установить обновление для пакета(ов) vim
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-vim-cve-2026-25749-8.0/" type="self" id="ROS-20260319-80-0038" title="ROS-20260319-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25749" type="cve" id="CVE-2026-25749" title="CVE-2026-25749" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="vim-X11" epoch="2" version="9.2.045" release="1.red80" arch="x86_64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-X11-2:9.2.045-1.red80.x86_64.rpm</filename>
				</package>
				<package name="vim-common" epoch="2" version="9.2.045" release="1.red80" arch="x86_64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-common-2:9.2.045-1.red80.x86_64.rpm</filename>
				</package>
				<package name="vim-enhanced" epoch="2" version="9.2.045" release="1.red80" arch="x86_64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-enhanced-2:9.2.045-1.red80.x86_64.rpm</filename>
				</package>
				<package name="vim-minimal" epoch="2" version="9.2.045" release="1.red80" arch="x86_64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-minimal-2:9.2.045-1.red80.x86_64.rpm</filename>
				</package>
				<package name="xxd" epoch="2" version="9.2.045" release="1.red80" arch="x86_64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>xxd-2:9.2.045-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="vim-X11" epoch="2" version="9.2.045" release="1.red80" arch="aarch64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-X11-2:9.2.045-1.red80.aarch64.rpm</filename>
				</package>
				<package name="vim-common" epoch="2" version="9.2.045" release="1.red80" arch="aarch64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-common-2:9.2.045-1.red80.aarch64.rpm</filename>
				</package>
				<package name="vim-enhanced" epoch="2" version="9.2.045" release="1.red80" arch="aarch64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-enhanced-2:9.2.045-1.red80.aarch64.rpm</filename>
				</package>
				<package name="vim-minimal" epoch="2" version="9.2.045" release="1.red80" arch="aarch64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-minimal-2:9.2.045-1.red80.aarch64.rpm</filename>
				</package>
				<package name="xxd" epoch="2" version="9.2.045" release="1.red80" arch="aarch64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>xxd-2:9.2.045-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="vim-data" epoch="2" version="9.2.045" release="1.red80" arch="noarch" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-data-2:9.2.045-1.red80.noarch.rpm</filename>
				</package>
				<package name="vim-default-editor" epoch="2" version="9.2.045" release="1.red80" arch="noarch" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-default-editor-2:9.2.045-1.red80.noarch.rpm</filename>
				</package>
				<package name="vim-filesystem" epoch="2" version="9.2.045" release="1.red80" arch="noarch" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-filesystem-2:9.2.045-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260319-80-0039</id>
		<issued date="2026-03-19" />
		<updated date="2026-03-19" />
		<title>Уязвимость vim </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в vim</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-vim-cve-2026-26269-8.0/</description>
               <solution>Установить обновление для пакета(ов) vim
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-vim-cve-2026-26269-8.0/" type="self" id="ROS-20260319-80-0039" title="ROS-20260319-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26269" type="cve" id="CVE-2026-26269" title="CVE-2026-26269" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="vim-X11" epoch="2" version="9.2.045" release="1.red80" arch="x86_64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-X11-2:9.2.045-1.red80.x86_64.rpm</filename>
				</package>
				<package name="vim-common" epoch="2" version="9.2.045" release="1.red80" arch="x86_64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-common-2:9.2.045-1.red80.x86_64.rpm</filename>
				</package>
				<package name="vim-enhanced" epoch="2" version="9.2.045" release="1.red80" arch="x86_64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-enhanced-2:9.2.045-1.red80.x86_64.rpm</filename>
				</package>
				<package name="vim-minimal" epoch="2" version="9.2.045" release="1.red80" arch="x86_64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-minimal-2:9.2.045-1.red80.x86_64.rpm</filename>
				</package>
				<package name="xxd" epoch="2" version="9.2.045" release="1.red80" arch="x86_64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>xxd-2:9.2.045-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="vim-X11" epoch="2" version="9.2.045" release="1.red80" arch="aarch64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-X11-2:9.2.045-1.red80.aarch64.rpm</filename>
				</package>
				<package name="vim-common" epoch="2" version="9.2.045" release="1.red80" arch="aarch64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-common-2:9.2.045-1.red80.aarch64.rpm</filename>
				</package>
				<package name="vim-enhanced" epoch="2" version="9.2.045" release="1.red80" arch="aarch64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-enhanced-2:9.2.045-1.red80.aarch64.rpm</filename>
				</package>
				<package name="vim-minimal" epoch="2" version="9.2.045" release="1.red80" arch="aarch64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-minimal-2:9.2.045-1.red80.aarch64.rpm</filename>
				</package>
				<package name="xxd" epoch="2" version="9.2.045" release="1.red80" arch="aarch64" src="vim-9.2.045-1.red80.src.rpm">
					<filename>xxd-2:9.2.045-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="vim-data" epoch="2" version="9.2.045" release="1.red80" arch="noarch" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-data-2:9.2.045-1.red80.noarch.rpm</filename>
				</package>
				<package name="vim-default-editor" epoch="2" version="9.2.045" release="1.red80" arch="noarch" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-default-editor-2:9.2.045-1.red80.noarch.rpm</filename>
				</package>
				<package name="vim-filesystem" epoch="2" version="9.2.045" release="1.red80" arch="noarch" src="vim-9.2.045-1.red80.src.rpm">
					<filename>vim-filesystem-2:9.2.045-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-80-0001</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость sqlite </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в sqlite</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-sqlite-cve-2022-46908-8.0/</description>
               <solution>Установить обновление для пакета(ов) sqlite
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-sqlite-cve-2022-46908-8.0/" type="self" id="ROS-20260320-80-0001" title="ROS-20260320-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46908" type="cve" id="CVE-2022-46908" title="CVE-2022-46908" />
			<reference href="https://bdu.fstec.ru/vul/2023-05686" type="self" id="BDU:2023-05686" title="BDU:2023-05686" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="sqlite" epoch="0" version="3.40.0" release="4.red80" arch="x86_64" src="sqlite-3.40.0-4.red80.src.rpm">
					<filename>sqlite-0:3.40.0-4.red80.x86_64.rpm</filename>
				</package>
				<package name="sqlite-libs" epoch="0" version="3.40.0" release="4.red80" arch="x86_64" src="sqlite-3.40.0-4.red80.src.rpm">
					<filename>sqlite-libs-0:3.40.0-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="sqlite" epoch="0" version="3.40.0" release="4.red80" arch="aarch64" src="sqlite-3.40.0-4.red80.src.rpm">
					<filename>sqlite-0:3.40.0-4.red80.aarch64.rpm</filename>
				</package>
				<package name="sqlite-libs" epoch="0" version="3.40.0" release="4.red80" arch="aarch64" src="sqlite-3.40.0-4.red80.src.rpm">
					<filename>sqlite-libs-0:3.40.0-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-80-0002</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость libsoup </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libsoup</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libsoup-cve-2025-32049-8.0/</description>
               <solution>Установить обновление для пакета(ов) libsoup
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libsoup-cve-2025-32049-8.0/" type="self" id="ROS-20260320-80-0002" title="ROS-20260320-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32049" type="cve" id="CVE-2025-32049" title="CVE-2025-32049" />
			<reference href="https://bdu.fstec.ru/vul/2025-07139" type="self" id="BDU:2025-07139" title="BDU:2025-07139" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libsoup" epoch="0" version="2.74.3" release="7.red80" arch="x86_64" src="libsoup-2.74.3-7.red80.src.rpm">
					<filename>libsoup-0:2.74.3-7.red80.x86_64.rpm</filename>
				</package>
				<package name="libsoup-devel" epoch="0" version="2.74.3" release="7.red80" arch="x86_64" src="libsoup-2.74.3-7.red80.src.rpm">
					<filename>libsoup-devel-0:2.74.3-7.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libsoup" epoch="0" version="2.74.3" release="7.red80" arch="aarch64" src="libsoup-2.74.3-7.red80.src.rpm">
					<filename>libsoup-0:2.74.3-7.red80.aarch64.rpm</filename>
				</package>
				<package name="libsoup-devel" epoch="0" version="2.74.3" release="7.red80" arch="aarch64" src="libsoup-2.74.3-7.red80.src.rpm">
					<filename>libsoup-devel-0:2.74.3-7.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libsoup-doc" epoch="0" version="2.74.3" release="7.red80" arch="noarch" src="libsoup-2.74.3-7.red80.src.rpm">
					<filename>libsoup-doc-0:2.74.3-7.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-80-0003</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость libsoup3 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libsoup3</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libsoup3-cve-2025-32049-8.0/</description>
               <solution>Установить обновление для пакета(ов) libsoup3
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libsoup3-cve-2025-32049-8.0/" type="self" id="ROS-20260320-80-0003" title="ROS-20260320-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32049" type="cve" id="CVE-2025-32049" title="CVE-2025-32049" />
			<reference href="https://bdu.fstec.ru/vul/2025-07139" type="self" id="BDU:2025-07139" title="BDU:2025-07139" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libsoup3" epoch="0" version="3.6.5" release="4.red80" arch="x86_64" src="libsoup3-3.6.5-4.red80.src.rpm">
					<filename>libsoup3-0:3.6.5-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libsoup3-devel" epoch="0" version="3.6.5" release="4.red80" arch="x86_64" src="libsoup3-3.6.5-4.red80.src.rpm">
					<filename>libsoup3-devel-0:3.6.5-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libsoup3" epoch="0" version="3.6.5" release="4.red80" arch="aarch64" src="libsoup3-3.6.5-4.red80.src.rpm">
					<filename>libsoup3-0:3.6.5-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libsoup3-devel" epoch="0" version="3.6.5" release="4.red80" arch="aarch64" src="libsoup3-3.6.5-4.red80.src.rpm">
					<filename>libsoup3-devel-0:3.6.5-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libsoup3-doc" epoch="0" version="3.6.5" release="4.red80" arch="noarch" src="libsoup3-3.6.5-4.red80.src.rpm">
					<filename>libsoup3-doc-0:3.6.5-4.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-80-0004</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость opentofu </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в opentofu</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-opentofu-cve-2025-61727-8.0/</description>
               <solution>Установить обновление для пакета(ов) opentofu
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-opentofu-cve-2025-61727-8.0/" type="self" id="ROS-20260320-80-0004" title="ROS-20260320-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61727" type="cve" id="CVE-2025-61727" title="CVE-2025-61727" />
			<reference href="https://bdu.fstec.ru/vul/2026-00268" type="self" id="BDU:2026-00268" title="BDU:2026-00268" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="opentofu" epoch="0" version="1.11.5" release="1.red80" arch="x86_64" src="opentofu-1.11.5-1.red80.src.rpm">
					<filename>opentofu-0:1.11.5-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="opentofu" epoch="0" version="1.11.5" release="1.red80" arch="aarch64" src="opentofu-1.11.5-1.red80.src.rpm">
					<filename>opentofu-0:1.11.5-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-80-0005</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость jenkins </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jenkins-cve-2026-27099-8.0/</description>
               <solution>Установить обновление для пакета(ов) jenkins
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jenkins-cve-2026-27099-8.0/" type="self" id="ROS-20260320-80-0005" title="ROS-20260320-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27099" type="cve" id="CVE-2026-27099" title="CVE-2026-27099" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="jenkins" epoch="0" version="2.541.2" release="1.red80" arch="noarch" src="jenkins-2.541.2-1.red80.src.rpm">
					<filename>jenkins-0:2.541.2-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-80-0006</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость jenkins </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в jenkins</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jenkins-cve-2026-27100-8.0/</description>
               <solution>Установить обновление для пакета(ов) jenkins
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-jenkins-cve-2026-27100-8.0/" type="self" id="ROS-20260320-80-0006" title="ROS-20260320-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27100" type="cve" id="CVE-2026-27100" title="CVE-2026-27100" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="jenkins" epoch="0" version="2.541.2" release="1.red80" arch="noarch" src="jenkins-2.541.2-1.red80.src.rpm">
					<filename>jenkins-0:2.541.2-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-80-0007</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость etcd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в etcd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-etcd-cve-2025-47914-8.0/</description>
               <solution>Установить обновление для пакета(ов) etcd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-etcd-cve-2025-47914-8.0/" type="self" id="ROS-20260320-80-0007" title="ROS-20260320-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47914" type="cve" id="CVE-2025-47914" title="CVE-2025-47914" />
			<reference href="https://bdu.fstec.ru/vul/2025-14682" type="self" id="BDU:2025-14682" title="BDU:2025-14682" />
		</references>
		<pkglist>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="etcd" epoch="0" version="3.6.5" release="2.red80" arch="aarch64" src="etcd-3.6.5-2.red80.src.rpm">
					<filename>etcd-0:3.6.5-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-80-0008</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость etcd </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в etcd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-etcd-cve-2025-58181-8.0/</description>
               <solution>Установить обновление для пакета(ов) etcd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-etcd-cve-2025-58181-8.0/" type="self" id="ROS-20260320-80-0008" title="ROS-20260320-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58181" type="cve" id="CVE-2025-58181" title="CVE-2025-58181" />
			<reference href="https://bdu.fstec.ru/vul/2025-14688" type="self" id="BDU:2025-14688" title="BDU:2025-14688" />
		</references>
		<pkglist>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="etcd" epoch="0" version="3.6.5" release="2.red80" arch="aarch64" src="etcd-3.6.5-2.red80.src.rpm">
					<filename>etcd-0:3.6.5-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-80-0009</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость etcd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в etcd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-etcd-cve-2025-61726-8.0/</description>
               <solution>Установить обновление для пакета(ов) etcd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-etcd-cve-2025-61726-8.0/" type="self" id="ROS-20260320-80-0009" title="ROS-20260320-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61726" type="cve" id="CVE-2025-61726" title="CVE-2025-61726" />
			<reference href="https://bdu.fstec.ru/vul/2026-03409" type="self" id="BDU:2026-03409" title="BDU:2026-03409" />
		</references>
		<pkglist>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="etcd" epoch="0" version="3.6.5" release="2.red80" arch="aarch64" src="etcd-3.6.5-2.red80.src.rpm">
					<filename>etcd-0:3.6.5-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-80-0010</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость etcd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в etcd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-etcd-cve-2025-61731-8.0/</description>
               <solution>Установить обновление для пакета(ов) etcd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-etcd-cve-2025-61731-8.0/" type="self" id="ROS-20260320-80-0010" title="ROS-20260320-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61731" type="cve" id="CVE-2025-61731" title="CVE-2025-61731" />
			<reference href="https://bdu.fstec.ru/vul/2026-03411" type="self" id="BDU:2026-03411" title="BDU:2026-03411" />
		</references>
		<pkglist>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="etcd" epoch="0" version="3.6.5" release="2.red80" arch="aarch64" src="etcd-3.6.5-2.red80.src.rpm">
					<filename>etcd-0:3.6.5-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-80-0011</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость etcd </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в etcd</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-etcd-cve-2025-61732-8.0/</description>
               <solution>Установить обновление для пакета(ов) etcd
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-etcd-cve-2025-61732-8.0/" type="self" id="ROS-20260320-80-0011" title="ROS-20260320-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61732" type="cve" id="CVE-2025-61732" title="CVE-2025-61732" />
			<reference href="https://bdu.fstec.ru/vul/2026-02553" type="self" id="BDU:2026-02553" title="BDU:2026-02553" />
		</references>
		<pkglist>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="etcd" epoch="0" version="3.6.5" release="2.red80" arch="aarch64" src="etcd-3.6.5-2.red80.src.rpm">
					<filename>etcd-0:3.6.5-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-80-0012</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glpi-cve-2026-25590-8.0/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glpi-cve-2026-25590-8.0/" type="self" id="ROS-20260320-80-0012" title="ROS-20260320-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25590" type="cve" id="CVE-2026-25590" title="CVE-2026-25590" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="glpi" epoch="0" version="11.0.5" release="1.red80" arch="noarch" src="glpi-11.0.5-1.red80.src.rpm">
					<filename>glpi-0:11.0.5-1.red80.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.5" release="1.red80" arch="noarch" src="glpi-11.0.5-1.red80.src.rpm">
					<filename>glpi-marketplace-0:11.0.5-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260320-80-0013</id>
		<issued date="2026-03-20" />
		<updated date="2026-03-20" />
		<title>Уязвимость glpi </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в glpi</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glpi-cve-2026-22248-8.0/</description>
               <solution>Установить обновление для пакета(ов) glpi
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-glpi-cve-2026-22248-8.0/" type="self" id="ROS-20260320-80-0013" title="ROS-20260320-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22248" type="cve" id="CVE-2026-22248" title="CVE-2026-22248" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="glpi" epoch="0" version="11.0.5" release="1.red80" arch="noarch" src="glpi-11.0.5-1.red80.src.rpm">
					<filename>glpi-0:11.0.5-1.red80.noarch.rpm</filename>
				</package>
				<package name="glpi-marketplace" epoch="0" version="11.0.5" release="1.red80" arch="noarch" src="glpi-11.0.5-1.red80.src.rpm">
					<filename>glpi-marketplace-0:11.0.5-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0001</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38095-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38095-8.0/" type="self" id="ROS-20260323-80-0001" title="ROS-20260323-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38095" type="cve" id="CVE-2025-38095" title="CVE-2025-38095" />
			<reference href="https://bdu.fstec.ru/vul/2025-09023" type="self" id="BDU:2025-09023" title="BDU:2025-09023" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0002</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38097-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38097-8.0/" type="self" id="ROS-20260323-80-0002" title="ROS-20260323-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38097" type="cve" id="CVE-2025-38097" title="CVE-2025-38097" />
			<reference href="https://bdu.fstec.ru/vul/2025-09031" type="self" id="BDU:2025-09031" title="BDU:2025-09031" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0003</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38100-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38100-8.0/" type="self" id="ROS-20260323-80-0003" title="ROS-20260323-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38100" type="cve" id="CVE-2025-38100" title="CVE-2025-38100" />
			<reference href="https://bdu.fstec.ru/vul/2025-09025" type="self" id="BDU:2025-09025" title="BDU:2025-09025" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0004</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38101-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38101-8.0/" type="self" id="ROS-20260323-80-0004" title="ROS-20260323-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38101" type="cve" id="CVE-2025-38101" title="CVE-2025-38101" />
			<reference href="https://bdu.fstec.ru/vul/2025-09026" type="self" id="BDU:2025-09026" title="BDU:2025-09026" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0005</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38125-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38125-8.0/" type="self" id="ROS-20260323-80-0005" title="ROS-20260323-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38125" type="cve" id="CVE-2025-38125" title="CVE-2025-38125" />
			<reference href="https://bdu.fstec.ru/vul/2025-09603" type="self" id="BDU:2025-09603" title="BDU:2025-09603" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0006</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38129-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38129-8.0/" type="self" id="ROS-20260323-80-0006" title="ROS-20260323-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38129" type="cve" id="CVE-2025-38129" title="CVE-2025-38129" />
			<reference href="https://bdu.fstec.ru/vul/2025-09604" type="self" id="BDU:2025-09604" title="BDU:2025-09604" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0007</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38232-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38232-8.0/" type="self" id="ROS-20260323-80-0007" title="ROS-20260323-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38232" type="cve" id="CVE-2025-38232" title="CVE-2025-38232" />
			<reference href="https://bdu.fstec.ru/vul/2025-09033" type="self" id="BDU:2025-09033" title="BDU:2025-09033" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0008</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38260-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38260-8.0/" type="self" id="ROS-20260323-80-0008" title="ROS-20260323-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38260" type="cve" id="CVE-2025-38260" title="CVE-2025-38260" />
			<reference href="https://bdu.fstec.ru/vul/2025-13466" type="self" id="BDU:2025-13466" title="BDU:2025-13466" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0009</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38262-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38262-8.0/" type="self" id="ROS-20260323-80-0009" title="ROS-20260323-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38262" type="cve" id="CVE-2025-38262" title="CVE-2025-38262" />
			<reference href="https://bdu.fstec.ru/vul/2025-13467" type="self" id="BDU:2025-13467" title="BDU:2025-13467" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0010</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38263-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38263-8.0/" type="self" id="ROS-20260323-80-0010" title="ROS-20260323-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38263" type="cve" id="CVE-2025-38263" title="CVE-2025-38263" />
			<reference href="https://bdu.fstec.ru/vul/2025-13565" type="self" id="BDU:2025-13565" title="BDU:2025-13565" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0011</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38514-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38514-8.0/" type="self" id="ROS-20260323-80-0011" title="ROS-20260323-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38514" type="cve" id="CVE-2025-38514" title="CVE-2025-38514" />
			<reference href="https://bdu.fstec.ru/vul/2025-15822" type="self" id="BDU:2025-15822" title="BDU:2025-15822" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0012</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38515-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38515-8.0/" type="self" id="ROS-20260323-80-0012" title="ROS-20260323-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38515" type="cve" id="CVE-2025-38515" title="CVE-2025-38515" />
			<reference href="https://bdu.fstec.ru/vul/2025-15821" type="self" id="BDU:2025-15821" title="BDU:2025-15821" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0013</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38516-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38516-8.0/" type="self" id="ROS-20260323-80-0013" title="ROS-20260323-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38516" type="cve" id="CVE-2025-38516" title="CVE-2025-38516" />
			<reference href="https://bdu.fstec.ru/vul/2025-15820" type="self" id="BDU:2025-15820" title="BDU:2025-15820" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0014</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38517-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38517-8.0/" type="self" id="ROS-20260323-80-0014" title="ROS-20260323-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38517" type="cve" id="CVE-2025-38517" title="CVE-2025-38517" />
			<reference href="https://bdu.fstec.ru/vul/2025-15163" type="self" id="BDU:2025-15163" title="BDU:2025-15163" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0015</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38520-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38520-8.0/" type="self" id="ROS-20260323-80-0015" title="ROS-20260323-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38520" type="cve" id="CVE-2025-38520" title="CVE-2025-38520" />
			<reference href="https://bdu.fstec.ru/vul/2025-14968" type="self" id="BDU:2025-14968" title="BDU:2025-14968" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0016</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38521-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38521-8.0/" type="self" id="ROS-20260323-80-0016" title="ROS-20260323-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38521" type="cve" id="CVE-2025-38521" title="CVE-2025-38521" />
			<reference href="https://bdu.fstec.ru/vul/2025-15819" type="self" id="BDU:2025-15819" title="BDU:2025-15819" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0017</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38523-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38523-8.0/" type="self" id="ROS-20260323-80-0017" title="ROS-20260323-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38523" type="cve" id="CVE-2025-38523" title="CVE-2025-38523" />
			<reference href="https://bdu.fstec.ru/vul/2025-15164" type="self" id="BDU:2025-15164" title="BDU:2025-15164" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0018</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38526-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38526-8.0/" type="self" id="ROS-20260323-80-0018" title="ROS-20260323-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38526" type="cve" id="CVE-2025-38526" title="CVE-2025-38526" />
			<reference href="https://bdu.fstec.ru/vul/2025-15817" type="self" id="BDU:2025-15817" title="BDU:2025-15817" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0019</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38527-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38527-8.0/" type="self" id="ROS-20260323-80-0019" title="ROS-20260323-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38527" type="cve" id="CVE-2025-38527" title="CVE-2025-38527" />
			<reference href="https://bdu.fstec.ru/vul/2025-15816" type="self" id="BDU:2025-15816" title="BDU:2025-15816" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0020</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38528-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38528-8.0/" type="self" id="ROS-20260323-80-0020" title="ROS-20260323-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38528" type="cve" id="CVE-2025-38528" title="CVE-2025-38528" />
			<reference href="https://bdu.fstec.ru/vul/2025-15554" type="self" id="BDU:2025-15554" title="BDU:2025-15554" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0021</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38529-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38529-8.0/" type="self" id="ROS-20260323-80-0021" title="ROS-20260323-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38529" type="cve" id="CVE-2025-38529" title="CVE-2025-38529" />
			<reference href="https://bdu.fstec.ru/vul/2025-15815" type="self" id="BDU:2025-15815" title="BDU:2025-15815" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0022</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38530-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38530-8.0/" type="self" id="ROS-20260323-80-0022" title="ROS-20260323-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38530" type="cve" id="CVE-2025-38530" title="CVE-2025-38530" />
			<reference href="https://bdu.fstec.ru/vul/2025-15814" type="self" id="BDU:2025-15814" title="BDU:2025-15814" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0023</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38532-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38532-8.0/" type="self" id="ROS-20260323-80-0023" title="ROS-20260323-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38532" type="cve" id="CVE-2025-38532" title="CVE-2025-38532" />
			<reference href="https://bdu.fstec.ru/vul/2025-15813" type="self" id="BDU:2025-15813" title="BDU:2025-15813" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0024</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38533-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38533-8.0/" type="self" id="ROS-20260323-80-0024" title="ROS-20260323-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38533" type="cve" id="CVE-2025-38533" title="CVE-2025-38533" />
			<reference href="https://bdu.fstec.ru/vul/2025-15165" type="self" id="BDU:2025-15165" title="BDU:2025-15165" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0025</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38535-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38535-8.0/" type="self" id="ROS-20260323-80-0025" title="ROS-20260323-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38535" type="cve" id="CVE-2025-38535" title="CVE-2025-38535" />
			<reference href="https://bdu.fstec.ru/vul/2025-15811" type="self" id="BDU:2025-15811" title="BDU:2025-15811" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0026</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38537-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38537-8.0/" type="self" id="ROS-20260323-80-0026" title="ROS-20260323-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38537" type="cve" id="CVE-2025-38537" title="CVE-2025-38537" />
			<reference href="https://bdu.fstec.ru/vul/2025-14969" type="self" id="BDU:2025-14969" title="BDU:2025-14969" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0027</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38538-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38538-8.0/" type="self" id="ROS-20260323-80-0027" title="ROS-20260323-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38538" type="cve" id="CVE-2025-38538" title="CVE-2025-38538" />
			<reference href="https://bdu.fstec.ru/vul/2025-14978" type="self" id="BDU:2025-14978" title="BDU:2025-14978" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0028</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38539-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38539-8.0/" type="self" id="ROS-20260323-80-0028" title="ROS-20260323-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38539" type="cve" id="CVE-2025-38539" title="CVE-2025-38539" />
			<reference href="https://bdu.fstec.ru/vul/2025-15810" type="self" id="BDU:2025-15810" title="BDU:2025-15810" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0029</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38540-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38540-8.0/" type="self" id="ROS-20260323-80-0029" title="ROS-20260323-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38540" type="cve" id="CVE-2025-38540" title="CVE-2025-38540" />
			<reference href="https://bdu.fstec.ru/vul/2025-15166" type="self" id="BDU:2025-15166" title="BDU:2025-15166" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0030</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38541-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38541-8.0/" type="self" id="ROS-20260323-80-0030" title="ROS-20260323-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38541" type="cve" id="CVE-2025-38541" title="CVE-2025-38541" />
			<reference href="https://bdu.fstec.ru/vul/2025-15167" type="self" id="BDU:2025-15167" title="BDU:2025-15167" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0031</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38542-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38542-8.0/" type="self" id="ROS-20260323-80-0031" title="ROS-20260323-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38542" type="cve" id="CVE-2025-38542" title="CVE-2025-38542" />
			<reference href="https://bdu.fstec.ru/vul/2025-15809" type="self" id="BDU:2025-15809" title="BDU:2025-15809" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0032</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38543-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38543-8.0/" type="self" id="ROS-20260323-80-0032" title="ROS-20260323-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38543" type="cve" id="CVE-2025-38543" title="CVE-2025-38543" />
			<reference href="https://bdu.fstec.ru/vul/2025-15808" type="self" id="BDU:2025-15808" title="BDU:2025-15808" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0033</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38545-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38545-8.0/" type="self" id="ROS-20260323-80-0033" title="ROS-20260323-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38545" type="cve" id="CVE-2025-38545" title="CVE-2025-38545" />
			<reference href="https://bdu.fstec.ru/vul/2025-15807" type="self" id="BDU:2025-15807" title="BDU:2025-15807" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0034</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38546-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38546-8.0/" type="self" id="ROS-20260323-80-0034" title="ROS-20260323-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38546" type="cve" id="CVE-2025-38546" title="CVE-2025-38546" />
			<reference href="https://bdu.fstec.ru/vul/2025-15806" type="self" id="BDU:2025-15806" title="BDU:2025-15806" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0035</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38547-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38547-8.0/" type="self" id="ROS-20260323-80-0035" title="ROS-20260323-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38547" type="cve" id="CVE-2025-38547" title="CVE-2025-38547" />
			<reference href="https://bdu.fstec.ru/vul/2025-15805" type="self" id="BDU:2025-15805" title="BDU:2025-15805" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0036</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38548-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38548-8.0/" type="self" id="ROS-20260323-80-0036" title="ROS-20260323-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38548" type="cve" id="CVE-2025-38548" title="CVE-2025-38548" />
			<reference href="https://bdu.fstec.ru/vul/2025-15168" type="self" id="BDU:2025-15168" title="BDU:2025-15168" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0037</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38549-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38549-8.0/" type="self" id="ROS-20260323-80-0037" title="ROS-20260323-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38549" type="cve" id="CVE-2025-38549" title="CVE-2025-38549" />
			<reference href="https://bdu.fstec.ru/vul/2025-15169" type="self" id="BDU:2025-15169" title="BDU:2025-15169" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0038</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38550-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38550-8.0/" type="self" id="ROS-20260323-80-0038" title="ROS-20260323-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38550" type="cve" id="CVE-2025-38550" title="CVE-2025-38550" />
			<reference href="https://bdu.fstec.ru/vul/2025-15804" type="self" id="BDU:2025-15804" title="BDU:2025-15804" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0039</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38551-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38551-8.0/" type="self" id="ROS-20260323-80-0039" title="ROS-20260323-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38551" type="cve" id="CVE-2025-38551" title="CVE-2025-38551" />
			<reference href="https://bdu.fstec.ru/vul/2025-15019" type="self" id="BDU:2025-15019" title="BDU:2025-15019" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0040</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38552-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38552-8.0/" type="self" id="ROS-20260323-80-0040" title="ROS-20260323-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38552" type="cve" id="CVE-2025-38552" title="CVE-2025-38552" />
			<reference href="https://bdu.fstec.ru/vul/2025-15803" type="self" id="BDU:2025-15803" title="BDU:2025-15803" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0041</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38553-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38553-8.0/" type="self" id="ROS-20260323-80-0041" title="ROS-20260323-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38553" type="cve" id="CVE-2025-38553" title="CVE-2025-38553" />
			<reference href="https://bdu.fstec.ru/vul/2025-15553" type="self" id="BDU:2025-15553" title="BDU:2025-15553" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0042</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38555-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38555-8.0/" type="self" id="ROS-20260323-80-0042" title="ROS-20260323-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38555" type="cve" id="CVE-2025-38555" title="CVE-2025-38555" />
			<reference href="https://bdu.fstec.ru/vul/2025-10721" type="self" id="BDU:2025-10721" title="BDU:2025-10721" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0043</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38556-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38556-8.0/" type="self" id="ROS-20260323-80-0043" title="ROS-20260323-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38556" type="cve" id="CVE-2025-38556" title="CVE-2025-38556" />
			<reference href="https://bdu.fstec.ru/vul/2025-10722" type="self" id="BDU:2025-10722" title="BDU:2025-10722" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0044</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38557-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38557-8.0/" type="self" id="ROS-20260323-80-0044" title="ROS-20260323-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38557" type="cve" id="CVE-2025-38557" title="CVE-2025-38557" />
			<reference href="https://bdu.fstec.ru/vul/2025-10724" type="self" id="BDU:2025-10724" title="BDU:2025-10724" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260323-80-0045</id>
		<issued date="2026-03-23" />
		<updated date="2026-03-23" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38560-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38560-8.0/" type="self" id="ROS-20260323-80-0045" title="ROS-20260323-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38560" type="cve" id="CVE-2025-38560" title="CVE-2025-38560" />
			<reference href="https://bdu.fstec.ru/vul/2025-10726" type="self" id="BDU:2025-10726" title="BDU:2025-10726" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0001</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38561-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38561-8.0/" type="self" id="ROS-20260324-80-0001" title="ROS-20260324-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38561" type="cve" id="CVE-2025-38561" title="CVE-2025-38561" />
			<reference href="https://bdu.fstec.ru/vul/2025-10729" type="self" id="BDU:2025-10729" title="BDU:2025-10729" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0002</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38562-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38562-8.0/" type="self" id="ROS-20260324-80-0002" title="ROS-20260324-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38562" type="cve" id="CVE-2025-38562" title="CVE-2025-38562" />
			<reference href="https://bdu.fstec.ru/vul/2025-10730" type="self" id="BDU:2025-10730" title="BDU:2025-10730" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0003</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38563-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38563-8.0/" type="self" id="ROS-20260324-80-0003" title="ROS-20260324-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38563" type="cve" id="CVE-2025-38563" title="CVE-2025-38563" />
			<reference href="https://bdu.fstec.ru/vul/2025-10727" type="self" id="BDU:2025-10727" title="BDU:2025-10727" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0004</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38565-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38565-8.0/" type="self" id="ROS-20260324-80-0004" title="ROS-20260324-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38565" type="cve" id="CVE-2025-38565" title="CVE-2025-38565" />
			<reference href="https://bdu.fstec.ru/vul/2025-15802" type="self" id="BDU:2025-15802" title="BDU:2025-15802" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0005</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38566-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38566-8.0/" type="self" id="ROS-20260324-80-0005" title="ROS-20260324-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38566" type="cve" id="CVE-2025-38566" title="CVE-2025-38566" />
			<reference href="https://bdu.fstec.ru/vul/2025-10728" type="self" id="BDU:2025-10728" title="BDU:2025-10728" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0006</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38568-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38568-8.0/" type="self" id="ROS-20260324-80-0006" title="ROS-20260324-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38568" type="cve" id="CVE-2025-38568" title="CVE-2025-38568" />
			<reference href="https://bdu.fstec.ru/vul/2025-15801" type="self" id="BDU:2025-15801" title="BDU:2025-15801" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0007</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38569-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38569-8.0/" type="self" id="ROS-20260324-80-0007" title="ROS-20260324-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38569" type="cve" id="CVE-2025-38569" title="CVE-2025-38569" />
			<reference href="https://bdu.fstec.ru/vul/2025-15800" type="self" id="BDU:2025-15800" title="BDU:2025-15800" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0008</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38571-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38571-8.0/" type="self" id="ROS-20260324-80-0008" title="ROS-20260324-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38571" type="cve" id="CVE-2025-38571" title="CVE-2025-38571" />
			<reference href="https://bdu.fstec.ru/vul/2025-15170" type="self" id="BDU:2025-15170" title="BDU:2025-15170" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0009</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38572-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38572-8.0/" type="self" id="ROS-20260324-80-0009" title="ROS-20260324-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38572" type="cve" id="CVE-2025-38572" title="CVE-2025-38572" />
			<reference href="https://bdu.fstec.ru/vul/2025-15171" type="self" id="BDU:2025-15171" title="BDU:2025-15171" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0010</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38573-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38573-8.0/" type="self" id="ROS-20260324-80-0010" title="ROS-20260324-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38573" type="cve" id="CVE-2025-38573" title="CVE-2025-38573" />
			<reference href="https://bdu.fstec.ru/vul/2025-14980" type="self" id="BDU:2025-14980" title="BDU:2025-14980" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0011</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38574-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38574-8.0/" type="self" id="ROS-20260324-80-0011" title="ROS-20260324-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38574" type="cve" id="CVE-2025-38574" title="CVE-2025-38574" />
			<reference href="https://bdu.fstec.ru/vul/2025-15172" type="self" id="BDU:2025-15172" title="BDU:2025-15172" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0012</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38576-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38576-8.0/" type="self" id="ROS-20260324-80-0012" title="ROS-20260324-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38576" type="cve" id="CVE-2025-38576" title="CVE-2025-38576" />
			<reference href="https://bdu.fstec.ru/vul/2025-15799" type="self" id="BDU:2025-15799" title="BDU:2025-15799" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0013</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38577-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38577-8.0/" type="self" id="ROS-20260324-80-0013" title="ROS-20260324-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38577" type="cve" id="CVE-2025-38577" title="CVE-2025-38577" />
			<reference href="https://bdu.fstec.ru/vul/2025-15173" type="self" id="BDU:2025-15173" title="BDU:2025-15173" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0014</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38578-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38578-8.0/" type="self" id="ROS-20260324-80-0014" title="ROS-20260324-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38578" type="cve" id="CVE-2025-38578" title="CVE-2025-38578" />
			<reference href="https://bdu.fstec.ru/vul/2025-15174" type="self" id="BDU:2025-15174" title="BDU:2025-15174" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0015</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38579-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38579-8.0/" type="self" id="ROS-20260324-80-0015" title="ROS-20260324-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38579" type="cve" id="CVE-2025-38579" title="CVE-2025-38579" />
			<reference href="https://bdu.fstec.ru/vul/2025-15175" type="self" id="BDU:2025-15175" title="BDU:2025-15175" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0016</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38581-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38581-8.0/" type="self" id="ROS-20260324-80-0016" title="ROS-20260324-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38581" type="cve" id="CVE-2025-38581" title="CVE-2025-38581" />
			<reference href="https://bdu.fstec.ru/vul/2025-15798" type="self" id="BDU:2025-15798" title="BDU:2025-15798" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0017</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38583-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38583-8.0/" type="self" id="ROS-20260324-80-0017" title="ROS-20260324-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38583" type="cve" id="CVE-2025-38583" title="CVE-2025-38583" />
			<reference href="https://bdu.fstec.ru/vul/2025-15797" type="self" id="BDU:2025-15797" title="BDU:2025-15797" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0018</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38586-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38586-8.0/" type="self" id="ROS-20260324-80-0018" title="ROS-20260324-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38586" type="cve" id="CVE-2025-38586" title="CVE-2025-38586" />
			<reference href="https://bdu.fstec.ru/vul/2025-15176" type="self" id="BDU:2025-15176" title="BDU:2025-15176" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0019</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38587-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38587-8.0/" type="self" id="ROS-20260324-80-0019" title="ROS-20260324-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38587" type="cve" id="CVE-2025-38587" title="CVE-2025-38587" />
			<reference href="https://bdu.fstec.ru/vul/2025-14981" type="self" id="BDU:2025-14981" title="BDU:2025-14981" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0020</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38588-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38588-8.0/" type="self" id="ROS-20260324-80-0020" title="ROS-20260324-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38588" type="cve" id="CVE-2025-38588" title="CVE-2025-38588" />
			<reference href="https://bdu.fstec.ru/vul/2025-14977" type="self" id="BDU:2025-14977" title="BDU:2025-14977" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0021</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38591-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38591-8.0/" type="self" id="ROS-20260324-80-0021" title="ROS-20260324-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38591" type="cve" id="CVE-2025-38591" title="CVE-2025-38591" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.69" release="1.red80" arch="noarch" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.69-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0022</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38593-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38593-8.0/" type="self" id="ROS-20260324-80-0022" title="ROS-20260324-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38593" type="cve" id="CVE-2025-38593" title="CVE-2025-38593" />
			<reference href="https://bdu.fstec.ru/vul/2026-02817" type="self" id="BDU:2026-02817" title="BDU:2026-02817" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0023</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38601-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38601-8.0/" type="self" id="ROS-20260324-80-0023" title="ROS-20260324-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38601" type="cve" id="CVE-2025-38601" title="CVE-2025-38601" />
			<reference href="https://bdu.fstec.ru/vul/2025-15177" type="self" id="BDU:2025-15177" title="BDU:2025-15177" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0024</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38602-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38602-8.0/" type="self" id="ROS-20260324-80-0024" title="ROS-20260324-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38602" type="cve" id="CVE-2025-38602" title="CVE-2025-38602" />
			<reference href="https://bdu.fstec.ru/vul/2025-15796" type="self" id="BDU:2025-15796" title="BDU:2025-15796" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0025</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38604-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38604-8.0/" type="self" id="ROS-20260324-80-0025" title="ROS-20260324-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38604" type="cve" id="CVE-2025-38604" title="CVE-2025-38604" />
			<reference href="https://bdu.fstec.ru/vul/2025-15178" type="self" id="BDU:2025-15178" title="BDU:2025-15178" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0026</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38608-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38608-8.0/" type="self" id="ROS-20260324-80-0026" title="ROS-20260324-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38608" type="cve" id="CVE-2025-38608" title="CVE-2025-38608" />
			<reference href="https://bdu.fstec.ru/vul/2025-15179" type="self" id="BDU:2025-15179" title="BDU:2025-15179" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0027</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38609-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38609-8.0/" type="self" id="ROS-20260324-80-0027" title="ROS-20260324-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38609" type="cve" id="CVE-2025-38609" title="CVE-2025-38609" />
			<reference href="https://bdu.fstec.ru/vul/2025-15795" type="self" id="BDU:2025-15795" title="BDU:2025-15795" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0028</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38610-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38610-8.0/" type="self" id="ROS-20260324-80-0028" title="ROS-20260324-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38610" type="cve" id="CVE-2025-38610" title="CVE-2025-38610" />
			<reference href="https://bdu.fstec.ru/vul/2025-15794" type="self" id="BDU:2025-15794" title="BDU:2025-15794" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0029</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38611-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38611-8.0/" type="self" id="ROS-20260324-80-0029" title="ROS-20260324-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38611" type="cve" id="CVE-2025-38611" title="CVE-2025-38611" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0030</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38612-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38612-8.0/" type="self" id="ROS-20260324-80-0030" title="ROS-20260324-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38612" type="cve" id="CVE-2025-38612" title="CVE-2025-38612" />
			<reference href="https://bdu.fstec.ru/vul/2025-15793" type="self" id="BDU:2025-15793" title="BDU:2025-15793" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0031</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38614-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38614-8.0/" type="self" id="ROS-20260324-80-0031" title="ROS-20260324-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38614" type="cve" id="CVE-2025-38614" title="CVE-2025-38614" />
			<reference href="https://bdu.fstec.ru/vul/2025-15552" type="self" id="BDU:2025-15552" title="BDU:2025-15552" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0032</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38617-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38617-8.0/" type="self" id="ROS-20260324-80-0032" title="ROS-20260324-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38617" type="cve" id="CVE-2025-38617" title="CVE-2025-38617" />
			<reference href="https://bdu.fstec.ru/vul/2025-15791" type="self" id="BDU:2025-15791" title="BDU:2025-15791" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0033</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38618-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38618-8.0/" type="self" id="ROS-20260324-80-0033" title="ROS-20260324-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38618" type="cve" id="CVE-2025-38618" title="CVE-2025-38618" />
			<reference href="https://bdu.fstec.ru/vul/2025-15180" type="self" id="BDU:2025-15180" title="BDU:2025-15180" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0034</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38619-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38619-8.0/" type="self" id="ROS-20260324-80-0034" title="ROS-20260324-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38619" type="cve" id="CVE-2025-38619" title="CVE-2025-38619" />
			<reference href="https://bdu.fstec.ru/vul/2025-15181" type="self" id="BDU:2025-15181" title="BDU:2025-15181" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0035</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38622-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38622-8.0/" type="self" id="ROS-20260324-80-0035" title="ROS-20260324-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38622" type="cve" id="CVE-2025-38622" title="CVE-2025-38622" />
			<reference href="https://bdu.fstec.ru/vul/2025-15790" type="self" id="BDU:2025-15790" title="BDU:2025-15790" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0036</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38623-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38623-8.0/" type="self" id="ROS-20260324-80-0036" title="ROS-20260324-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38623" type="cve" id="CVE-2025-38623" title="CVE-2025-38623" />
			<reference href="https://bdu.fstec.ru/vul/2025-15789" type="self" id="BDU:2025-15789" title="BDU:2025-15789" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0037</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38624-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38624-8.0/" type="self" id="ROS-20260324-80-0037" title="ROS-20260324-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38624" type="cve" id="CVE-2025-38624" title="CVE-2025-38624" />
			<reference href="https://bdu.fstec.ru/vul/2025-15788" type="self" id="BDU:2025-15788" title="BDU:2025-15788" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0038</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38625-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38625-8.0/" type="self" id="ROS-20260324-80-0038" title="ROS-20260324-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38625" type="cve" id="CVE-2025-38625" title="CVE-2025-38625" />
			<reference href="https://bdu.fstec.ru/vul/2025-15787" type="self" id="BDU:2025-15787" title="BDU:2025-15787" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0039</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38628-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38628-8.0/" type="self" id="ROS-20260324-80-0039" title="ROS-20260324-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38628" type="cve" id="CVE-2025-38628" title="CVE-2025-38628" />
			<reference href="https://bdu.fstec.ru/vul/2025-15786" type="self" id="BDU:2025-15786" title="BDU:2025-15786" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0040</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38630-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38630-8.0/" type="self" id="ROS-20260324-80-0040" title="ROS-20260324-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38630" type="cve" id="CVE-2025-38630" title="CVE-2025-38630" />
			<reference href="https://bdu.fstec.ru/vul/2025-15785" type="self" id="BDU:2025-15785" title="BDU:2025-15785" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0041</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38631-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38631-8.0/" type="self" id="ROS-20260324-80-0041" title="ROS-20260324-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38631" type="cve" id="CVE-2025-38631" title="CVE-2025-38631" />
			<reference href="https://bdu.fstec.ru/vul/2025-15784" type="self" id="BDU:2025-15784" title="BDU:2025-15784" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0042</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38632-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38632-8.0/" type="self" id="ROS-20260324-80-0042" title="ROS-20260324-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38632" type="cve" id="CVE-2025-38632" title="CVE-2025-38632" />
			<reference href="https://bdu.fstec.ru/vul/2025-15783" type="self" id="BDU:2025-15783" title="BDU:2025-15783" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0043</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38634-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38634-8.0/" type="self" id="ROS-20260324-80-0043" title="ROS-20260324-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38634" type="cve" id="CVE-2025-38634" title="CVE-2025-38634" />
			<reference href="https://bdu.fstec.ru/vul/2025-15782" type="self" id="BDU:2025-15782" title="BDU:2025-15782" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0044</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38635-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38635-8.0/" type="self" id="ROS-20260324-80-0044" title="ROS-20260324-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38635" type="cve" id="CVE-2025-38635" title="CVE-2025-38635" />
			<reference href="https://bdu.fstec.ru/vul/2025-15781" type="self" id="BDU:2025-15781" title="BDU:2025-15781" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0045</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38639-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38639-8.0/" type="self" id="ROS-20260324-80-0045" title="ROS-20260324-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38639" type="cve" id="CVE-2025-38639" title="CVE-2025-38639" />
			<reference href="https://bdu.fstec.ru/vul/2025-15780" type="self" id="BDU:2025-15780" title="BDU:2025-15780" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0046</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38640-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38640-8.0/" type="self" id="ROS-20260324-80-0046" title="ROS-20260324-80-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38640" type="cve" id="CVE-2025-38640" title="CVE-2025-38640" />
			<reference href="https://bdu.fstec.ru/vul/2025-15182" type="self" id="BDU:2025-15182" title="BDU:2025-15182" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0047</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38644-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38644-8.0/" type="self" id="ROS-20260324-80-0047" title="ROS-20260324-80-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38644" type="cve" id="CVE-2025-38644" title="CVE-2025-38644" />
			<reference href="https://bdu.fstec.ru/vul/2025-15779" type="self" id="BDU:2025-15779" title="BDU:2025-15779" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0048</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38645-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38645-8.0/" type="self" id="ROS-20260324-80-0048" title="ROS-20260324-80-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38645" type="cve" id="CVE-2025-38645" title="CVE-2025-38645" />
			<reference href="https://bdu.fstec.ru/vul/2025-15778" type="self" id="BDU:2025-15778" title="BDU:2025-15778" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0049</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38646-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38646-8.0/" type="self" id="ROS-20260324-80-0049" title="ROS-20260324-80-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38646" type="cve" id="CVE-2025-38646" title="CVE-2025-38646" />
			<reference href="https://bdu.fstec.ru/vul/2025-15657" type="self" id="BDU:2025-15657" title="BDU:2025-15657" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260324-80-0050</id>
		<issued date="2026-03-24" />
		<updated date="2026-03-24" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38648-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38648-8.0/" type="self" id="ROS-20260324-80-0050" title="ROS-20260324-80-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38648" type="cve" id="CVE-2025-38648" title="CVE-2025-38648" />
			<reference href="https://bdu.fstec.ru/vul/2025-15777" type="self" id="BDU:2025-15777" title="BDU:2025-15777" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-80-0001</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость gnupg2 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в gnupg2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gnupg2-cve-2025-30258-8.0/</description>
               <solution>Установить обновление для пакета(ов) gnupg2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gnupg2-cve-2025-30258-8.0/" type="self" id="ROS-20260327-80-0001" title="ROS-20260327-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30258" type="cve" id="CVE-2025-30258" title="CVE-2025-30258" />
			<reference href="https://bdu.fstec.ru/vul/2025-11080" type="self" id="BDU:2025-11080" title="BDU:2025-11080" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gnupg2" epoch="0" version="2.5.18" release="1.red80" arch="x86_64" src="gnupg2-2.5.18-1.red80.src.rpm">
					<filename>gnupg2-0:2.5.18-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gnupg2-smime" epoch="0" version="2.5.18" release="1.red80" arch="x86_64" src="gnupg2-2.5.18-1.red80.src.rpm">
					<filename>gnupg2-smime-0:2.5.18-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gnupg2" epoch="0" version="2.5.18" release="1.red80" arch="aarch64" src="gnupg2-2.5.18-1.red80.src.rpm">
					<filename>gnupg2-0:2.5.18-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gnupg2-smime" epoch="0" version="2.5.18" release="1.red80" arch="aarch64" src="gnupg2-2.5.18-1.red80.src.rpm">
					<filename>gnupg2-smime-0:2.5.18-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-80-0002</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость busybox </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в busybox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-busybox-cve-2025-46394-8.0/</description>
               <solution>Установить обновление для пакета(ов) busybox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-busybox-cve-2025-46394-8.0/" type="self" id="ROS-20260327-80-0002" title="ROS-20260327-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46394" type="cve" id="CVE-2025-46394" title="CVE-2025-46394" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="busybox" epoch="1" version="1.37.0" release="2.red80" arch="x86_64" src="busybox-1.37.0-2.red80.src.rpm">
					<filename>busybox-1:1.37.0-2.red80.x86_64.rpm</filename>
				</package>
				<package name="busybox-petitboot" epoch="1" version="1.37.0" release="2.red80" arch="x86_64" src="busybox-1.37.0-2.red80.src.rpm">
					<filename>busybox-petitboot-1:1.37.0-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="busybox" epoch="1" version="1.37.0" release="2.red80" arch="aarch64" src="busybox-1.37.0-2.red80.src.rpm">
					<filename>busybox-1:1.37.0-2.red80.aarch64.rpm</filename>
				</package>
				<package name="busybox-petitboot" epoch="1" version="1.37.0" release="2.red80" arch="aarch64" src="busybox-1.37.0-2.red80.src.rpm">
					<filename>busybox-petitboot-1:1.37.0-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-80-0003</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость nodejs22 </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в nodejs22</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nodejs22-cve-2025-5889-8.0/</description>
               <solution>Установить обновление для пакета(ов) nodejs22
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nodejs22-cve-2025-5889-8.0/" type="self" id="ROS-20260327-80-0003" title="ROS-20260327-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5889" type="cve" id="CVE-2025-5889" title="CVE-2025-5889" />
			<reference href="https://bdu.fstec.ru/vul/2026-01715" type="self" id="BDU:2026-01715" title="BDU:2026-01715" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="nodejs" epoch="1" version="22.19.0" release="1.red80" arch="x86_64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-1:22.19.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nodejs-devel" epoch="1" version="22.19.0" release="1.red80" arch="x86_64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-devel-1:22.19.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nodejs-full-i18n" epoch="1" version="22.19.0" release="1.red80" arch="x86_64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-full-i18n-1:22.19.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nodejs-libs" epoch="1" version="22.19.0" release="1.red80" arch="x86_64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-libs-1:22.19.0-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nodejs-npm" epoch="1" version="10.9.3" release="1.22.19.0.1.red80" arch="x86_64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-npm-1:10.9.3-1.22.19.0.1.red80.x86_64.rpm</filename>
				</package>
				<package name="v8-12.4-devel" epoch="3" version="12.4.254.21" release="1.22.19.0.1.red80" arch="x86_64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>v8-12.4-devel-3:12.4.254.21-1.22.19.0.1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="nodejs" epoch="1" version="22.19.0" release="1.red80" arch="aarch64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-1:22.19.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nodejs-devel" epoch="1" version="22.19.0" release="1.red80" arch="aarch64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-devel-1:22.19.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nodejs-full-i18n" epoch="1" version="22.19.0" release="1.red80" arch="aarch64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-full-i18n-1:22.19.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nodejs-libs" epoch="1" version="22.19.0" release="1.red80" arch="aarch64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-libs-1:22.19.0-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nodejs-npm" epoch="1" version="10.9.3" release="1.22.19.0.1.red80" arch="aarch64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-npm-1:10.9.3-1.22.19.0.1.red80.aarch64.rpm</filename>
				</package>
				<package name="v8-12.4-devel" epoch="3" version="12.4.254.21" release="1.22.19.0.1.red80" arch="aarch64" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>v8-12.4-devel-3:12.4.254.21-1.22.19.0.1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="nodejs-docs" epoch="1" version="22.19.0" release="1.red80" arch="noarch" src="nodejs22-22.19.0-1.red80.src.rpm">
					<filename>nodejs-docs-1:22.19.0-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-80-0004</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость gnupg2 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в gnupg2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gnupg2-cve-2025-68972-8.0/</description>
               <solution>Установить обновление для пакета(ов) gnupg2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gnupg2-cve-2025-68972-8.0/" type="self" id="ROS-20260327-80-0004" title="ROS-20260327-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68972" type="cve" id="CVE-2025-68972" title="CVE-2025-68972" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gnupg2" epoch="0" version="2.5.18" release="1.red80" arch="x86_64" src="gnupg2-2.5.18-1.red80.src.rpm">
					<filename>gnupg2-0:2.5.18-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gnupg2-smime" epoch="0" version="2.5.18" release="1.red80" arch="x86_64" src="gnupg2-2.5.18-1.red80.src.rpm">
					<filename>gnupg2-smime-0:2.5.18-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gnupg2" epoch="0" version="2.5.18" release="1.red80" arch="aarch64" src="gnupg2-2.5.18-1.red80.src.rpm">
					<filename>gnupg2-0:2.5.18-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gnupg2-smime" epoch="0" version="2.5.18" release="1.red80" arch="aarch64" src="gnupg2-2.5.18-1.red80.src.rpm">
					<filename>gnupg2-smime-0:2.5.18-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-80-0005</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость gnupg2 </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в gnupg2</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gnupg2-cve-2025-68973-8.0/</description>
               <solution>Установить обновление для пакета(ов) gnupg2
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-gnupg2-cve-2025-68973-8.0/" type="self" id="ROS-20260327-80-0005" title="ROS-20260327-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68973" type="cve" id="CVE-2025-68973" title="CVE-2025-68973" />
			<reference href="https://bdu.fstec.ru/vul/2025-16426" type="self" id="BDU:2025-16426" title="BDU:2025-16426" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="gnupg2" epoch="0" version="2.5.18" release="1.red80" arch="x86_64" src="gnupg2-2.5.18-1.red80.src.rpm">
					<filename>gnupg2-0:2.5.18-1.red80.x86_64.rpm</filename>
				</package>
				<package name="gnupg2-smime" epoch="0" version="2.5.18" release="1.red80" arch="x86_64" src="gnupg2-2.5.18-1.red80.src.rpm">
					<filename>gnupg2-smime-0:2.5.18-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="gnupg2" epoch="0" version="2.5.18" release="1.red80" arch="aarch64" src="gnupg2-2.5.18-1.red80.src.rpm">
					<filename>gnupg2-0:2.5.18-1.red80.aarch64.rpm</filename>
				</package>
				<package name="gnupg2-smime" epoch="0" version="2.5.18" release="1.red80" arch="aarch64" src="gnupg2-2.5.18-1.red80.src.rpm">
					<filename>gnupg2-smime-0:2.5.18-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-80-0006</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость portainer-ce </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в portainer-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-portainer-ce-cve-2025-61726-8.0/</description>
               <solution>Установить обновление для пакета(ов) portainer-ce
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-portainer-ce-cve-2025-61726-8.0/" type="self" id="ROS-20260327-80-0006" title="ROS-20260327-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61726" type="cve" id="CVE-2025-61726" title="CVE-2025-61726" />
			<reference href="https://bdu.fstec.ru/vul/2026-03409" type="self" id="BDU:2026-03409" title="BDU:2026-03409" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="portainer-ce" epoch="0" version="2.33.7" release="1.red80" arch="x86_64" src="portainer-ce-2.33.7-1.red80.src.rpm">
					<filename>portainer-ce-0:2.33.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="portainer-ce-agent" epoch="0" version="2.33.7" release="1.red80" arch="x86_64" src="portainer-ce-2.33.7-1.red80.src.rpm">
					<filename>portainer-ce-agent-0:2.33.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="portainer-ce" epoch="0" version="2.33.7" release="1.red80" arch="aarch64" src="portainer-ce-2.33.7-1.red80.src.rpm">
					<filename>portainer-ce-0:2.33.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="portainer-ce-agent" epoch="0" version="2.33.7" release="1.red80" arch="aarch64" src="portainer-ce-2.33.7-1.red80.src.rpm">
					<filename>portainer-ce-agent-0:2.33.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-80-0007</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость portainer-ce </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в portainer-ce</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-portainer-ce-cve-2025-68121-8.0/</description>
               <solution>Установить обновление для пакета(ов) portainer-ce
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-portainer-ce-cve-2025-68121-8.0/" type="self" id="ROS-20260327-80-0007" title="ROS-20260327-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68121" type="cve" id="CVE-2025-68121" title="CVE-2025-68121" />
			<reference href="https://bdu.fstec.ru/vul/2026-03408" type="self" id="BDU:2026-03408" title="BDU:2026-03408" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="portainer-ce" epoch="0" version="2.33.7" release="1.red80" arch="x86_64" src="portainer-ce-2.33.7-1.red80.src.rpm">
					<filename>portainer-ce-0:2.33.7-1.red80.x86_64.rpm</filename>
				</package>
				<package name="portainer-ce-agent" epoch="0" version="2.33.7" release="1.red80" arch="x86_64" src="portainer-ce-2.33.7-1.red80.src.rpm">
					<filename>portainer-ce-agent-0:2.33.7-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="portainer-ce" epoch="0" version="2.33.7" release="1.red80" arch="aarch64" src="portainer-ce-2.33.7-1.red80.src.rpm">
					<filename>portainer-ce-0:2.33.7-1.red80.aarch64.rpm</filename>
				</package>
				<package name="portainer-ce-agent" epoch="0" version="2.33.7" release="1.red80" arch="aarch64" src="portainer-ce-2.33.7-1.red80.src.rpm">
					<filename>portainer-ce-agent-0:2.33.7-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-80-0008</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость python-pillow </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python-pillow</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-pillow-cve-2026-25990-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-pillow
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-pillow-cve-2026-25990-8.0/" type="self" id="ROS-20260327-80-0008" title="ROS-20260327-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25990" type="cve" id="CVE-2026-25990" title="CVE-2026-25990" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="python3-pillow" epoch="0" version="12.1.1" release="1.red80" arch="x86_64" src="python-pillow-12.1.1-1.red80.src.rpm">
					<filename>python3-pillow-0:12.1.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-pillow-devel" epoch="0" version="12.1.1" release="1.red80" arch="x86_64" src="python-pillow-12.1.1-1.red80.src.rpm">
					<filename>python3-pillow-devel-0:12.1.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-pillow-qt" epoch="0" version="12.1.1" release="1.red80" arch="x86_64" src="python-pillow-12.1.1-1.red80.src.rpm">
					<filename>python3-pillow-qt-0:12.1.1-1.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-pillow-tk" epoch="0" version="12.1.1" release="1.red80" arch="x86_64" src="python-pillow-12.1.1-1.red80.src.rpm">
					<filename>python3-pillow-tk-0:12.1.1-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="python3-pillow" epoch="0" version="12.1.1" release="1.red80" arch="aarch64" src="python-pillow-12.1.1-1.red80.src.rpm">
					<filename>python3-pillow-0:12.1.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-pillow-devel" epoch="0" version="12.1.1" release="1.red80" arch="aarch64" src="python-pillow-12.1.1-1.red80.src.rpm">
					<filename>python3-pillow-devel-0:12.1.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-pillow-qt" epoch="0" version="12.1.1" release="1.red80" arch="aarch64" src="python-pillow-12.1.1-1.red80.src.rpm">
					<filename>python3-pillow-qt-0:12.1.1-1.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-pillow-tk" epoch="0" version="12.1.1" release="1.red80" arch="aarch64" src="python-pillow-12.1.1-1.red80.src.rpm">
					<filename>python3-pillow-tk-0:12.1.1-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-80-0009</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость openbabel </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в openbabel</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openbabel-cve-2026-2705-8.0/</description>
               <solution>Установить обновление для пакета(ов) openbabel
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-openbabel-cve-2026-2705-8.0/" type="self" id="ROS-20260327-80-0009" title="ROS-20260327-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2705" type="cve" id="CVE-2026-2705" title="CVE-2026-2705" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="openbabel" epoch="0" version="3.1.1" release="13.red80" arch="x86_64" src="openbabel-3.1.1-13.red80.src.rpm">
					<filename>openbabel-0:3.1.1-13.red80.x86_64.rpm</filename>
				</package>
				<package name="openbabel-devel" epoch="0" version="3.1.1" release="13.red80" arch="x86_64" src="openbabel-3.1.1-13.red80.src.rpm">
					<filename>openbabel-devel-0:3.1.1-13.red80.x86_64.rpm</filename>
				</package>
				<package name="openbabel-gui" epoch="0" version="3.1.1" release="13.red80" arch="x86_64" src="openbabel-3.1.1-13.red80.src.rpm">
					<filename>openbabel-gui-0:3.1.1-13.red80.x86_64.rpm</filename>
				</package>
				<package name="openbabel-libs" epoch="0" version="3.1.1" release="13.red80" arch="x86_64" src="openbabel-3.1.1-13.red80.src.rpm">
					<filename>openbabel-libs-0:3.1.1-13.red80.x86_64.rpm</filename>
				</package>
				<package name="perl-openbabel" epoch="0" version="3.1.1" release="13.red80" arch="x86_64" src="openbabel-3.1.1-13.red80.src.rpm">
					<filename>perl-openbabel-0:3.1.1-13.red80.x86_64.rpm</filename>
				</package>
				<package name="python3-openbabel" epoch="0" version="3.1.1" release="13.red80" arch="x86_64" src="openbabel-3.1.1-13.red80.src.rpm">
					<filename>python3-openbabel-0:3.1.1-13.red80.x86_64.rpm</filename>
				</package>
				<package name="ruby-openbabel" epoch="0" version="3.1.1" release="13.red80" arch="x86_64" src="openbabel-3.1.1-13.red80.src.rpm">
					<filename>ruby-openbabel-0:3.1.1-13.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="openbabel" epoch="0" version="3.1.1" release="13.red80" arch="aarch64" src="openbabel-3.1.1-13.red80.src.rpm">
					<filename>openbabel-0:3.1.1-13.red80.aarch64.rpm</filename>
				</package>
				<package name="openbabel-devel" epoch="0" version="3.1.1" release="13.red80" arch="aarch64" src="openbabel-3.1.1-13.red80.src.rpm">
					<filename>openbabel-devel-0:3.1.1-13.red80.aarch64.rpm</filename>
				</package>
				<package name="openbabel-gui" epoch="0" version="3.1.1" release="13.red80" arch="aarch64" src="openbabel-3.1.1-13.red80.src.rpm">
					<filename>openbabel-gui-0:3.1.1-13.red80.aarch64.rpm</filename>
				</package>
				<package name="openbabel-libs" epoch="0" version="3.1.1" release="13.red80" arch="aarch64" src="openbabel-3.1.1-13.red80.src.rpm">
					<filename>openbabel-libs-0:3.1.1-13.red80.aarch64.rpm</filename>
				</package>
				<package name="perl-openbabel" epoch="0" version="3.1.1" release="13.red80" arch="aarch64" src="openbabel-3.1.1-13.red80.src.rpm">
					<filename>perl-openbabel-0:3.1.1-13.red80.aarch64.rpm</filename>
				</package>
				<package name="python3-openbabel" epoch="0" version="3.1.1" release="13.red80" arch="aarch64" src="openbabel-3.1.1-13.red80.src.rpm">
					<filename>python3-openbabel-0:3.1.1-13.red80.aarch64.rpm</filename>
				</package>
				<package name="ruby-openbabel" epoch="0" version="3.1.1" release="13.red80" arch="aarch64" src="openbabel-3.1.1-13.red80.src.rpm">
					<filename>ruby-openbabel-0:3.1.1-13.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="openbabel-doc" epoch="0" version="3.1.1" release="13.red80" arch="noarch" src="openbabel-3.1.1-13.red80.src.rpm">
					<filename>openbabel-doc-0:3.1.1-13.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-80-0010</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость python-rencode </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-rencode</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-rencode-cve-2021-40839-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-rencode
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-rencode-cve-2021-40839-8.0/" type="self" id="ROS-20260327-80-0010" title="ROS-20260327-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40839" type="cve" id="CVE-2021-40839" title="CVE-2021-40839" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="python3-rencode" epoch="0" version="1.0.8" release="1.red80" arch="x86_64" src="python-rencode-1.0.8-1.red80.src.rpm">
					<filename>python3-rencode-0:1.0.8-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="python3-rencode" epoch="0" version="1.0.8" release="1.red80" arch="aarch64" src="python-rencode-1.0.8-1.red80.src.rpm">
					<filename>python3-rencode-0:1.0.8-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-80-0011</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость NetworkManager </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в NetworkManager</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-networkmanager-cve-2025-9615-8.0/</description>
               <solution>Установить обновление для пакета(ов) NetworkManager
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-networkmanager-cve-2025-9615-8.0/" type="self" id="ROS-20260327-80-0011" title="ROS-20260327-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9615" type="cve" id="CVE-2025-9615" title="CVE-2025-9615" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="NetworkManager" epoch="1" version="1.52.2" release="1.red80" arch="x86_64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-1:1.52.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-adsl" epoch="1" version="1.52.2" release="1.red80" arch="x86_64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-adsl-1:1.52.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-bluetooth" epoch="1" version="1.52.2" release="1.red80" arch="x86_64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-bluetooth-1:1.52.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-cloud-setup" epoch="1" version="1.52.2" release="1.red80" arch="x86_64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-cloud-setup-1:1.52.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-libnm" epoch="1" version="1.52.2" release="1.red80" arch="x86_64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-libnm-1:1.52.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-libnm-devel" epoch="1" version="1.52.2" release="1.red80" arch="x86_64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-libnm-devel-1:1.52.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-ovs" epoch="1" version="1.52.2" release="1.red80" arch="x86_64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-ovs-1:1.52.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-ppp" epoch="1" version="1.52.2" release="1.red80" arch="x86_64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-ppp-1:1.52.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-team" epoch="1" version="1.52.2" release="1.red80" arch="x86_64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-team-1:1.52.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-tui" epoch="1" version="1.52.2" release="1.red80" arch="x86_64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-tui-1:1.52.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-wifi" epoch="1" version="1.52.2" release="1.red80" arch="x86_64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-wifi-1:1.52.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="NetworkManager-wwan" epoch="1" version="1.52.2" release="1.red80" arch="x86_64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-wwan-1:1.52.2-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="NetworkManager" epoch="1" version="1.52.2" release="1.red80" arch="aarch64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-1:1.52.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="NetworkManager-adsl" epoch="1" version="1.52.2" release="1.red80" arch="aarch64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-adsl-1:1.52.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="NetworkManager-bluetooth" epoch="1" version="1.52.2" release="1.red80" arch="aarch64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-bluetooth-1:1.52.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="NetworkManager-cloud-setup" epoch="1" version="1.52.2" release="1.red80" arch="aarch64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-cloud-setup-1:1.52.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="NetworkManager-libnm" epoch="1" version="1.52.2" release="1.red80" arch="aarch64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-libnm-1:1.52.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="NetworkManager-libnm-devel" epoch="1" version="1.52.2" release="1.red80" arch="aarch64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-libnm-devel-1:1.52.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="NetworkManager-ovs" epoch="1" version="1.52.2" release="1.red80" arch="aarch64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-ovs-1:1.52.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="NetworkManager-ppp" epoch="1" version="1.52.2" release="1.red80" arch="aarch64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-ppp-1:1.52.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="NetworkManager-team" epoch="1" version="1.52.2" release="1.red80" arch="aarch64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-team-1:1.52.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="NetworkManager-tui" epoch="1" version="1.52.2" release="1.red80" arch="aarch64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-tui-1:1.52.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="NetworkManager-wifi" epoch="1" version="1.52.2" release="1.red80" arch="aarch64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-wifi-1:1.52.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="NetworkManager-wwan" epoch="1" version="1.52.2" release="1.red80" arch="aarch64" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-wwan-1:1.52.2-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="NetworkManager-config-server" epoch="1" version="1.52.2" release="1.red80" arch="noarch" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-config-server-1:1.52.2-1.red80.noarch.rpm</filename>
				</package>
				<package name="NetworkManager-dispatcher-routing-rules" epoch="1" version="1.52.2" release="1.red80" arch="noarch" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-dispatcher-routing-rules-1:1.52.2-1.red80.noarch.rpm</filename>
				</package>
				<package name="NetworkManager-initscripts-updown" epoch="1" version="1.52.2" release="1.red80" arch="noarch" src="NetworkManager-1.52.2-1.red80.src.rpm">
					<filename>NetworkManager-initscripts-updown-1:1.52.2-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-80-0012</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость go-git </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в go-git</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-go-git-cve-2026-25934-8.0/</description>
               <solution>Установить обновление для пакета(ов) go-git
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-go-git-cve-2026-25934-8.0/" type="self" id="ROS-20260327-80-0012" title="ROS-20260327-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25934" type="cve" id="CVE-2026-25934" title="CVE-2026-25934" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="go-git" epoch="0" version="5.16.5" release="1.red80" arch="x86_64" src="go-git-5.16.5-1.red80.src.rpm">
					<filename>go-git-0:5.16.5-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="go-git" epoch="0" version="5.16.5" release="1.red80" arch="aarch64" src="go-git-5.16.5-1.red80.src.rpm">
					<filename>go-git-0:5.16.5-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="golang-gopkg-src-d-git-5-devel" epoch="0" version="5.16.5" release="1.red80" arch="noarch" src="go-git-5.16.5-1.red80.src.rpm">
					<filename>golang-gopkg-src-d-git-5-devel-0:5.16.5-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-80-0013</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость opentelemetry-collector-contrib </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в opentelemetry-collector-contrib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-opentelemetry-collector-contrib-cve-2025-68156-8.0/</description>
               <solution>Установить обновление для пакета(ов) opentelemetry-collector-contrib
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-opentelemetry-collector-contrib-cve-2025-68156-8.0/" type="self" id="ROS-20260327-80-0013" title="ROS-20260327-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68156" type="cve" id="CVE-2025-68156" title="CVE-2025-68156" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="opentelemetry-collector-contrib" epoch="0" version="0.146.0" release="1.red80" arch="x86_64" src="opentelemetry-collector-contrib-0.146.0-1.red80.src.rpm">
					<filename>opentelemetry-collector-contrib-0:0.146.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="opentelemetry-collector-contrib" epoch="0" version="0.146.0" release="1.red80" arch="aarch64" src="opentelemetry-collector-contrib-0.146.0-1.red80.src.rpm">
					<filename>opentelemetry-collector-contrib-0:0.146.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-80-0014</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость opentelemetry-collector-contrib </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в opentelemetry-collector-contrib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-opentelemetry-collector-contrib-cve-2026-26958-8.0/</description>
               <solution>Установить обновление для пакета(ов) opentelemetry-collector-contrib
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-opentelemetry-collector-contrib-cve-2026-26958-8.0/" type="self" id="ROS-20260327-80-0014" title="ROS-20260327-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26958" type="cve" id="CVE-2026-26958" title="CVE-2026-26958" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="opentelemetry-collector-contrib" epoch="0" version="0.146.0" release="1.red80" arch="x86_64" src="opentelemetry-collector-contrib-0.146.0-1.red80.src.rpm">
					<filename>opentelemetry-collector-contrib-0:0.146.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="opentelemetry-collector-contrib" epoch="0" version="0.146.0" release="1.red80" arch="aarch64" src="opentelemetry-collector-contrib-0.146.0-1.red80.src.rpm">
					<filename>opentelemetry-collector-contrib-0:0.146.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-80-0015</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2026-27142-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2026-27142-8.0/" type="self" id="ROS-20260327-80-0015" title="ROS-20260327-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27142" type="cve" id="CVE-2026-27142" title="CVE-2026-27142" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="golang" epoch="0" version="1.25.8" release="1.red80" arch="x86_64" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-0:1.25.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.8" release="1.red80" arch="x86_64" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.8" release="1.red80" arch="x86_64" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.8-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="golang" epoch="0" version="1.25.8" release="1.red80" arch="aarch64" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-0:1.25.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.8" release="1.red80" arch="aarch64" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.8" release="1.red80" arch="aarch64" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.8-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="golang-docs" epoch="0" version="1.25.8" release="1.red80" arch="noarch" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-docs-0:1.25.8-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.8" release="1.red80" arch="noarch" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-misc-0:1.25.8-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.8" release="1.red80" arch="noarch" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-src-0:1.25.8-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.8" release="1.red80" arch="noarch" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-tests-0:1.25.8-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-80-0016</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2026-25679-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2026-25679-8.0/" type="self" id="ROS-20260327-80-0016" title="ROS-20260327-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25679" type="cve" id="CVE-2026-25679" title="CVE-2026-25679" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="golang" epoch="0" version="1.25.8" release="1.red80" arch="x86_64" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-0:1.25.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.8" release="1.red80" arch="x86_64" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.8" release="1.red80" arch="x86_64" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.8-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="golang" epoch="0" version="1.25.8" release="1.red80" arch="aarch64" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-0:1.25.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.8" release="1.red80" arch="aarch64" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.8" release="1.red80" arch="aarch64" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.8-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="golang-docs" epoch="0" version="1.25.8" release="1.red80" arch="noarch" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-docs-0:1.25.8-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.8" release="1.red80" arch="noarch" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-misc-0:1.25.8-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.8" release="1.red80" arch="noarch" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-src-0:1.25.8-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.8" release="1.red80" arch="noarch" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-tests-0:1.25.8-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260327-80-0017</id>
		<issued date="2026-03-27" />
		<updated date="2026-03-27" />
		<title>Уязвимость golang </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в golang</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2026-27139-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-cve-2026-27139-8.0/" type="self" id="ROS-20260327-80-0017" title="ROS-20260327-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27139" type="cve" id="CVE-2026-27139" title="CVE-2026-27139" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="golang" epoch="0" version="1.25.8" release="1.red80" arch="x86_64" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-0:1.25.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.8" release="1.red80" arch="x86_64" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.8-1.red80.x86_64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.8" release="1.red80" arch="x86_64" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.8-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="golang" epoch="0" version="1.25.8" release="1.red80" arch="aarch64" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-0:1.25.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-bin" epoch="0" version="1.25.8" release="1.red80" arch="aarch64" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-bin-0:1.25.8-1.red80.aarch64.rpm</filename>
				</package>
				<package name="golang-shared" epoch="0" version="1.25.8" release="1.red80" arch="aarch64" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-shared-0:1.25.8-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="golang-docs" epoch="0" version="1.25.8" release="1.red80" arch="noarch" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-docs-0:1.25.8-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-misc" epoch="0" version="1.25.8" release="1.red80" arch="noarch" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-misc-0:1.25.8-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-src" epoch="0" version="1.25.8" release="1.red80" arch="noarch" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-src-0:1.25.8-1.red80.noarch.rpm</filename>
				</package>
				<package name="golang-tests" epoch="0" version="1.25.8" release="1.red80" arch="noarch" src="golang-1.25.8-1.red80.src.rpm">
					<filename>golang-tests-0:1.25.8-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260330-80-0001</id>
		<issued date="2026-03-30" />
		<updated date="2026-03-30" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38694-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38694-8.0/" type="self" id="ROS-20260330-80-0001" title="ROS-20260330-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38694" type="cve" id="CVE-2025-38694" title="CVE-2025-38694" />
			<reference href="https://bdu.fstec.ru/vul/2025-15760" type="self" id="BDU:2025-15760" title="BDU:2025-15760" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260331-80-0001</id>
		<issued date="2026-03-31" />
		<updated date="2026-03-31" />
		<title>Уязвимость python-setuptools </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-setuptools</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-setuptools-cve-2026-24049-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-setuptools
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-setuptools-cve-2026-24049-8.0/" type="self" id="ROS-20260331-80-0001" title="ROS-20260331-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24049" type="cve" id="CVE-2026-24049" title="CVE-2026-24049" />
			<reference href="https://bdu.fstec.ru/vul/2026-03593" type="self" id="BDU:2026-03593" title="BDU:2026-03593" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python-setuptools-wheel" epoch="0" version="78.1.1" release="4.red80" arch="noarch" src="python-setuptools-78.1.1-4.red80.src.rpm">
					<filename>python-setuptools-wheel-0:78.1.1-4.red80.noarch.rpm</filename>
				</package>
				<package name="python3-setuptools" epoch="0" version="78.1.1" release="4.red80" arch="noarch" src="python-setuptools-78.1.1-4.red80.src.rpm">
					<filename>python3-setuptools-0:78.1.1-4.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0001</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость rust-protobuf </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в rust-protobuf</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-rust-protobuf-cve-2025-53605-8.0/</description>
               <solution>Установить обновление для пакета(ов) rust-protobuf
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-rust-protobuf-cve-2025-53605-8.0/" type="self" id="ROS-20260401-80-0001" title="ROS-20260401-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53605" type="cve" id="CVE-2025-53605" title="CVE-2025-53605" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="rust-protobuf+bytes-devel" epoch="0" version="3.7.2" release="1.red80" arch="noarch" src="rust-protobuf-3.7.2-1.red80.src.rpm">
					<filename>rust-protobuf+bytes-devel-0:3.7.2-1.red80.noarch.rpm</filename>
				</package>
				<package name="rust-protobuf+default-devel" epoch="0" version="3.7.2" release="1.red80" arch="noarch" src="rust-protobuf-3.7.2-1.red80.src.rpm">
					<filename>rust-protobuf+default-devel-0:3.7.2-1.red80.noarch.rpm</filename>
				</package>
				<package name="rust-protobuf+with-bytes-devel" epoch="0" version="3.7.2" release="1.red80" arch="noarch" src="rust-protobuf-3.7.2-1.red80.src.rpm">
					<filename>rust-protobuf+with-bytes-devel-0:3.7.2-1.red80.noarch.rpm</filename>
				</package>
				<package name="rust-protobuf-devel" epoch="0" version="3.7.2" release="1.red80" arch="noarch" src="rust-protobuf-3.7.2-1.red80.src.rpm">
					<filename>rust-protobuf-devel-0:3.7.2-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0002</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость roundcubemail </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-roundcubemail-cve-2025-68460-8.0/</description>
               <solution>Установить обновление для пакета(ов) roundcubemail
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-roundcubemail-cve-2025-68460-8.0/" type="self" id="ROS-20260401-80-0002" title="ROS-20260401-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68460" type="cve" id="CVE-2025-68460" title="CVE-2025-68460" />
			<reference href="https://bdu.fstec.ru/vul/2025-16316" type="self" id="BDU:2025-16316" title="BDU:2025-16316" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="roundcubemail" epoch="0" version="1.5.13" release="1.red80" arch="noarch" src="roundcubemail-1.5.13-1.red80.src.rpm">
					<filename>roundcubemail-0:1.5.13-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0003</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость roundcubemail </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в roundcubemail</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-roundcubemail-cve-2025-68461-8.0/</description>
               <solution>Установить обновление для пакета(ов) roundcubemail
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-roundcubemail-cve-2025-68461-8.0/" type="self" id="ROS-20260401-80-0003" title="ROS-20260401-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68461" type="cve" id="CVE-2025-68461" title="CVE-2025-68461" />
			<reference href="https://bdu.fstec.ru/vul/2026-03414" type="self" id="BDU:2026-03414" title="BDU:2026-03414" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="roundcubemail" epoch="0" version="1.5.13" release="1.red80" arch="noarch" src="roundcubemail-1.5.13-1.red80.src.rpm">
					<filename>roundcubemail-0:1.5.13-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0004</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2026-22801-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2026-22801-8.0/" type="self" id="ROS-20260401-80-0004" title="ROS-20260401-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22801" type="cve" id="CVE-2026-22801" title="CVE-2026-22801" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0005</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2026-22801-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2026-22801-8.0/" type="self" id="ROS-20260401-80-0005" title="ROS-20260401-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22801" type="cve" id="CVE-2026-22801" title="CVE-2026-22801" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0006</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2026-22801-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2026-22801-8.0/" type="self" id="ROS-20260401-80-0006" title="ROS-20260401-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22801" type="cve" id="CVE-2026-22801" title="CVE-2026-22801" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="x86_64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="aarch64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0007</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2025-66293-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2025-66293-8.0/" type="self" id="ROS-20260401-80-0007" title="ROS-20260401-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66293" type="cve" id="CVE-2025-66293" title="CVE-2025-66293" />
			<reference href="https://bdu.fstec.ru/vul/2025-15390" type="self" id="BDU:2025-15390" title="BDU:2025-15390" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0008</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2025-66293-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2025-66293-8.0/" type="self" id="ROS-20260401-80-0008" title="ROS-20260401-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66293" type="cve" id="CVE-2025-66293" title="CVE-2025-66293" />
			<reference href="https://bdu.fstec.ru/vul/2025-15390" type="self" id="BDU:2025-15390" title="BDU:2025-15390" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0009</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2025-66293-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2025-66293-8.0/" type="self" id="ROS-20260401-80-0009" title="ROS-20260401-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66293" type="cve" id="CVE-2025-66293" title="CVE-2025-66293" />
			<reference href="https://bdu.fstec.ru/vul/2025-15390" type="self" id="BDU:2025-15390" title="BDU:2025-15390" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="x86_64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="aarch64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0010</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2026-22695-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2026-22695-8.0/" type="self" id="ROS-20260401-80-0010" title="ROS-20260401-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22695" type="cve" id="CVE-2026-22695" title="CVE-2026-22695" />
			<reference href="https://bdu.fstec.ru/vul/2026-01048" type="self" id="BDU:2026-01048" title="BDU:2026-01048" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0011</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2026-22695-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2026-22695-8.0/" type="self" id="ROS-20260401-80-0011" title="ROS-20260401-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22695" type="cve" id="CVE-2026-22695" title="CVE-2026-22695" />
			<reference href="https://bdu.fstec.ru/vul/2026-01048" type="self" id="BDU:2026-01048" title="BDU:2026-01048" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0012</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2026-22695-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2026-22695-8.0/" type="self" id="ROS-20260401-80-0012" title="ROS-20260401-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22695" type="cve" id="CVE-2026-22695" title="CVE-2026-22695" />
			<reference href="https://bdu.fstec.ru/vul/2026-01048" type="self" id="BDU:2026-01048" title="BDU:2026-01048" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="x86_64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="aarch64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0013</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2025-65018-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2025-65018-8.0/" type="self" id="ROS-20260401-80-0013" title="ROS-20260401-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65018" type="cve" id="CVE-2025-65018" title="CVE-2025-65018" />
			<reference href="https://bdu.fstec.ru/vul/2025-14613" type="self" id="BDU:2025-14613" title="BDU:2025-14613" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0014</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2025-65018-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2025-65018-8.0/" type="self" id="ROS-20260401-80-0014" title="ROS-20260401-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65018" type="cve" id="CVE-2025-65018" title="CVE-2025-65018" />
			<reference href="https://bdu.fstec.ru/vul/2025-14613" type="self" id="BDU:2025-14613" title="BDU:2025-14613" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0015</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2025-65018-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2025-65018-8.0/" type="self" id="ROS-20260401-80-0015" title="ROS-20260401-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65018" type="cve" id="CVE-2025-65018" title="CVE-2025-65018" />
			<reference href="https://bdu.fstec.ru/vul/2025-14613" type="self" id="BDU:2025-14613" title="BDU:2025-14613" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="x86_64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="aarch64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0016</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2025-64505-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2025-64505-8.0/" type="self" id="ROS-20260401-80-0016" title="ROS-20260401-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64505" type="cve" id="CVE-2025-64505" title="CVE-2025-64505" />
			<reference href="https://bdu.fstec.ru/vul/2026-02923" type="self" id="BDU:2026-02923" title="BDU:2026-02923" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0017</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2025-64505-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2025-64505-8.0/" type="self" id="ROS-20260401-80-0017" title="ROS-20260401-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64505" type="cve" id="CVE-2025-64505" title="CVE-2025-64505" />
			<reference href="https://bdu.fstec.ru/vul/2026-02923" type="self" id="BDU:2026-02923" title="BDU:2026-02923" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0018</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2025-64505-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2025-64505-8.0/" type="self" id="ROS-20260401-80-0018" title="ROS-20260401-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64505" type="cve" id="CVE-2025-64505" title="CVE-2025-64505" />
			<reference href="https://bdu.fstec.ru/vul/2026-02923" type="self" id="BDU:2026-02923" title="BDU:2026-02923" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="x86_64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="aarch64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0019</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2025-64720-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2025-64720-8.0/" type="self" id="ROS-20260401-80-0019" title="ROS-20260401-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64720" type="cve" id="CVE-2025-64720" title="CVE-2025-64720" />
			<reference href="https://bdu.fstec.ru/vul/2026-02925" type="self" id="BDU:2026-02925" title="BDU:2026-02925" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0020</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2025-64720-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2025-64720-8.0/" type="self" id="ROS-20260401-80-0020" title="ROS-20260401-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64720" type="cve" id="CVE-2025-64720" title="CVE-2025-64720" />
			<reference href="https://bdu.fstec.ru/vul/2026-02925" type="self" id="BDU:2026-02925" title="BDU:2026-02925" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0021</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2025-64720-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2025-64720-8.0/" type="self" id="ROS-20260401-80-0021" title="ROS-20260401-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64720" type="cve" id="CVE-2025-64720" title="CVE-2025-64720" />
			<reference href="https://bdu.fstec.ru/vul/2026-02925" type="self" id="BDU:2026-02925" title="BDU:2026-02925" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="x86_64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="aarch64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0022</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2025-64506-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2025-64506-8.0/" type="self" id="ROS-20260401-80-0022" title="ROS-20260401-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64506" type="cve" id="CVE-2025-64506" title="CVE-2025-64506" />
			<reference href="https://bdu.fstec.ru/vul/2026-02924" type="self" id="BDU:2026-02924" title="BDU:2026-02924" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0023</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2025-64506-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2025-64506-8.0/" type="self" id="ROS-20260401-80-0023" title="ROS-20260401-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64506" type="cve" id="CVE-2025-64506" title="CVE-2025-64506" />
			<reference href="https://bdu.fstec.ru/vul/2026-02924" type="self" id="BDU:2026-02924" title="BDU:2026-02924" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0024</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2025-64506-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2025-64506-8.0/" type="self" id="ROS-20260401-80-0024" title="ROS-20260401-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64506" type="cve" id="CVE-2025-64506" title="CVE-2025-64506" />
			<reference href="https://bdu.fstec.ru/vul/2026-02924" type="self" id="BDU:2026-02924" title="BDU:2026-02924" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="x86_64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="aarch64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0025</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2026-25646-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2026-25646-8.0/" type="self" id="ROS-20260401-80-0025" title="ROS-20260401-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25646" type="cve" id="CVE-2026-25646" title="CVE-2026-25646" />
			<reference href="https://bdu.fstec.ru/vul/2026-01774" type="self" id="BDU:2026-01774" title="BDU:2026-01774" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0026</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2026-25646-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2026-25646-8.0/" type="self" id="ROS-20260401-80-0026" title="ROS-20260401-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25646" type="cve" id="CVE-2026-25646" title="CVE-2026-25646" />
			<reference href="https://bdu.fstec.ru/vul/2026-01774" type="self" id="BDU:2026-01774" title="BDU:2026-01774" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0027</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2026-25646-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2026-25646-8.0/" type="self" id="ROS-20260401-80-0027" title="ROS-20260401-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25646" type="cve" id="CVE-2026-25646" title="CVE-2026-25646" />
			<reference href="https://bdu.fstec.ru/vul/2026-01774" type="self" id="BDU:2026-01774" title="BDU:2026-01774" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="x86_64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="aarch64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0028</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2025-28164-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2025-28164-8.0/" type="self" id="ROS-20260401-80-0028" title="ROS-20260401-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-28164" type="cve" id="CVE-2025-28164" title="CVE-2025-28164" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0029</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2025-28164-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2025-28164-8.0/" type="self" id="ROS-20260401-80-0029" title="ROS-20260401-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-28164" type="cve" id="CVE-2025-28164" title="CVE-2025-28164" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0030</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2025-28164-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2025-28164-8.0/" type="self" id="ROS-20260401-80-0030" title="ROS-20260401-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-28164" type="cve" id="CVE-2025-28164" title="CVE-2025-28164" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="x86_64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="aarch64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0031</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2025-28162-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng-cve-2025-28162-8.0/" type="self" id="ROS-20260401-80-0031" title="ROS-20260401-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-28162" type="cve" id="CVE-2025-28162" title="CVE-2025-28162" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="x86_64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-devel" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-devel-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-static" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-static-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng-tools" epoch="2" version="1.6.44" release="4.red80" arch="aarch64" src="libpng-1.6.44-4.red80.src.rpm">
					<filename>libpng-tools-2:1.6.44-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0032</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng12 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng12</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2025-28162-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng12
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng12-cve-2025-28162-8.0/" type="self" id="ROS-20260401-80-0032" title="ROS-20260401-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-28162" type="cve" id="CVE-2025-28162" title="CVE-2025-28162" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="x86_64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng12" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
				<package name="libpng12-devel" epoch="0" version="1.2.57" release="18.red80" arch="aarch64" src="libpng12-1.2.57-18.red80.src.rpm">
					<filename>libpng12-devel-0:1.2.57-18.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0033</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость libpng15 </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libpng15</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2025-28162-8.0/</description>
               <solution>Установить обновление для пакета(ов) libpng15
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libpng15-cve-2025-28162-8.0/" type="self" id="ROS-20260401-80-0033" title="ROS-20260401-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-28162" type="cve" id="CVE-2025-28162" title="CVE-2025-28162" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="x86_64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libpng15" epoch="0" version="1.5.30" release="15.red80" arch="aarch64" src="libpng15-1.5.30-15.red80.src.rpm">
					<filename>libpng15-0:1.5.30-15.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0034</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость vlc </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в vlc</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-vlc-cve-2025-51602-8.0/</description>
               <solution>Установить обновление для пакета(ов) vlc
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-vlc-cve-2025-51602-8.0/" type="self" id="ROS-20260401-80-0034" title="ROS-20260401-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-51602" type="cve" id="CVE-2025-51602" title="CVE-2025-51602" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="vlc" epoch="2" version="3.0.22" release="1.red80" arch="x86_64" src="vlc-3.0.22-1.red80.src.rpm">
					<filename>vlc-2:3.0.22-1.red80.x86_64.rpm</filename>
				</package>
				<package name="vlc-core" epoch="2" version="3.0.22" release="1.red80" arch="x86_64" src="vlc-3.0.22-1.red80.src.rpm">
					<filename>vlc-core-2:3.0.22-1.red80.x86_64.rpm</filename>
				</package>
				<package name="vlc-devel" epoch="2" version="3.0.22" release="1.red80" arch="x86_64" src="vlc-3.0.22-1.red80.src.rpm">
					<filename>vlc-devel-2:3.0.22-1.red80.x86_64.rpm</filename>
				</package>
				<package name="vlc-extras" epoch="2" version="3.0.22" release="1.red80" arch="x86_64" src="vlc-3.0.22-1.red80.src.rpm">
					<filename>vlc-extras-2:3.0.22-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="vlc" epoch="2" version="3.0.22" release="1.red80" arch="aarch64" src="vlc-3.0.22-1.red80.src.rpm">
					<filename>vlc-2:3.0.22-1.red80.aarch64.rpm</filename>
				</package>
				<package name="vlc-core" epoch="2" version="3.0.22" release="1.red80" arch="aarch64" src="vlc-3.0.22-1.red80.src.rpm">
					<filename>vlc-core-2:3.0.22-1.red80.aarch64.rpm</filename>
				</package>
				<package name="vlc-devel" epoch="2" version="3.0.22" release="1.red80" arch="aarch64" src="vlc-3.0.22-1.red80.src.rpm">
					<filename>vlc-devel-2:3.0.22-1.red80.aarch64.rpm</filename>
				</package>
				<package name="vlc-extras" epoch="2" version="3.0.22" release="1.red80" arch="aarch64" src="vlc-3.0.22-1.red80.src.rpm">
					<filename>vlc-extras-2:3.0.22-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0035</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость cacti </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cacti</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-cacti-cve-2024-31459-8.0/</description>
               <solution>Установить обновление для пакета(ов) cacti
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-cacti-cve-2024-31459-8.0/" type="self" id="ROS-20260401-80-0035" title="ROS-20260401-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31459" type="cve" id="CVE-2024-31459" title="CVE-2024-31459" />
			<reference href="https://bdu.fstec.ru/vul/2024-04119" type="self" id="BDU:2024-04119" title="BDU:2024-04119" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="cacti" epoch="0" version="1.2.30" release="1.red80" arch="noarch" src="cacti-1.2.30-1.red80.src.rpm">
					<filename>cacti-0:1.2.30-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0036</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость cacti </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cacti</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-cacti-cve-2025-66399-8.0/</description>
               <solution>Установить обновление для пакета(ов) cacti
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-cacti-cve-2025-66399-8.0/" type="self" id="ROS-20260401-80-0036" title="ROS-20260401-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66399" type="cve" id="CVE-2025-66399" title="CVE-2025-66399" />
			<reference href="https://bdu.fstec.ru/vul/2025-15397" type="self" id="BDU:2025-15397" title="BDU:2025-15397" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="cacti" epoch="0" version="1.2.30" release="1.red80" arch="noarch" src="cacti-1.2.30-1.red80.src.rpm">
					<filename>cacti-0:1.2.30-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0037</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость webmin </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в webmin</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-webmin-cve-2025-67738-8.0/</description>
               <solution>Установить обновление для пакета(ов) webmin
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-webmin-cve-2025-67738-8.0/" type="self" id="ROS-20260401-80-0037" title="ROS-20260401-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67738" type="cve" id="CVE-2025-67738" title="CVE-2025-67738" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="webmin" epoch="0" version="2.621" release="1.red80" arch="noarch" src="webmin-2.621-1.red80.src.rpm">
					<filename>webmin-0:2.621-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0038</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость mongo-c-driver </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в mongo-c-driver</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongo-c-driver-cve-2025-14911-8.0/</description>
               <solution>Установить обновление для пакета(ов) mongo-c-driver
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mongo-c-driver-cve-2025-14911-8.0/" type="self" id="ROS-20260401-80-0038" title="ROS-20260401-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14911" type="cve" id="CVE-2025-14911" title="CVE-2025-14911" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libbson" epoch="0" version="2.2.2" release="2.red80" arch="x86_64" src="mongo-c-driver-2.2.2-2.red80.src.rpm">
					<filename>libbson-0:2.2.2-2.red80.x86_64.rpm</filename>
				</package>
				<package name="libbson-devel" epoch="0" version="2.2.2" release="2.red80" arch="x86_64" src="mongo-c-driver-2.2.2-2.red80.src.rpm">
					<filename>libbson-devel-0:2.2.2-2.red80.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver" epoch="0" version="2.2.2" release="2.red80" arch="x86_64" src="mongo-c-driver-2.2.2-2.red80.src.rpm">
					<filename>mongo-c-driver-0:2.2.2-2.red80.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver-devel" epoch="0" version="2.2.2" release="2.red80" arch="x86_64" src="mongo-c-driver-2.2.2-2.red80.src.rpm">
					<filename>mongo-c-driver-devel-0:2.2.2-2.red80.x86_64.rpm</filename>
				</package>
				<package name="mongo-c-driver-libs" epoch="0" version="2.2.2" release="2.red80" arch="x86_64" src="mongo-c-driver-2.2.2-2.red80.src.rpm">
					<filename>mongo-c-driver-libs-0:2.2.2-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libbson" epoch="0" version="2.2.2" release="2.red80" arch="aarch64" src="mongo-c-driver-2.2.2-2.red80.src.rpm">
					<filename>libbson-0:2.2.2-2.red80.aarch64.rpm</filename>
				</package>
				<package name="libbson-devel" epoch="0" version="2.2.2" release="2.red80" arch="aarch64" src="mongo-c-driver-2.2.2-2.red80.src.rpm">
					<filename>libbson-devel-0:2.2.2-2.red80.aarch64.rpm</filename>
				</package>
				<package name="mongo-c-driver" epoch="0" version="2.2.2" release="2.red80" arch="aarch64" src="mongo-c-driver-2.2.2-2.red80.src.rpm">
					<filename>mongo-c-driver-0:2.2.2-2.red80.aarch64.rpm</filename>
				</package>
				<package name="mongo-c-driver-devel" epoch="0" version="2.2.2" release="2.red80" arch="aarch64" src="mongo-c-driver-2.2.2-2.red80.src.rpm">
					<filename>mongo-c-driver-devel-0:2.2.2-2.red80.aarch64.rpm</filename>
				</package>
				<package name="mongo-c-driver-libs" epoch="0" version="2.2.2" release="2.red80" arch="aarch64" src="mongo-c-driver-2.2.2-2.red80.src.rpm">
					<filename>mongo-c-driver-libs-0:2.2.2-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0039</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость golang-x-net </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang-x-net</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-x-net-cve-2025-47911-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang-x-net
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-x-net-cve-2025-47911-8.0/" type="self" id="ROS-20260401-80-0039" title="ROS-20260401-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47911" type="cve" id="CVE-2025-47911" title="CVE-2025-47911" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="golang-x-net-devel" epoch="0" version="0.45.0" release="1.red80" arch="noarch" src="golang-x-net-0.45.0-1.red80.src.rpm">
					<filename>golang-x-net-devel-0:0.45.0-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0040</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость golang-x-net </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в golang-x-net</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-x-net-cve-2025-58190-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang-x-net
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-x-net-cve-2025-58190-8.0/" type="self" id="ROS-20260401-80-0040" title="ROS-20260401-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58190" type="cve" id="CVE-2025-58190" title="CVE-2025-58190" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="golang-x-net-devel" epoch="0" version="0.45.0" release="1.red80" arch="noarch" src="golang-x-net-0.45.0-1.red80.src.rpm">
					<filename>golang-x-net-devel-0:0.45.0-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0041</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость golang-x-net </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в golang-x-net</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-x-net-cve-2026-27141-8.0/</description>
               <solution>Установить обновление для пакета(ов) golang-x-net
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-golang-x-net-cve-2026-27141-8.0/" type="self" id="ROS-20260401-80-0041" title="ROS-20260401-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27141" type="cve" id="CVE-2026-27141" title="CVE-2026-27141" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="golang-x-net-devel" epoch="0" version="0.45.0" release="1.red80" arch="noarch" src="golang-x-net-0.45.0-1.red80.src.rpm">
					<filename>golang-x-net-devel-0:0.45.0-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0042</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость firefox </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в firefox</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-10533-8.0/</description>
               <solution>Установить обновление для пакета(ов) firefox
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-firefox-cve-2025-10533-8.0/" type="self" id="ROS-20260401-80-0042" title="ROS-20260401-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10533" type="cve" id="CVE-2025-10533" title="CVE-2025-10533" />
			<reference href="https://bdu.fstec.ru/vul/2025-11378" type="self" id="BDU:2025-11378" title="BDU:2025-11378" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.red80" arch="x86_64" src="firefox-115.30.0-1.red80.src.rpm">
					<filename>firefox-0:115.30.0-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="firefox" epoch="0" version="115.30.0" release="1.red80" arch="aarch64" src="firefox-115.30.0-1.red80.src.rpm">
					<filename>firefox-0:115.30.0-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0043</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость pdns-recursor </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в pdns-recursor</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-pdns-recursor-cve-2026-0398-8.0/</description>
               <solution>Установить обновление для пакета(ов) pdns-recursor
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-pdns-recursor-cve-2026-0398-8.0/" type="self" id="ROS-20260401-80-0043" title="ROS-20260401-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0398" type="cve" id="CVE-2026-0398" title="CVE-2026-0398" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="pdns-recursor" epoch="0" version="5.3.5" release="1.red80" arch="x86_64" src="pdns-recursor-5.3.5-1.red80.src.rpm">
					<filename>pdns-recursor-0:5.3.5-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="pdns-recursor" epoch="0" version="5.3.5" release="1.red80" arch="aarch64" src="pdns-recursor-5.3.5-1.red80.src.rpm">
					<filename>pdns-recursor-0:5.3.5-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0044</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость salt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в salt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-salt-cve-2025-62348-8.0/</description>
               <solution>Установить обновление для пакета(ов) salt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-salt-cve-2025-62348-8.0/" type="self" id="ROS-20260401-80-0044" title="ROS-20260401-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62348" type="cve" id="CVE-2025-62348" title="CVE-2025-62348" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="salt" epoch="0" version="3007.11" release="1.red80" arch="noarch" src="salt-3007.11-1.red80.src.rpm">
					<filename>salt-0:3007.11-1.red80.noarch.rpm</filename>
				</package>
				<package name="salt-api" epoch="0" version="3007.11" release="1.red80" arch="noarch" src="salt-3007.11-1.red80.src.rpm">
					<filename>salt-api-0:3007.11-1.red80.noarch.rpm</filename>
				</package>
				<package name="salt-cloud" epoch="0" version="3007.11" release="1.red80" arch="noarch" src="salt-3007.11-1.red80.src.rpm">
					<filename>salt-cloud-0:3007.11-1.red80.noarch.rpm</filename>
				</package>
				<package name="salt-master" epoch="0" version="3007.11" release="1.red80" arch="noarch" src="salt-3007.11-1.red80.src.rpm">
					<filename>salt-master-0:3007.11-1.red80.noarch.rpm</filename>
				</package>
				<package name="salt-minion" epoch="0" version="3007.11" release="1.red80" arch="noarch" src="salt-3007.11-1.red80.src.rpm">
					<filename>salt-minion-0:3007.11-1.red80.noarch.rpm</filename>
				</package>
				<package name="salt-ssh" epoch="0" version="3007.11" release="1.red80" arch="noarch" src="salt-3007.11-1.red80.src.rpm">
					<filename>salt-ssh-0:3007.11-1.red80.noarch.rpm</filename>
				</package>
				<package name="salt-syndic" epoch="0" version="3007.11" release="1.red80" arch="noarch" src="salt-3007.11-1.red80.src.rpm">
					<filename>salt-syndic-0:3007.11-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0045</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость salt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в salt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-salt-cve-2025-62349-8.0/</description>
               <solution>Установить обновление для пакета(ов) salt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-salt-cve-2025-62349-8.0/" type="self" id="ROS-20260401-80-0045" title="ROS-20260401-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62349" type="cve" id="CVE-2025-62349" title="CVE-2025-62349" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="salt" epoch="0" version="3007.11" release="1.red80" arch="noarch" src="salt-3007.11-1.red80.src.rpm">
					<filename>salt-0:3007.11-1.red80.noarch.rpm</filename>
				</package>
				<package name="salt-api" epoch="0" version="3007.11" release="1.red80" arch="noarch" src="salt-3007.11-1.red80.src.rpm">
					<filename>salt-api-0:3007.11-1.red80.noarch.rpm</filename>
				</package>
				<package name="salt-cloud" epoch="0" version="3007.11" release="1.red80" arch="noarch" src="salt-3007.11-1.red80.src.rpm">
					<filename>salt-cloud-0:3007.11-1.red80.noarch.rpm</filename>
				</package>
				<package name="salt-master" epoch="0" version="3007.11" release="1.red80" arch="noarch" src="salt-3007.11-1.red80.src.rpm">
					<filename>salt-master-0:3007.11-1.red80.noarch.rpm</filename>
				</package>
				<package name="salt-minion" epoch="0" version="3007.11" release="1.red80" arch="noarch" src="salt-3007.11-1.red80.src.rpm">
					<filename>salt-minion-0:3007.11-1.red80.noarch.rpm</filename>
				</package>
				<package name="salt-ssh" epoch="0" version="3007.11" release="1.red80" arch="noarch" src="salt-3007.11-1.red80.src.rpm">
					<filename>salt-ssh-0:3007.11-1.red80.noarch.rpm</filename>
				</package>
				<package name="salt-syndic" epoch="0" version="3007.11" release="1.red80" arch="noarch" src="salt-3007.11-1.red80.src.rpm">
					<filename>salt-syndic-0:3007.11-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0046</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость python-authlib </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в python-authlib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-authlib-cve-2026-28802-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-authlib
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-authlib-cve-2026-28802-8.0/" type="self" id="ROS-20260401-80-0046" title="ROS-20260401-80-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28802" type="cve" id="CVE-2026-28802" title="CVE-2026-28802" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python3-authlib" epoch="0" version="1.6.9" release="1.red80" arch="noarch" src="python-authlib-1.6.9-1.red80.src.rpm">
					<filename>python3-authlib-0:1.6.9-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0047</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость cflow </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в cflow</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-cflow-cve-2023-2789-8.0/</description>
               <solution>Установить обновление для пакета(ов) cflow
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-cflow-cve-2023-2789-8.0/" type="self" id="ROS-20260401-80-0047" title="ROS-20260401-80-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2789" type="cve" id="CVE-2023-2789" title="CVE-2023-2789" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="cflow" epoch="0" version="1.8" release="1.red80" arch="x86_64" src="cflow-1.8-1.red80.src.rpm">
					<filename>cflow-0:1.8-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="cflow" epoch="0" version="1.8" release="1.red80" arch="aarch64" src="cflow-1.8-1.red80.src.rpm">
					<filename>cflow-0:1.8-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0048</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость zabbix-lts </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix-lts</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix-lts-cve-2026-23925-8.0/</description>
               <solution>Установить обновление для пакета(ов) zabbix-lts
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix-lts-cve-2026-23925-8.0/" type="self" id="ROS-20260401-80-0048" title="ROS-20260401-80-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23925" type="cve" id="CVE-2026-23925" title="CVE-2026-23925" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="zabbix-lts-agent" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-agent-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-agent2" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-agent2-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-get" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-get-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk11" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk11-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk17" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk17-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk21" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk21-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-js" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-js-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-mysql" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-proxy-mysql-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-pgsql" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-proxy-pgsql-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-sqlite3" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-proxy-sqlite3-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-sender" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-sender-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-mysql" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-server-mysql-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-pgsql" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-server-pgsql-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix-lts-web-service" epoch="1" version="6.0.42" release="1.red80" arch="x86_64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-web-service-1:6.0.42-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="zabbix-lts-agent" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-agent-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-agent2" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-agent2-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-get" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-get-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk11" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk11-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk17" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk17-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-java-gateway-openjdk21" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-java-gateway-openjdk21-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-js" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-js-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-mysql" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-proxy-mysql-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-pgsql" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-proxy-pgsql-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-proxy-sqlite3" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-proxy-sqlite3-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-sender" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-sender-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-mysql" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-server-mysql-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-server-pgsql" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-server-pgsql-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix-lts-web-service" epoch="1" version="6.0.42" release="1.red80" arch="aarch64" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-web-service-1:6.0.42-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="zabbix-lts-apache-conf" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-apache-conf-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-nginx-conf" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-nginx-conf-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-selinux-policy" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-selinux-policy-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-sql-scripts" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-sql-scripts-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-web-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-deps" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-web-deps-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-mysql" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-web-mysql-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix-lts-web-pgsql" epoch="1" version="6.0.42" release="1.red80" arch="noarch" src="zabbix-lts-6.0.42-1.red80.src.rpm">
					<filename>zabbix-lts-web-pgsql-1:6.0.42-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0049</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость zabbix7-lts </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в zabbix7-lts</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix7-lts-cve-2026-23925-8.0/</description>
               <solution>Установить обновление для пакета(ов) zabbix7-lts
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-zabbix7-lts-cve-2026-23925-8.0/" type="self" id="ROS-20260401-80-0049" title="ROS-20260401-80-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23925" type="cve" id="CVE-2026-23925" title="CVE-2026-23925" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="zabbix7-lts-agent" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-agent-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-agent2" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-agent2-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-get" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-get-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-java-gateway-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk11" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk11-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk17" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk17-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk21" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk21-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-js" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-js-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-mysql" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-proxy-mysql-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-pgsql" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-proxy-pgsql-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-sqlite3" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-proxy-sqlite3-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-sender" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-sender-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-mysql" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-server-mysql-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-pgsql" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-server-pgsql-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-service" epoch="1" version="7.0.19" release="1.red80" arch="x86_64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-web-service-1:7.0.19-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="zabbix7-lts-agent" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-agent-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-agent2" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-agent2-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-get" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-get-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-java-gateway-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk11" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk11-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk17" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk17-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-java-gateway-openjdk21" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-java-gateway-openjdk21-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-js" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-js-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-mysql" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-proxy-mysql-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-pgsql" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-proxy-pgsql-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-proxy-sqlite3" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-proxy-sqlite3-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-sender" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-sender-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-mysql" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-server-mysql-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-server-pgsql" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-server-pgsql-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-service" epoch="1" version="7.0.19" release="1.red80" arch="aarch64" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-web-service-1:7.0.19-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="zabbix7-lts-apache-conf" epoch="1" version="7.0.19" release="1.red80" arch="noarch" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-apache-conf-1:7.0.19-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-nginx-conf" epoch="1" version="7.0.19" release="1.red80" arch="noarch" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-nginx-conf-1:7.0.19-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-selinux-policy" epoch="1" version="7.0.19" release="1.red80" arch="noarch" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-selinux-policy-1:7.0.19-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-sql-scripts" epoch="1" version="7.0.19" release="1.red80" arch="noarch" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-sql-scripts-1:7.0.19-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web" epoch="1" version="7.0.19" release="1.red80" arch="noarch" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-web-1:7.0.19-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-deps" epoch="1" version="7.0.19" release="1.red80" arch="noarch" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-web-deps-1:7.0.19-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-mysql" epoch="1" version="7.0.19" release="1.red80" arch="noarch" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-web-mysql-1:7.0.19-1.red80.noarch.rpm</filename>
				</package>
				<package name="zabbix7-lts-web-pgsql" epoch="1" version="7.0.19" release="1.red80" arch="noarch" src="zabbix7-lts-7.0.19-1.red80.src.rpm">
					<filename>zabbix7-lts-web-pgsql-1:7.0.19-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260401-80-0050</id>
		<issued date="2026-04-01" />
		<updated date="2026-04-01" />
		<title>Уязвимость python-authlib </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в python-authlib</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-authlib-cve-2026-27962-8.0/</description>
               <solution>Установить обновление для пакета(ов) python-authlib
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-python-authlib-cve-2026-27962-8.0/" type="self" id="ROS-20260401-80-0050" title="ROS-20260401-80-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27962" type="cve" id="CVE-2026-27962" title="CVE-2026-27962" />
		</references>
		<pkglist>
			<collection short="noarch">
				<name>noarch</name>
				<package name="python3-authlib" epoch="0" version="1.6.9" release="1.red80" arch="noarch" src="python-authlib-1.6.9-1.red80.src.rpm">
					<filename>python3-authlib-0:1.6.9-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0001</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37892-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37892-8.0/" type="self" id="ROS-20260403-80-0001" title="ROS-20260403-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37892" type="cve" id="CVE-2025-37892" title="CVE-2025-37892" />
			<reference href="https://bdu.fstec.ru/vul/2025-11973" type="self" id="BDU:2025-11973" title="BDU:2025-11973" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0002</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37894-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37894-8.0/" type="self" id="ROS-20260403-80-0002" title="ROS-20260403-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37894" type="cve" id="CVE-2025-37894" title="CVE-2025-37894" />
			<reference href="https://bdu.fstec.ru/vul/2025-12369" type="self" id="BDU:2025-12369" title="BDU:2025-12369" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0003</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37895-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37895-8.0/" type="self" id="ROS-20260403-80-0003" title="ROS-20260403-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37895" type="cve" id="CVE-2025-37895" title="CVE-2025-37895" />
			<reference href="https://bdu.fstec.ru/vul/2025-12243" type="self" id="BDU:2025-12243" title="BDU:2025-12243" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0004</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37899-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37899-8.0/" type="self" id="ROS-20260403-80-0004" title="ROS-20260403-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37899" type="cve" id="CVE-2025-37899" title="CVE-2025-37899" />
			<reference href="https://bdu.fstec.ru/vul/2025-06026" type="self" id="BDU:2025-06026" title="BDU:2025-06026" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0005</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37926-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37926-8.0/" type="self" id="ROS-20260403-80-0005" title="ROS-20260403-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37926" type="cve" id="CVE-2025-37926" title="CVE-2025-37926" />
			<reference href="https://bdu.fstec.ru/vul/2026-02237" type="self" id="BDU:2026-02237" title="BDU:2026-02237" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0006</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38022-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38022-8.0/" type="self" id="ROS-20260403-80-0006" title="ROS-20260403-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38022" type="cve" id="CVE-2025-38022" title="CVE-2025-38022" />
			<reference href="https://bdu.fstec.ru/vul/2025-10612" type="self" id="BDU:2025-10612" title="BDU:2025-10612" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0007</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38057-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38057-8.0/" type="self" id="ROS-20260403-80-0007" title="ROS-20260403-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38057" type="cve" id="CVE-2025-38057" title="CVE-2025-38057" />
			<reference href="https://bdu.fstec.ru/vul/2026-04400" type="self" id="BDU:2026-04400" title="BDU:2026-04400" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0008</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38073-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38073-8.0/" type="self" id="ROS-20260403-80-0008" title="ROS-20260403-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38073" type="cve" id="CVE-2025-38073" title="CVE-2025-38073" />
			<reference href="https://bdu.fstec.ru/vul/2026-04474" type="self" id="BDU:2026-04474" title="BDU:2026-04474" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0009</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38094-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38094-8.0/" type="self" id="ROS-20260403-80-0009" title="ROS-20260403-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38094" type="cve" id="CVE-2025-38094" title="CVE-2025-38094" />
			<reference href="https://bdu.fstec.ru/vul/2025-09017" type="self" id="BDU:2025-09017" title="BDU:2025-09017" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0010</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38650-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38650-8.0/" type="self" id="ROS-20260403-80-0010" title="ROS-20260403-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38650" type="cve" id="CVE-2025-38650" title="CVE-2025-38650" />
			<reference href="https://bdu.fstec.ru/vul/2025-15183" type="self" id="BDU:2025-15183" title="BDU:2025-15183" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0011</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38652-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38652-8.0/" type="self" id="ROS-20260403-80-0011" title="ROS-20260403-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38652" type="cve" id="CVE-2025-38652" title="CVE-2025-38652" />
			<reference href="https://bdu.fstec.ru/vul/2025-15776" type="self" id="BDU:2025-15776" title="BDU:2025-15776" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0012</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38653-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38653-8.0/" type="self" id="ROS-20260403-80-0012" title="ROS-20260403-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38653" type="cve" id="CVE-2025-38653" title="CVE-2025-38653" />
			<reference href="https://bdu.fstec.ru/vul/2025-15184" type="self" id="BDU:2025-15184" title="BDU:2025-15184" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0013</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38660-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38660-8.0/" type="self" id="ROS-20260403-80-0013" title="ROS-20260403-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38660" type="cve" id="CVE-2025-38660" title="CVE-2025-38660" />
			<reference href="https://bdu.fstec.ru/vul/2025-15775" type="self" id="BDU:2025-15775" title="BDU:2025-15775" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0014</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38662-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38662-8.0/" type="self" id="ROS-20260403-80-0014" title="ROS-20260403-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38662" type="cve" id="CVE-2025-38662" title="CVE-2025-38662" />
			<reference href="https://bdu.fstec.ru/vul/2025-15774" type="self" id="BDU:2025-15774" title="BDU:2025-15774" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0015</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38663-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38663-8.0/" type="self" id="ROS-20260403-80-0015" title="ROS-20260403-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38663" type="cve" id="CVE-2025-38663" title="CVE-2025-38663" />
			<reference href="https://bdu.fstec.ru/vul/2025-15022" type="self" id="BDU:2025-15022" title="BDU:2025-15022" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0016</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38664-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38664-8.0/" type="self" id="ROS-20260403-80-0016" title="ROS-20260403-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38664" type="cve" id="CVE-2025-38664" title="CVE-2025-38664" />
			<reference href="https://bdu.fstec.ru/vul/2025-15773" type="self" id="BDU:2025-15773" title="BDU:2025-15773" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0017</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38665-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38665-8.0/" type="self" id="ROS-20260403-80-0017" title="ROS-20260403-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38665" type="cve" id="CVE-2025-38665" title="CVE-2025-38665" />
			<reference href="https://bdu.fstec.ru/vul/2025-15772" type="self" id="BDU:2025-15772" title="BDU:2025-15772" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0018</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38668-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38668-8.0/" type="self" id="ROS-20260403-80-0018" title="ROS-20260403-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38668" type="cve" id="CVE-2025-38668" title="CVE-2025-38668" />
			<reference href="https://bdu.fstec.ru/vul/2025-15771" type="self" id="BDU:2025-15771" title="BDU:2025-15771" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0019</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38670-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38670-8.0/" type="self" id="ROS-20260403-80-0019" title="ROS-20260403-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38670" type="cve" id="CVE-2025-38670" title="CVE-2025-38670" />
			<reference href="https://bdu.fstec.ru/vul/2025-15770" type="self" id="BDU:2025-15770" title="BDU:2025-15770" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0020</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38671-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38671-8.0/" type="self" id="ROS-20260403-80-0020" title="ROS-20260403-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38671" type="cve" id="CVE-2025-38671" title="CVE-2025-38671" />
			<reference href="https://bdu.fstec.ru/vul/2025-15769" type="self" id="BDU:2025-15769" title="BDU:2025-15769" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0021</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38675-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38675-8.0/" type="self" id="ROS-20260403-80-0021" title="ROS-20260403-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38675" type="cve" id="CVE-2025-38675" title="CVE-2025-38675" />
			<reference href="https://bdu.fstec.ru/vul/2025-15768" type="self" id="BDU:2025-15768" title="BDU:2025-15768" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0022</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38676-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38676-8.0/" type="self" id="ROS-20260403-80-0022" title="ROS-20260403-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38676" type="cve" id="CVE-2025-38676" title="CVE-2025-38676" />
			<reference href="https://bdu.fstec.ru/vul/2025-15023" type="self" id="BDU:2025-15023" title="BDU:2025-15023" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0023</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38677-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38677-8.0/" type="self" id="ROS-20260403-80-0023" title="ROS-20260403-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38677" type="cve" id="CVE-2025-38677" title="CVE-2025-38677" />
			<reference href="https://bdu.fstec.ru/vul/2025-15767" type="self" id="BDU:2025-15767" title="BDU:2025-15767" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0024</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38678-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38678-8.0/" type="self" id="ROS-20260403-80-0024" title="ROS-20260403-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38678" type="cve" id="CVE-2025-38678" title="CVE-2025-38678" />
			<reference href="https://bdu.fstec.ru/vul/2025-15551" type="self" id="BDU:2025-15551" title="BDU:2025-15551" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.69" release="1.red80" arch="noarch" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.69-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0025</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38679-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38679-8.0/" type="self" id="ROS-20260403-80-0025" title="ROS-20260403-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38679" type="cve" id="CVE-2025-38679" title="CVE-2025-38679" />
			<reference href="https://bdu.fstec.ru/vul/2025-15766" type="self" id="BDU:2025-15766" title="BDU:2025-15766" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0026</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38680-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38680-8.0/" type="self" id="ROS-20260403-80-0026" title="ROS-20260403-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38680" type="cve" id="CVE-2025-38680" title="CVE-2025-38680" />
			<reference href="https://bdu.fstec.ru/vul/2025-15765" type="self" id="BDU:2025-15765" title="BDU:2025-15765" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0027</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38681-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38681-8.0/" type="self" id="ROS-20260403-80-0027" title="ROS-20260403-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38681" type="cve" id="CVE-2025-38681" title="CVE-2025-38681" />
			<reference href="https://bdu.fstec.ru/vul/2025-15764" type="self" id="BDU:2025-15764" title="BDU:2025-15764" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0028</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38683-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38683-8.0/" type="self" id="ROS-20260403-80-0028" title="ROS-20260403-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38683" type="cve" id="CVE-2025-38683" title="CVE-2025-38683" />
			<reference href="https://bdu.fstec.ru/vul/2025-15763" type="self" id="BDU:2025-15763" title="BDU:2025-15763" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0029</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38684-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38684-8.0/" type="self" id="ROS-20260403-80-0029" title="ROS-20260403-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38684" type="cve" id="CVE-2025-38684" title="CVE-2025-38684" />
			<reference href="https://bdu.fstec.ru/vul/2025-15762" type="self" id="BDU:2025-15762" title="BDU:2025-15762" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0030</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38685-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38685-8.0/" type="self" id="ROS-20260403-80-0030" title="ROS-20260403-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38685" type="cve" id="CVE-2025-38685" title="CVE-2025-38685" />
			<reference href="https://bdu.fstec.ru/vul/2025-15024" type="self" id="BDU:2025-15024" title="BDU:2025-15024" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0031</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38686-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38686-8.0/" type="self" id="ROS-20260403-80-0031" title="ROS-20260403-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38686" type="cve" id="CVE-2025-38686" title="CVE-2025-38686" />
			<reference href="https://bdu.fstec.ru/vul/2025-15549" type="self" id="BDU:2025-15549" title="BDU:2025-15549" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0032</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38687-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38687-8.0/" type="self" id="ROS-20260403-80-0032" title="ROS-20260403-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38687" type="cve" id="CVE-2025-38687" title="CVE-2025-38687" />
			<reference href="https://bdu.fstec.ru/vul/2025-15187" type="self" id="BDU:2025-15187" title="BDU:2025-15187" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0033</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38688-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38688-8.0/" type="self" id="ROS-20260403-80-0033" title="ROS-20260403-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38688" type="cve" id="CVE-2025-38688" title="CVE-2025-38688" />
			<reference href="https://bdu.fstec.ru/vul/2025-14976" type="self" id="BDU:2025-14976" title="BDU:2025-14976" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0034</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38691-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38691-8.0/" type="self" id="ROS-20260403-80-0034" title="ROS-20260403-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38691" type="cve" id="CVE-2025-38691" title="CVE-2025-38691" />
			<reference href="https://bdu.fstec.ru/vul/2025-15025" type="self" id="BDU:2025-15025" title="BDU:2025-15025" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0035</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38693-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38693-8.0/" type="self" id="ROS-20260403-80-0035" title="ROS-20260403-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38693" type="cve" id="CVE-2025-38693" title="CVE-2025-38693" />
			<reference href="https://bdu.fstec.ru/vul/2025-15761" type="self" id="BDU:2025-15761" title="BDU:2025-15761" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0036</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38695-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38695-8.0/" type="self" id="ROS-20260403-80-0036" title="ROS-20260403-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38695" type="cve" id="CVE-2025-38695" title="CVE-2025-38695" />
			<reference href="https://bdu.fstec.ru/vul/2025-15759" type="self" id="BDU:2025-15759" title="BDU:2025-15759" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0037</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38696-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38696-8.0/" type="self" id="ROS-20260403-80-0037" title="ROS-20260403-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38696" type="cve" id="CVE-2025-38696" title="CVE-2025-38696" />
			<reference href="https://bdu.fstec.ru/vul/2025-15758" type="self" id="BDU:2025-15758" title="BDU:2025-15758" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0038</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38697-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38697-8.0/" type="self" id="ROS-20260403-80-0038" title="ROS-20260403-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38697" type="cve" id="CVE-2025-38697" title="CVE-2025-38697" />
			<reference href="https://bdu.fstec.ru/vul/2025-15757" type="self" id="BDU:2025-15757" title="BDU:2025-15757" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0039</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38698-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38698-8.0/" type="self" id="ROS-20260403-80-0039" title="ROS-20260403-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38698" type="cve" id="CVE-2025-38698" title="CVE-2025-38698" />
			<reference href="https://bdu.fstec.ru/vul/2025-15548" type="self" id="BDU:2025-15548" title="BDU:2025-15548" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0040</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38699-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38699-8.0/" type="self" id="ROS-20260403-80-0040" title="ROS-20260403-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38699" type="cve" id="CVE-2025-38699" title="CVE-2025-38699" />
			<reference href="https://bdu.fstec.ru/vul/2025-15756" type="self" id="BDU:2025-15756" title="BDU:2025-15756" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0041</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38700-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38700-8.0/" type="self" id="ROS-20260403-80-0041" title="ROS-20260403-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38700" type="cve" id="CVE-2025-38700" title="CVE-2025-38700" />
			<reference href="https://bdu.fstec.ru/vul/2025-15755" type="self" id="BDU:2025-15755" title="BDU:2025-15755" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0042</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38701-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38701-8.0/" type="self" id="ROS-20260403-80-0042" title="ROS-20260403-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38701" type="cve" id="CVE-2025-38701" title="CVE-2025-38701" />
			<reference href="https://bdu.fstec.ru/vul/2025-15547" type="self" id="BDU:2025-15547" title="BDU:2025-15547" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0043</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38702-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38702-8.0/" type="self" id="ROS-20260403-80-0043" title="ROS-20260403-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38702" type="cve" id="CVE-2025-38702" title="CVE-2025-38702" />
			<reference href="https://bdu.fstec.ru/vul/2025-15026" type="self" id="BDU:2025-15026" title="BDU:2025-15026" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0044</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38706-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38706-8.0/" type="self" id="ROS-20260403-80-0044" title="ROS-20260403-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38706" type="cve" id="CVE-2025-38706" title="CVE-2025-38706" />
			<reference href="https://bdu.fstec.ru/vul/2025-15753" type="self" id="BDU:2025-15753" title="BDU:2025-15753" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0045</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38707-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38707-8.0/" type="self" id="ROS-20260403-80-0045" title="ROS-20260403-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38707" type="cve" id="CVE-2025-38707" title="CVE-2025-38707" />
			<reference href="https://bdu.fstec.ru/vul/2025-15185" type="self" id="BDU:2025-15185" title="BDU:2025-15185" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0046</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38708-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38708-8.0/" type="self" id="ROS-20260403-80-0046" title="ROS-20260403-80-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38708" type="cve" id="CVE-2025-38708" title="CVE-2025-38708" />
			<reference href="https://bdu.fstec.ru/vul/2025-15188" type="self" id="BDU:2025-15188" title="BDU:2025-15188" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260403-80-0047</id>
		<issued date="2026-04-03" />
		<updated date="2026-04-03" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38711-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38711-8.0/" type="self" id="ROS-20260403-80-0047" title="ROS-20260403-80-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38711" type="cve" id="CVE-2025-38711" title="CVE-2025-38711" />
			<reference href="https://bdu.fstec.ru/vul/2025-15027" type="self" id="BDU:2025-15027" title="BDU:2025-15027" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260406-80-0001</id>
		<issued date="2026-04-06" />
		<updated date="2026-04-06" />
		<title>Уязвимость nginx </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nginx-cve-2025-53859-8.0/</description>
               <solution>Установить обновление для пакета(ов) nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nginx-cve-2025-53859-8.0/" type="self" id="ROS-20260406-80-0001" title="ROS-20260406-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53859" type="cve" id="CVE-2025-53859" title="CVE-2025-53859" />
			<reference href="https://bdu.fstec.ru/vul/2025-16019" type="self" id="BDU:2025-16019" title="BDU:2025-16019" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="nginx" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nginx-core" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-core-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-devel" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-devel-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-geoip" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-geoip-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-image-filter" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-image-filter-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-perl" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-perl-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-push-stream" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-push-stream-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-xslt-filter" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-xslt-filter-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-mail" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-mail-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-stream" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-stream-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="nginx" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nginx-core" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-core-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nginx-mod-devel" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-devel-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nginx-mod-http-geoip" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-geoip-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nginx-mod-http-image-filter" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-image-filter-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nginx-mod-http-perl" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-perl-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nginx-mod-http-push-stream" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-push-stream-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nginx-mod-http-xslt-filter" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-xslt-filter-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nginx-mod-mail" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-mail-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nginx-mod-stream" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-stream-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="nginx-all-modules" epoch="1" version="1.28.2" release="1.red80" arch="noarch" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-all-modules-1:1.28.2-1.red80.noarch.rpm</filename>
				</package>
				<package name="nginx-filesystem" epoch="1" version="1.28.2" release="1.red80" arch="noarch" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-filesystem-1:1.28.2-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0001</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22083-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22083-8.0/" type="self" id="ROS-20260407-80-0001" title="ROS-20260407-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22083" type="cve" id="CVE-2025-22083" title="CVE-2025-22083" />
			<reference href="https://bdu.fstec.ru/vul/2026-02547" type="self" id="BDU:2026-02547" title="BDU:2026-02547" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0002</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22090-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22090-8.0/" type="self" id="ROS-20260407-80-0002" title="ROS-20260407-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22090" type="cve" id="CVE-2025-22090" title="CVE-2025-22090" />
			<reference href="https://bdu.fstec.ru/vul/2026-01403" type="self" id="BDU:2026-01403" title="BDU:2026-01403" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0003</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22107-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22107-8.0/" type="self" id="ROS-20260407-80-0003" title="ROS-20260407-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22107" type="cve" id="CVE-2025-22107" title="CVE-2025-22107" />
			<reference href="https://bdu.fstec.ru/vul/2026-01500" type="self" id="BDU:2026-01500" title="BDU:2026-01500" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.69" release="1.red80" arch="noarch" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.69-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0004</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22111-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22111-8.0/" type="self" id="ROS-20260407-80-0004" title="ROS-20260407-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22111" type="cve" id="CVE-2025-22111" title="CVE-2025-22111" />
			<reference href="https://bdu.fstec.ru/vul/2026-01402" type="self" id="BDU:2026-01402" title="BDU:2026-01402" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.69" release="1.red80" arch="noarch" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.69-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0005</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22121-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-22121-8.0/" type="self" id="ROS-20260407-80-0005" title="ROS-20260407-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22121" type="cve" id="CVE-2025-22121" title="CVE-2025-22121" />
			<reference href="https://bdu.fstec.ru/vul/2026-01527" type="self" id="BDU:2026-01527" title="BDU:2026-01527" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.69" release="1.red80" arch="noarch" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.69-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0006</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38104-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38104-8.0/" type="self" id="ROS-20260407-80-0006" title="ROS-20260407-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38104" type="cve" id="CVE-2025-38104" title="CVE-2025-38104" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0007</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37803-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37803-8.0/" type="self" id="ROS-20260407-80-0007" title="ROS-20260407-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37803" type="cve" id="CVE-2025-37803" title="CVE-2025-37803" />
			<reference href="https://bdu.fstec.ru/vul/2025-10604" type="self" id="BDU:2025-10604" title="BDU:2025-10604" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.69" release="1.red80" arch="x86_64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.69-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.69" release="1.red80" arch="aarch64" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.69-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.69" release="1.red80" arch="noarch" src="kernel-lt-6.12.69-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.69-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0008</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37890-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37890-8.0/" type="self" id="ROS-20260407-80-0008" title="ROS-20260407-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37890" type="cve" id="CVE-2025-37890" title="CVE-2025-37890" />
			<reference href="https://bdu.fstec.ru/vul/2025-06490" type="self" id="BDU:2025-06490" title="BDU:2025-06490" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0009</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37891-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-37891-8.0/" type="self" id="ROS-20260407-80-0009" title="ROS-20260407-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37891" type="cve" id="CVE-2025-37891" title="CVE-2025-37891" />
			<reference href="https://bdu.fstec.ru/vul/2025-10601" type="self" id="BDU:2025-10601" title="BDU:2025-10601" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0010</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38666-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38666-8.0/" type="self" id="ROS-20260407-80-0010" title="ROS-20260407-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38666" type="cve" id="CVE-2025-38666" title="CVE-2025-38666" />
			<reference href="https://bdu.fstec.ru/vul/2025-15186" type="self" id="BDU:2025-15186" title="BDU:2025-15186" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0011</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38712-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38712-8.0/" type="self" id="ROS-20260407-80-0011" title="ROS-20260407-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38712" type="cve" id="CVE-2025-38712" title="CVE-2025-38712" />
			<reference href="https://bdu.fstec.ru/vul/2025-15752" type="self" id="BDU:2025-15752" title="BDU:2025-15752" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0012</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38713-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38713-8.0/" type="self" id="ROS-20260407-80-0012" title="ROS-20260407-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38713" type="cve" id="CVE-2025-38713" title="CVE-2025-38713" />
			<reference href="https://bdu.fstec.ru/vul/2025-15660" type="self" id="BDU:2025-15660" title="BDU:2025-15660" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0013</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38714-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38714-8.0/" type="self" id="ROS-20260407-80-0013" title="ROS-20260407-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38714" type="cve" id="CVE-2025-38714" title="CVE-2025-38714" />
			<reference href="https://bdu.fstec.ru/vul/2025-15659" type="self" id="BDU:2025-15659" title="BDU:2025-15659" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0014</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38715-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38715-8.0/" type="self" id="ROS-20260407-80-0014" title="ROS-20260407-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38715" type="cve" id="CVE-2025-38715" title="CVE-2025-38715" />
			<reference href="https://bdu.fstec.ru/vul/2025-15751" type="self" id="BDU:2025-15751" title="BDU:2025-15751" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0015</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38718-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38718-8.0/" type="self" id="ROS-20260407-80-0015" title="ROS-20260407-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38718" type="cve" id="CVE-2025-38718" title="CVE-2025-38718" />
			<reference href="https://bdu.fstec.ru/vul/2026-03072" type="self" id="BDU:2026-03072" title="BDU:2026-03072" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0016</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38721-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38721-8.0/" type="self" id="ROS-20260407-80-0016" title="ROS-20260407-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38721" type="cve" id="CVE-2025-38721" title="CVE-2025-38721" />
			<reference href="https://bdu.fstec.ru/vul/2025-15750" type="self" id="BDU:2025-15750" title="BDU:2025-15750" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0017</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38723-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38723-8.0/" type="self" id="ROS-20260407-80-0017" title="ROS-20260407-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38723" type="cve" id="CVE-2025-38723" title="CVE-2025-38723" />
			<reference href="https://bdu.fstec.ru/vul/2025-15189" type="self" id="BDU:2025-15189" title="BDU:2025-15189" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0018</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38724-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38724-8.0/" type="self" id="ROS-20260407-80-0018" title="ROS-20260407-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38724" type="cve" id="CVE-2025-38724" title="CVE-2025-38724" />
			<reference href="https://bdu.fstec.ru/vul/2025-15749" type="self" id="BDU:2025-15749" title="BDU:2025-15749" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0019</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38725-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38725-8.0/" type="self" id="ROS-20260407-80-0019" title="ROS-20260407-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38725" type="cve" id="CVE-2025-38725" title="CVE-2025-38725" />
			<reference href="https://bdu.fstec.ru/vul/2025-15748" type="self" id="BDU:2025-15748" title="BDU:2025-15748" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0020</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38726-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38726-8.0/" type="self" id="ROS-20260407-80-0020" title="ROS-20260407-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38726" type="cve" id="CVE-2025-38726" title="CVE-2025-38726" />
			<reference href="https://bdu.fstec.ru/vul/2025-15747" type="self" id="BDU:2025-15747" title="BDU:2025-15747" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0021</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38728-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38728-8.0/" type="self" id="ROS-20260407-80-0021" title="ROS-20260407-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38728" type="cve" id="CVE-2025-38728" title="CVE-2025-38728" />
			<reference href="https://bdu.fstec.ru/vul/2025-15745" type="self" id="BDU:2025-15745" title="BDU:2025-15745" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0022</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38729-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38729-8.0/" type="self" id="ROS-20260407-80-0022" title="ROS-20260407-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38729" type="cve" id="CVE-2025-38729" title="CVE-2025-38729" />
			<reference href="https://bdu.fstec.ru/vul/2025-15744" type="self" id="BDU:2025-15744" title="BDU:2025-15744" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0023</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38730-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38730-8.0/" type="self" id="ROS-20260407-80-0023" title="ROS-20260407-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38730" type="cve" id="CVE-2025-38730" title="CVE-2025-38730" />
			<reference href="https://bdu.fstec.ru/vul/2025-15190" type="self" id="BDU:2025-15190" title="BDU:2025-15190" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0024</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38732-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38732-8.0/" type="self" id="ROS-20260407-80-0024" title="ROS-20260407-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38732" type="cve" id="CVE-2025-38732" title="CVE-2025-38732" />
			<reference href="https://bdu.fstec.ru/vul/2025-15743" type="self" id="BDU:2025-15743" title="BDU:2025-15743" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0025</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38733-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38733-8.0/" type="self" id="ROS-20260407-80-0025" title="ROS-20260407-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38733" type="cve" id="CVE-2025-38733" title="CVE-2025-38733" />
			<reference href="https://bdu.fstec.ru/vul/2025-15742" type="self" id="BDU:2025-15742" title="BDU:2025-15742" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0026</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38735-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38735-8.0/" type="self" id="ROS-20260407-80-0026" title="ROS-20260407-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38735" type="cve" id="CVE-2025-38735" title="CVE-2025-38735" />
			<reference href="https://bdu.fstec.ru/vul/2025-15546" type="self" id="BDU:2025-15546" title="BDU:2025-15546" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0027</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38737-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-38737-8.0/" type="self" id="ROS-20260407-80-0027" title="ROS-20260407-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38737" type="cve" id="CVE-2025-38737" title="CVE-2025-38737" />
			<reference href="https://bdu.fstec.ru/vul/2025-15191" type="self" id="BDU:2025-15191" title="BDU:2025-15191" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0028</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39673-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39673-8.0/" type="self" id="ROS-20260407-80-0028" title="ROS-20260407-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39673" type="cve" id="CVE-2025-39673" title="CVE-2025-39673" />
			<reference href="https://bdu.fstec.ru/vul/2025-15741" type="self" id="BDU:2025-15741" title="BDU:2025-15741" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0029</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39675-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39675-8.0/" type="self" id="ROS-20260407-80-0029" title="ROS-20260407-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39675" type="cve" id="CVE-2025-39675" title="CVE-2025-39675" />
			<reference href="https://bdu.fstec.ru/vul/2025-15740" type="self" id="BDU:2025-15740" title="BDU:2025-15740" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0030</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39676-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39676-8.0/" type="self" id="ROS-20260407-80-0030" title="ROS-20260407-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39676" type="cve" id="CVE-2025-39676" title="CVE-2025-39676" />
			<reference href="https://bdu.fstec.ru/vul/2025-15739" type="self" id="BDU:2025-15739" title="BDU:2025-15739" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0031</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39678-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39678-8.0/" type="self" id="ROS-20260407-80-0031" title="ROS-20260407-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39678" type="cve" id="CVE-2025-39678" title="CVE-2025-39678" />
			<reference href="https://bdu.fstec.ru/vul/2026-02753" type="self" id="BDU:2026-02753" title="BDU:2026-02753" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0032</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39679-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39679-8.0/" type="self" id="ROS-20260407-80-0032" title="ROS-20260407-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39679" type="cve" id="CVE-2025-39679" title="CVE-2025-39679" />
			<reference href="https://bdu.fstec.ru/vul/2025-15738" type="self" id="BDU:2025-15738" title="BDU:2025-15738" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0033</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39681-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39681-8.0/" type="self" id="ROS-20260407-80-0033" title="ROS-20260407-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39681" type="cve" id="CVE-2025-39681" title="CVE-2025-39681" />
			<reference href="https://bdu.fstec.ru/vul/2025-15028" type="self" id="BDU:2025-15028" title="BDU:2025-15028" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0034</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39683-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39683-8.0/" type="self" id="ROS-20260407-80-0034" title="ROS-20260407-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39683" type="cve" id="CVE-2025-39683" title="CVE-2025-39683" />
			<reference href="https://bdu.fstec.ru/vul/2025-15733" type="self" id="BDU:2025-15733" title="BDU:2025-15733" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0035</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39684-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39684-8.0/" type="self" id="ROS-20260407-80-0035" title="ROS-20260407-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39684" type="cve" id="CVE-2025-39684" title="CVE-2025-39684" />
			<reference href="https://bdu.fstec.ru/vul/2025-15192" type="self" id="BDU:2025-15192" title="BDU:2025-15192" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0036</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39685-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39685-8.0/" type="self" id="ROS-20260407-80-0036" title="ROS-20260407-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39685" type="cve" id="CVE-2025-39685" title="CVE-2025-39685" />
			<reference href="https://bdu.fstec.ru/vul/2025-15732" type="self" id="BDU:2025-15732" title="BDU:2025-15732" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0037</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39686-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39686-8.0/" type="self" id="ROS-20260407-80-0037" title="ROS-20260407-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39686" type="cve" id="CVE-2025-39686" title="CVE-2025-39686" />
			<reference href="https://bdu.fstec.ru/vul/2025-15731" type="self" id="BDU:2025-15731" title="BDU:2025-15731" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0038</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39687-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39687-8.0/" type="self" id="ROS-20260407-80-0038" title="ROS-20260407-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39687" type="cve" id="CVE-2025-39687" title="CVE-2025-39687" />
			<reference href="https://bdu.fstec.ru/vul/2025-15193" type="self" id="BDU:2025-15193" title="BDU:2025-15193" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0039</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39689-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39689-8.0/" type="self" id="ROS-20260407-80-0039" title="ROS-20260407-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39689" type="cve" id="CVE-2025-39689" title="CVE-2025-39689" />
			<reference href="https://bdu.fstec.ru/vul/2025-15194" type="self" id="BDU:2025-15194" title="BDU:2025-15194" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0040</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39691-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39691-8.0/" type="self" id="ROS-20260407-80-0040" title="ROS-20260407-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39691" type="cve" id="CVE-2025-39691" title="CVE-2025-39691" />
			<reference href="https://bdu.fstec.ru/vul/2025-15196" type="self" id="BDU:2025-15196" title="BDU:2025-15196" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0041</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39692-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39692-8.0/" type="self" id="ROS-20260407-80-0041" title="ROS-20260407-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39692" type="cve" id="CVE-2025-39692" title="CVE-2025-39692" />
			<reference href="https://bdu.fstec.ru/vul/2025-15730" type="self" id="BDU:2025-15730" title="BDU:2025-15730" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0042</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39693-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39693-8.0/" type="self" id="ROS-20260407-80-0042" title="ROS-20260407-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39693" type="cve" id="CVE-2025-39693" title="CVE-2025-39693" />
			<reference href="https://bdu.fstec.ru/vul/2025-15729" type="self" id="BDU:2025-15729" title="BDU:2025-15729" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0043</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39694-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39694-8.0/" type="self" id="ROS-20260407-80-0043" title="ROS-20260407-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39694" type="cve" id="CVE-2025-39694" title="CVE-2025-39694" />
			<reference href="https://bdu.fstec.ru/vul/2025-15728" type="self" id="BDU:2025-15728" title="BDU:2025-15728" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0044</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39695-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39695-8.0/" type="self" id="ROS-20260407-80-0044" title="ROS-20260407-80-0044" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39695" type="cve" id="CVE-2025-39695" title="CVE-2025-39695" />
			<reference href="https://bdu.fstec.ru/vul/2025-15726" type="self" id="BDU:2025-15726" title="BDU:2025-15726" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0045</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39697-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39697-8.0/" type="self" id="ROS-20260407-80-0045" title="ROS-20260407-80-0045" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39697" type="cve" id="CVE-2025-39697" title="CVE-2025-39697" />
			<reference href="https://bdu.fstec.ru/vul/2025-15724" type="self" id="BDU:2025-15724" title="BDU:2025-15724" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0046</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39698-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39698-8.0/" type="self" id="ROS-20260407-80-0046" title="ROS-20260407-80-0046" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39698" type="cve" id="CVE-2025-39698" title="CVE-2025-39698" />
			<reference href="https://bdu.fstec.ru/vul/2025-12706" type="self" id="BDU:2025-12706" title="BDU:2025-12706" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0047</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39700-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39700-8.0/" type="self" id="ROS-20260407-80-0047" title="ROS-20260407-80-0047" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39700" type="cve" id="CVE-2025-39700" title="CVE-2025-39700" />
			<reference href="https://bdu.fstec.ru/vul/2025-15718" type="self" id="BDU:2025-15718" title="BDU:2025-15718" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0048</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39701-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39701-8.0/" type="self" id="ROS-20260407-80-0048" title="ROS-20260407-80-0048" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39701" type="cve" id="CVE-2025-39701" title="CVE-2025-39701" />
			<reference href="https://bdu.fstec.ru/vul/2025-15717" type="self" id="BDU:2025-15717" title="BDU:2025-15717" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0049</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39702-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39702-8.0/" type="self" id="ROS-20260407-80-0049" title="ROS-20260407-80-0049" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39702" type="cve" id="CVE-2025-39702" title="CVE-2025-39702" />
			<reference href="https://bdu.fstec.ru/vul/2025-15716" type="self" id="BDU:2025-15716" title="BDU:2025-15716" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260407-80-0050</id>
		<issued date="2026-04-07" />
		<updated date="2026-04-07" />
		<title>Уязвимость nginx </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в nginx</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nginx-cve-2026-1642-8.0/</description>
               <solution>Установить обновление для пакета(ов) nginx
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-nginx-cve-2026-1642-8.0/" type="self" id="ROS-20260407-80-0050" title="ROS-20260407-80-0050" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1642" type="cve" id="CVE-2026-1642" title="CVE-2026-1642" />
			<reference href="https://bdu.fstec.ru/vul/2026-03559" type="self" id="BDU:2026-03559" title="BDU:2026-03559" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="nginx" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nginx-core" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-core-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-devel" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-devel-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-geoip" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-geoip-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-image-filter" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-image-filter-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-perl" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-perl-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-push-stream" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-push-stream-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-http-xslt-filter" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-xslt-filter-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-mail" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-mail-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
				<package name="nginx-mod-stream" epoch="1" version="1.28.2" release="1.red80" arch="x86_64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-stream-1:1.28.2-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="nginx" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nginx-core" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-core-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nginx-mod-devel" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-devel-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nginx-mod-http-geoip" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-geoip-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nginx-mod-http-image-filter" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-image-filter-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nginx-mod-http-perl" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-perl-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nginx-mod-http-push-stream" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-push-stream-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nginx-mod-http-xslt-filter" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-http-xslt-filter-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nginx-mod-mail" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-mail-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
				<package name="nginx-mod-stream" epoch="1" version="1.28.2" release="1.red80" arch="aarch64" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-mod-stream-1:1.28.2-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="nginx-all-modules" epoch="1" version="1.28.2" release="1.red80" arch="noarch" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-all-modules-1:1.28.2-1.red80.noarch.rpm</filename>
				</package>
				<package name="nginx-filesystem" epoch="1" version="1.28.2" release="1.red80" arch="noarch" src="nginx-1.28.2-1.red80.src.rpm">
					<filename>nginx-filesystem-1:1.28.2-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0001</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39718-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39718-8.0/" type="self" id="ROS-20260408-80-0001" title="ROS-20260408-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39718" type="cve" id="CVE-2025-39718" title="CVE-2025-39718" />
			<reference href="https://bdu.fstec.ru/vul/2025-15002" type="self" id="BDU:2025-15002" title="BDU:2025-15002" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0002</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39719-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39719-8.0/" type="self" id="ROS-20260408-80-0002" title="ROS-20260408-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39719" type="cve" id="CVE-2025-39719" title="CVE-2025-39719" />
			<reference href="https://bdu.fstec.ru/vul/2025-15711" type="self" id="BDU:2025-15711" title="BDU:2025-15711" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0003</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39721-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39721-8.0/" type="self" id="ROS-20260408-80-0003" title="ROS-20260408-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39721" type="cve" id="CVE-2025-39721" title="CVE-2025-39721" />
			<reference href="https://bdu.fstec.ru/vul/2026-02859" type="self" id="BDU:2026-02859" title="BDU:2026-02859" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0004</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39722-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39722-8.0/" type="self" id="ROS-20260408-80-0004" title="ROS-20260408-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39722" type="cve" id="CVE-2025-39722" title="CVE-2025-39722" />
			<reference href="https://bdu.fstec.ru/vul/2025-15710" type="self" id="BDU:2025-15710" title="BDU:2025-15710" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0005</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39723-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39723-8.0/" type="self" id="ROS-20260408-80-0005" title="ROS-20260408-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39723" type="cve" id="CVE-2025-39723" title="CVE-2025-39723" />
			<reference href="https://bdu.fstec.ru/vul/2025-15709" type="self" id="BDU:2025-15709" title="BDU:2025-15709" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0006</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39724-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39724-8.0/" type="self" id="ROS-20260408-80-0006" title="ROS-20260408-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39724" type="cve" id="CVE-2025-39724" title="CVE-2025-39724" />
			<reference href="https://bdu.fstec.ru/vul/2025-15708" type="self" id="BDU:2025-15708" title="BDU:2025-15708" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0007</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39725-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39725-8.0/" type="self" id="ROS-20260408-80-0007" title="ROS-20260408-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39725" type="cve" id="CVE-2025-39725" title="CVE-2025-39725" />
			<reference href="https://bdu.fstec.ru/vul/2025-15707" type="self" id="BDU:2025-15707" title="BDU:2025-15707" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0008</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39727-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39727-8.0/" type="self" id="ROS-20260408-80-0008" title="ROS-20260408-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39727" type="cve" id="CVE-2025-39727" title="CVE-2025-39727" />
			<reference href="https://bdu.fstec.ru/vul/2025-15210" type="self" id="BDU:2025-15210" title="BDU:2025-15210" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0009</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39730-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39730-8.0/" type="self" id="ROS-20260408-80-0009" title="ROS-20260408-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39730" type="cve" id="CVE-2025-39730" title="CVE-2025-39730" />
			<reference href="https://bdu.fstec.ru/vul/2025-15706" type="self" id="BDU:2025-15706" title="BDU:2025-15706" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0010</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39731-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39731-8.0/" type="self" id="ROS-20260408-80-0010" title="ROS-20260408-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39731" type="cve" id="CVE-2025-39731" title="CVE-2025-39731" />
			<reference href="https://bdu.fstec.ru/vul/2025-15705" type="self" id="BDU:2025-15705" title="BDU:2025-15705" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0011</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39734-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39734-8.0/" type="self" id="ROS-20260408-80-0011" title="ROS-20260408-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39734" type="cve" id="CVE-2025-39734" title="CVE-2025-39734" />
			<reference href="https://bdu.fstec.ru/vul/2025-15000" type="self" id="BDU:2025-15000" title="BDU:2025-15000" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0012</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39736-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39736-8.0/" type="self" id="ROS-20260408-80-0012" title="ROS-20260408-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39736" type="cve" id="CVE-2025-39736" title="CVE-2025-39736" />
			<reference href="https://bdu.fstec.ru/vul/2025-14999" type="self" id="BDU:2025-14999" title="BDU:2025-14999" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0013</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Low</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39737-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39737-8.0/" type="self" id="ROS-20260408-80-0013" title="ROS-20260408-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39737" type="cve" id="CVE-2025-39737" title="CVE-2025-39737" />
			<reference href="https://bdu.fstec.ru/vul/2025-15704" type="self" id="BDU:2025-15704" title="BDU:2025-15704" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0014</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39739-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39739-8.0/" type="self" id="ROS-20260408-80-0014" title="ROS-20260408-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39739" type="cve" id="CVE-2025-39739" title="CVE-2025-39739" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0015</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39742-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39742-8.0/" type="self" id="ROS-20260408-80-0015" title="ROS-20260408-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39742" type="cve" id="CVE-2025-39742" title="CVE-2025-39742" />
			<reference href="https://bdu.fstec.ru/vul/2025-14997" type="self" id="BDU:2025-14997" title="BDU:2025-14997" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0016</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39743-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39743-8.0/" type="self" id="ROS-20260408-80-0016" title="ROS-20260408-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39743" type="cve" id="CVE-2025-39743" title="CVE-2025-39743" />
			<reference href="https://bdu.fstec.ru/vul/2025-15702" type="self" id="BDU:2025-15702" title="BDU:2025-15702" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0017</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39749-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39749-8.0/" type="self" id="ROS-20260408-80-0017" title="ROS-20260408-80-0017" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39749" type="cve" id="CVE-2025-39749" title="CVE-2025-39749" />
			<reference href="https://bdu.fstec.ru/vul/2025-15701" type="self" id="BDU:2025-15701" title="BDU:2025-15701" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0018</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39751-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39751-8.0/" type="self" id="ROS-20260408-80-0018" title="ROS-20260408-80-0018" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39751" type="cve" id="CVE-2025-39751" title="CVE-2025-39751" />
			<reference href="https://bdu.fstec.ru/vul/2025-16080" type="self" id="BDU:2025-16080" title="BDU:2025-16080" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0019</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39752-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39752-8.0/" type="self" id="ROS-20260408-80-0019" title="ROS-20260408-80-0019" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39752" type="cve" id="CVE-2025-39752" title="CVE-2025-39752" />
			<reference href="https://bdu.fstec.ru/vul/2025-16060" type="self" id="BDU:2025-16060" title="BDU:2025-16060" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0020</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39756-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39756-8.0/" type="self" id="ROS-20260408-80-0020" title="ROS-20260408-80-0020" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39756" type="cve" id="CVE-2025-39756" title="CVE-2025-39756" />
			<reference href="https://bdu.fstec.ru/vul/2025-15211" type="self" id="BDU:2025-15211" title="BDU:2025-15211" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0021</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39757-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39757-8.0/" type="self" id="ROS-20260408-80-0021" title="ROS-20260408-80-0021" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39757" type="cve" id="CVE-2025-39757" title="CVE-2025-39757" />
			<reference href="https://bdu.fstec.ru/vul/2025-15543" type="self" id="BDU:2025-15543" title="BDU:2025-15543" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0022</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39758-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39758-8.0/" type="self" id="ROS-20260408-80-0022" title="ROS-20260408-80-0022" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39758" type="cve" id="CVE-2025-39758" title="CVE-2025-39758" />
			<reference href="https://bdu.fstec.ru/vul/2025-15699" type="self" id="BDU:2025-15699" title="BDU:2025-15699" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0023</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39759-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39759-8.0/" type="self" id="ROS-20260408-80-0023" title="ROS-20260408-80-0023" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39759" type="cve" id="CVE-2025-39759" title="CVE-2025-39759" />
			<reference href="https://bdu.fstec.ru/vul/2025-15212" type="self" id="BDU:2025-15212" title="BDU:2025-15212" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0024</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39760-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39760-8.0/" type="self" id="ROS-20260408-80-0024" title="ROS-20260408-80-0024" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39760" type="cve" id="CVE-2025-39760" title="CVE-2025-39760" />
			<reference href="https://bdu.fstec.ru/vul/2025-15213" type="self" id="BDU:2025-15213" title="BDU:2025-15213" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0025</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39765-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39765-8.0/" type="self" id="ROS-20260408-80-0025" title="ROS-20260408-80-0025" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39765" type="cve" id="CVE-2025-39765" title="CVE-2025-39765" />
			<reference href="https://bdu.fstec.ru/vul/2025-15697" type="self" id="BDU:2025-15697" title="BDU:2025-15697" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0026</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39766-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39766-8.0/" type="self" id="ROS-20260408-80-0026" title="ROS-20260408-80-0026" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39766" type="cve" id="CVE-2025-39766" title="CVE-2025-39766" />
			<reference href="https://bdu.fstec.ru/vul/2025-15696" type="self" id="BDU:2025-15696" title="BDU:2025-15696" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0027</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39770-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39770-8.0/" type="self" id="ROS-20260408-80-0027" title="ROS-20260408-80-0027" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39770" type="cve" id="CVE-2025-39770" title="CVE-2025-39770" />
			<reference href="https://bdu.fstec.ru/vul/2025-15830" type="self" id="BDU:2025-15830" title="BDU:2025-15830" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0028</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39772-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39772-8.0/" type="self" id="ROS-20260408-80-0028" title="ROS-20260408-80-0028" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39772" type="cve" id="CVE-2025-39772" title="CVE-2025-39772" />
			<reference href="https://bdu.fstec.ru/vul/2025-15695" type="self" id="BDU:2025-15695" title="BDU:2025-15695" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0029</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39773-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39773-8.0/" type="self" id="ROS-20260408-80-0029" title="ROS-20260408-80-0029" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39773" type="cve" id="CVE-2025-39773" title="CVE-2025-39773" />
			<reference href="https://bdu.fstec.ru/vul/2025-15694" type="self" id="BDU:2025-15694" title="BDU:2025-15694" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0030</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39776-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39776-8.0/" type="self" id="ROS-20260408-80-0030" title="ROS-20260408-80-0030" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39776" type="cve" id="CVE-2025-39776" title="CVE-2025-39776" />
			<reference href="https://bdu.fstec.ru/vul/2025-15693" type="self" id="BDU:2025-15693" title="BDU:2025-15693" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0031</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39780-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39780-8.0/" type="self" id="ROS-20260408-80-0031" title="ROS-20260408-80-0031" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39780" type="cve" id="CVE-2025-39780" title="CVE-2025-39780" />
			<reference href="https://bdu.fstec.ru/vul/2025-15214" type="self" id="BDU:2025-15214" title="BDU:2025-15214" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0032</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39782-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39782-8.0/" type="self" id="ROS-20260408-80-0032" title="ROS-20260408-80-0032" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39782" type="cve" id="CVE-2025-39782" title="CVE-2025-39782" />
			<reference href="https://bdu.fstec.ru/vul/2025-15220" type="self" id="BDU:2025-15220" title="BDU:2025-15220" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0033</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39783-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39783-8.0/" type="self" id="ROS-20260408-80-0033" title="ROS-20260408-80-0033" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39783" type="cve" id="CVE-2025-39783" title="CVE-2025-39783" />
			<reference href="https://bdu.fstec.ru/vul/2025-15223" type="self" id="BDU:2025-15223" title="BDU:2025-15223" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0034</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39787-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39787-8.0/" type="self" id="ROS-20260408-80-0034" title="ROS-20260408-80-0034" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39787" type="cve" id="CVE-2025-39787" title="CVE-2025-39787" />
			<reference href="https://bdu.fstec.ru/vul/2025-15226" type="self" id="BDU:2025-15226" title="BDU:2025-15226" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0035</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39788-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39788-8.0/" type="self" id="ROS-20260408-80-0035" title="ROS-20260408-80-0035" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39788" type="cve" id="CVE-2025-39788" title="CVE-2025-39788" />
			<reference href="https://bdu.fstec.ru/vul/2025-15692" type="self" id="BDU:2025-15692" title="BDU:2025-15692" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0036</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39790-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39790-8.0/" type="self" id="ROS-20260408-80-0036" title="ROS-20260408-80-0036" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39790" type="cve" id="CVE-2025-39790" title="CVE-2025-39790" />
			<reference href="https://bdu.fstec.ru/vul/2025-15690" type="self" id="BDU:2025-15690" title="BDU:2025-15690" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0037</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39791-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39791-8.0/" type="self" id="ROS-20260408-80-0037" title="ROS-20260408-80-0037" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39791" type="cve" id="CVE-2025-39791" title="CVE-2025-39791" />
			<reference href="https://bdu.fstec.ru/vul/2025-14996" type="self" id="BDU:2025-14996" title="BDU:2025-14996" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0038</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39792-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39792-8.0/" type="self" id="ROS-20260408-80-0038" title="ROS-20260408-80-0038" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39792" type="cve" id="CVE-2025-39792" title="CVE-2025-39792" />
			<reference href="https://bdu.fstec.ru/vul/2025-14985" type="self" id="BDU:2025-14985" title="BDU:2025-14985" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0039</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39794-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39794-8.0/" type="self" id="ROS-20260408-80-0039" title="ROS-20260408-80-0039" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39794" type="cve" id="CVE-2025-39794" title="CVE-2025-39794" />
			<reference href="https://bdu.fstec.ru/vul/2025-16059" type="self" id="BDU:2025-16059" title="BDU:2025-16059" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0040</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39795-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39795-8.0/" type="self" id="ROS-20260408-80-0040" title="ROS-20260408-80-0040" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39795" type="cve" id="CVE-2025-39795" title="CVE-2025-39795" />
			<reference href="https://bdu.fstec.ru/vul/2025-15240" type="self" id="BDU:2025-15240" title="BDU:2025-15240" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0041</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39798-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39798-8.0/" type="self" id="ROS-20260408-80-0041" title="ROS-20260408-80-0041" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39798" type="cve" id="CVE-2025-39798" title="CVE-2025-39798" />
			<reference href="https://bdu.fstec.ru/vul/2025-15688" type="self" id="BDU:2025-15688" title="BDU:2025-15688" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0042</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39800-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39800-8.0/" type="self" id="ROS-20260408-80-0042" title="ROS-20260408-80-0042" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39800" type="cve" id="CVE-2025-39800" title="CVE-2025-39800" />
			<reference href="https://bdu.fstec.ru/vul/2025-15248" type="self" id="BDU:2025-15248" title="BDU:2025-15248" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260408-80-0043</id>
		<issued date="2026-04-08" />
		<updated date="2026-04-08" />
		<title>Уязвимость kernel-lt </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в kernel-lt</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39801-8.0/</description>
               <solution>Установить обновление для пакета(ов) kernel-lt
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-kernel-lt-cve-2025-39801-8.0/" type="self" id="ROS-20260408-80-0043" title="ROS-20260408-80-0043" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39801" type="cve" id="CVE-2025-39801" title="CVE-2025-39801" />
			<reference href="https://bdu.fstec.ru/vul/2025-15687" type="self" id="BDU:2025-15687" title="BDU:2025-15687" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="x86_64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="kernel-lt" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-debug-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-debug-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-devel" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-devel-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
				<package name="kernel-lt-headers" epoch="0" version="6.12.56" release="1.red80" arch="aarch64" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-headers-0:6.12.56-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="kernel-lt-doc" epoch="0" version="6.12.56" release="1.red80" arch="noarch" src="kernel-lt-6.12.56-1.red80.src.rpm">
					<filename>kernel-lt-doc-0:6.12.56-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-80-0001</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость chromium </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в chromium</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0903-8.0/</description>
               <solution>Установить обновление для пакета(ов) chromium
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-chromium-cve-2026-0903-8.0/" type="self" id="ROS-20260410-80-0001" title="ROS-20260410-80-0001" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0903" type="cve" id="CVE-2026-0903" title="CVE-2026-0903" />
			<reference href="https://bdu.fstec.ru/vul/2026-00461" type="self" id="BDU:2026-00461" title="BDU:2026-00461" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="x86_64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="chromedriver" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromedriver-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
				<package name="chromium-common" epoch="0" version="144.0.7559.109" release="1.red80" arch="aarch64" src="chromium-144.0.7559.109-1.red80.src.rpm">
					<filename>chromium-common-0:144.0.7559.109-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-80-0002</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость mysql-connector-python </title>
		<rights>Red Soft</rights>
		<severity>High</severity>
		<summary>Уязвимости в mysql-connector-python</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mysql-connector-python-cve-2024-21272-8.0/</description>
               <solution>Установить обновление для пакета(ов) mysql-connector-python
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-mysql-connector-python-cve-2024-21272-8.0/" type="self" id="ROS-20260410-80-0002" title="ROS-20260410-80-0002" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21272" type="cve" id="CVE-2024-21272" title="CVE-2024-21272" />
			<reference href="https://bdu.fstec.ru/vul/2024-08608" type="self" id="BDU:2024-08608" title="BDU:2024-08608" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="mysql-connector-python3" epoch="0" version="9.6.0" release="2.red80" arch="x86_64" src="mysql-connector-python-9.6.0-2.red80.src.rpm">
					<filename>mysql-connector-python3-0:9.6.0-2.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="mysql-connector-python3" epoch="0" version="9.6.0" release="2.red80" arch="aarch64" src="mysql-connector-python-9.6.0-2.red80.src.rpm">
					<filename>mysql-connector-python3-0:9.6.0-2.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-80-0003</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость xrdp </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в xrdp</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-xrdp-cve-2025-68670-8.0/</description>
               <solution>Установить обновление для пакета(ов) xrdp
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-xrdp-cve-2025-68670-8.0/" type="self" id="ROS-20260410-80-0003" title="ROS-20260410-80-0003" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68670" type="cve" id="CVE-2025-68670" title="CVE-2025-68670" />
			<reference href="https://bdu.fstec.ru/vul/2026-00962" type="self" id="BDU:2026-00962" title="BDU:2026-00962" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="xrdp" epoch="1" version="0.10.4.1" release="4.red80" arch="x86_64" src="xrdp-0.10.4.1-4.red80.src.rpm">
					<filename>xrdp-1:0.10.4.1-4.red80.x86_64.rpm</filename>
				</package>
				<package name="xrdp-devel" epoch="1" version="0.10.4.1" release="4.red80" arch="x86_64" src="xrdp-0.10.4.1-4.red80.src.rpm">
					<filename>xrdp-devel-1:0.10.4.1-4.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="xrdp" epoch="1" version="0.10.4.1" release="4.red80" arch="aarch64" src="xrdp-0.10.4.1-4.red80.src.rpm">
					<filename>xrdp-1:0.10.4.1-4.red80.aarch64.rpm</filename>
				</package>
				<package name="xrdp-devel" epoch="1" version="0.10.4.1" release="4.red80" arch="aarch64" src="xrdp-0.10.4.1-4.red80.src.rpm">
					<filename>xrdp-devel-1:0.10.4.1-4.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="xrdp-selinux" epoch="1" version="0.10.4.1" release="4.red80" arch="noarch" src="xrdp-0.10.4.1-4.red80.src.rpm">
					<filename>xrdp-selinux-1:0.10.4.1-4.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-80-0004</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость libssh </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libssh-cve-2026-3731-8.0/</description>
               <solution>Установить обновление для пакета(ов) libssh
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libssh-cve-2026-3731-8.0/" type="self" id="ROS-20260410-80-0004" title="ROS-20260410-80-0004" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3731" type="cve" id="CVE-2026-3731" title="CVE-2026-3731" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libssh" epoch="0" version="0.11.4" release="1.red80" arch="x86_64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-0:0.11.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libssh-devel" epoch="0" version="0.11.4" release="1.red80" arch="x86_64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-devel-0:0.11.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libssh" epoch="0" version="0.11.4" release="1.red80" arch="aarch64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-0:0.11.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libssh-devel" epoch="0" version="0.11.4" release="1.red80" arch="aarch64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-devel-0:0.11.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libssh-config" epoch="0" version="0.11.4" release="1.red80" arch="noarch" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-config-0:0.11.4-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-80-0005</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость libssh </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libssh-cve-2026-0964-8.0/</description>
               <solution>Установить обновление для пакета(ов) libssh
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libssh-cve-2026-0964-8.0/" type="self" id="ROS-20260410-80-0005" title="ROS-20260410-80-0005" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0964" type="cve" id="CVE-2026-0964" title="CVE-2026-0964" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libssh" epoch="0" version="0.11.4" release="1.red80" arch="x86_64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-0:0.11.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libssh-devel" epoch="0" version="0.11.4" release="1.red80" arch="x86_64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-devel-0:0.11.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libssh" epoch="0" version="0.11.4" release="1.red80" arch="aarch64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-0:0.11.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libssh-devel" epoch="0" version="0.11.4" release="1.red80" arch="aarch64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-devel-0:0.11.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libssh-config" epoch="0" version="0.11.4" release="1.red80" arch="noarch" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-config-0:0.11.4-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-80-0006</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость libssh </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libssh-cve-2026-0965-8.0/</description>
               <solution>Установить обновление для пакета(ов) libssh
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libssh-cve-2026-0965-8.0/" type="self" id="ROS-20260410-80-0006" title="ROS-20260410-80-0006" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0965" type="cve" id="CVE-2026-0965" title="CVE-2026-0965" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libssh" epoch="0" version="0.11.4" release="1.red80" arch="x86_64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-0:0.11.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libssh-devel" epoch="0" version="0.11.4" release="1.red80" arch="x86_64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-devel-0:0.11.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libssh" epoch="0" version="0.11.4" release="1.red80" arch="aarch64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-0:0.11.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libssh-devel" epoch="0" version="0.11.4" release="1.red80" arch="aarch64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-devel-0:0.11.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libssh-config" epoch="0" version="0.11.4" release="1.red80" arch="noarch" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-config-0:0.11.4-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-80-0007</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость libssh </title>
		<rights>Red Soft</rights>
		<severity>None</severity>
		<summary>Уязвимости в libssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libssh-cve-2026-0966-8.0/</description>
               <solution>Установить обновление для пакета(ов) libssh
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libssh-cve-2026-0966-8.0/" type="self" id="ROS-20260410-80-0007" title="ROS-20260410-80-0007" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0966" type="cve" id="CVE-2026-0966" title="CVE-2026-0966" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libssh" epoch="0" version="0.11.4" release="1.red80" arch="x86_64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-0:0.11.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libssh-devel" epoch="0" version="0.11.4" release="1.red80" arch="x86_64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-devel-0:0.11.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libssh" epoch="0" version="0.11.4" release="1.red80" arch="aarch64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-0:0.11.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libssh-devel" epoch="0" version="0.11.4" release="1.red80" arch="aarch64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-devel-0:0.11.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libssh-config" epoch="0" version="0.11.4" release="1.red80" arch="noarch" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-config-0:0.11.4-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-80-0008</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость libssh </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в libssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libssh-cve-2026-0967-8.0/</description>
               <solution>Установить обновление для пакета(ов) libssh
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libssh-cve-2026-0967-8.0/" type="self" id="ROS-20260410-80-0008" title="ROS-20260410-80-0008" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0967" type="cve" id="CVE-2026-0967" title="CVE-2026-0967" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libssh" epoch="0" version="0.11.4" release="1.red80" arch="x86_64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-0:0.11.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libssh-devel" epoch="0" version="0.11.4" release="1.red80" arch="x86_64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-devel-0:0.11.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libssh" epoch="0" version="0.11.4" release="1.red80" arch="aarch64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-0:0.11.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libssh-devel" epoch="0" version="0.11.4" release="1.red80" arch="aarch64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-devel-0:0.11.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libssh-config" epoch="0" version="0.11.4" release="1.red80" arch="noarch" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-config-0:0.11.4-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-80-0009</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость libssh </title>
		<rights>Red Soft</rights>
		<severity>Critical</severity>
		<summary>Уязвимости в libssh</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libssh-cve-2026-0968-8.0/</description>
               <solution>Установить обновление для пакета(ов) libssh
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-libssh-cve-2026-0968-8.0/" type="self" id="ROS-20260410-80-0009" title="ROS-20260410-80-0009" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0968" type="cve" id="CVE-2026-0968" title="CVE-2026-0968" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="libssh" epoch="0" version="0.11.4" release="1.red80" arch="x86_64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-0:0.11.4-1.red80.x86_64.rpm</filename>
				</package>
				<package name="libssh-devel" epoch="0" version="0.11.4" release="1.red80" arch="x86_64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-devel-0:0.11.4-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="libssh" epoch="0" version="0.11.4" release="1.red80" arch="aarch64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-0:0.11.4-1.red80.aarch64.rpm</filename>
				</package>
				<package name="libssh-devel" epoch="0" version="0.11.4" release="1.red80" arch="aarch64" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-devel-0:0.11.4-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
			<collection short="noarch">
				<name>noarch</name>
				<package name="libssh-config" epoch="0" version="0.11.4" release="1.red80" arch="noarch" src="libssh-0.11.4-1.red80.src.rpm">
					<filename>libssh-config-0:0.11.4-1.red80.noarch.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-80-0010</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-curl-cve-2025-14017-8.0/</description>
               <solution>Установить обновление для пакета(ов) curl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-curl-cve-2025-14017-8.0/" type="self" id="ROS-20260410-80-0010" title="ROS-20260410-80-0010" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14017" type="cve" id="CVE-2025-14017" title="CVE-2025-14017" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="curl" epoch="0" version="8.0.1" release="18.red80" arch="x86_64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>curl-0:8.0.1-18.red80.x86_64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="8.0.1" release="18.red80" arch="x86_64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>libcurl-0:8.0.1-18.red80.x86_64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="8.0.1" release="18.red80" arch="x86_64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>libcurl-devel-0:8.0.1-18.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="curl" epoch="0" version="8.0.1" release="18.red80" arch="aarch64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>curl-0:8.0.1-18.red80.aarch64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="8.0.1" release="18.red80" arch="aarch64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>libcurl-0:8.0.1-18.red80.aarch64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="8.0.1" release="18.red80" arch="aarch64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>libcurl-devel-0:8.0.1-18.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-80-0011</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-curl-cve-2026-3783-8.0/</description>
               <solution>Установить обновление для пакета(ов) curl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-curl-cve-2026-3783-8.0/" type="self" id="ROS-20260410-80-0011" title="ROS-20260410-80-0011" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3783" type="cve" id="CVE-2026-3783" title="CVE-2026-3783" />
			<reference href="https://bdu.fstec.ru/vul/2026-04361" type="self" id="BDU:2026-04361" title="BDU:2026-04361" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="curl" epoch="0" version="8.0.1" release="18.red80" arch="x86_64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>curl-0:8.0.1-18.red80.x86_64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="8.0.1" release="18.red80" arch="x86_64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>libcurl-0:8.0.1-18.red80.x86_64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="8.0.1" release="18.red80" arch="x86_64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>libcurl-devel-0:8.0.1-18.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="curl" epoch="0" version="8.0.1" release="18.red80" arch="aarch64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>curl-0:8.0.1-18.red80.aarch64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="8.0.1" release="18.red80" arch="aarch64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>libcurl-0:8.0.1-18.red80.aarch64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="8.0.1" release="18.red80" arch="aarch64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>libcurl-devel-0:8.0.1-18.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-80-0012</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-curl-cve-2026-3784-8.0/</description>
               <solution>Установить обновление для пакета(ов) curl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-curl-cve-2026-3784-8.0/" type="self" id="ROS-20260410-80-0012" title="ROS-20260410-80-0012" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3784" type="cve" id="CVE-2026-3784" title="CVE-2026-3784" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="curl" epoch="0" version="8.0.1" release="18.red80" arch="x86_64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>curl-0:8.0.1-18.red80.x86_64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="8.0.1" release="18.red80" arch="x86_64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>libcurl-0:8.0.1-18.red80.x86_64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="8.0.1" release="18.red80" arch="x86_64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>libcurl-devel-0:8.0.1-18.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="curl" epoch="0" version="8.0.1" release="18.red80" arch="aarch64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>curl-0:8.0.1-18.red80.aarch64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="8.0.1" release="18.red80" arch="aarch64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>libcurl-0:8.0.1-18.red80.aarch64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="8.0.1" release="18.red80" arch="aarch64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>libcurl-devel-0:8.0.1-18.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-80-0013</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость curl </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в curl</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-curl-cve-2026-1965-8.0/</description>
               <solution>Установить обновление для пакета(ов) curl
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-curl-cve-2026-1965-8.0/" type="self" id="ROS-20260410-80-0013" title="ROS-20260410-80-0013" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1965" type="cve" id="CVE-2026-1965" title="CVE-2026-1965" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="curl" epoch="0" version="8.0.1" release="18.red80" arch="x86_64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>curl-0:8.0.1-18.red80.x86_64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="8.0.1" release="18.red80" arch="x86_64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>libcurl-0:8.0.1-18.red80.x86_64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="8.0.1" release="18.red80" arch="x86_64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>libcurl-devel-0:8.0.1-18.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="curl" epoch="0" version="8.0.1" release="18.red80" arch="aarch64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>curl-0:8.0.1-18.red80.aarch64.rpm</filename>
				</package>
				<package name="libcurl" epoch="0" version="8.0.1" release="18.red80" arch="aarch64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>libcurl-0:8.0.1-18.red80.aarch64.rpm</filename>
				</package>
				<package name="libcurl-devel" epoch="0" version="8.0.1" release="18.red80" arch="aarch64" src="curl-8.0.1-18.red80.src.rpm">
					<filename>libcurl-devel-0:8.0.1-18.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-80-0014</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-expat-cve-2026-32776-8.0/</description>
               <solution>Установить обновление для пакета(ов) expat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-expat-cve-2026-32776-8.0/" type="self" id="ROS-20260410-80-0014" title="ROS-20260410-80-0014" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32776" type="cve" id="CVE-2026-32776" title="CVE-2026-32776" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="expat" epoch="0" version="2.7.5" release="1.red80" arch="x86_64" src="expat-2.7.5-1.red80.src.rpm">
					<filename>expat-0:2.7.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="expat-devel" epoch="0" version="2.7.5" release="1.red80" arch="x86_64" src="expat-2.7.5-1.red80.src.rpm">
					<filename>expat-devel-0:2.7.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="expat-static" epoch="0" version="2.7.5" release="1.red80" arch="x86_64" src="expat-2.7.5-1.red80.src.rpm">
					<filename>expat-static-0:2.7.5-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="expat" epoch="0" version="2.7.5" release="1.red80" arch="aarch64" src="expat-2.7.5-1.red80.src.rpm">
					<filename>expat-0:2.7.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="expat-devel" epoch="0" version="2.7.5" release="1.red80" arch="aarch64" src="expat-2.7.5-1.red80.src.rpm">
					<filename>expat-devel-0:2.7.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="expat-static" epoch="0" version="2.7.5" release="1.red80" arch="aarch64" src="expat-2.7.5-1.red80.src.rpm">
					<filename>expat-static-0:2.7.5-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-80-0015</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-expat-cve-2026-32777-8.0/</description>
               <solution>Установить обновление для пакета(ов) expat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-expat-cve-2026-32777-8.0/" type="self" id="ROS-20260410-80-0015" title="ROS-20260410-80-0015" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32777" type="cve" id="CVE-2026-32777" title="CVE-2026-32777" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="expat" epoch="0" version="2.7.5" release="1.red80" arch="x86_64" src="expat-2.7.5-1.red80.src.rpm">
					<filename>expat-0:2.7.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="expat-devel" epoch="0" version="2.7.5" release="1.red80" arch="x86_64" src="expat-2.7.5-1.red80.src.rpm">
					<filename>expat-devel-0:2.7.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="expat-static" epoch="0" version="2.7.5" release="1.red80" arch="x86_64" src="expat-2.7.5-1.red80.src.rpm">
					<filename>expat-static-0:2.7.5-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="expat" epoch="0" version="2.7.5" release="1.red80" arch="aarch64" src="expat-2.7.5-1.red80.src.rpm">
					<filename>expat-0:2.7.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="expat-devel" epoch="0" version="2.7.5" release="1.red80" arch="aarch64" src="expat-2.7.5-1.red80.src.rpm">
					<filename>expat-devel-0:2.7.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="expat-static" epoch="0" version="2.7.5" release="1.red80" arch="aarch64" src="expat-2.7.5-1.red80.src.rpm">
					<filename>expat-static-0:2.7.5-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
	<update status="final" from="redos@red-soft.ru" version="1" type="security">
		<id>ROS-20260410-80-0016</id>
		<issued date="2026-04-10" />
		<updated date="2026-04-10" />
		<title>Уязвимость expat </title>
		<rights>Red Soft</rights>
		<severity>Medium</severity>
		<summary>Уязвимости в expat</summary>
		<description>Подробная информация доступна по ссылке: https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-expat-cve-2026-32778-8.0/</description>
               <solution>Установить обновление для пакета(ов) expat
Использовать рекомендации Банка данных угроз безопасности информации ФСТЭК России</solution>
		<references>
			<reference href="https://redos.red-soft.ru/support/secure/uyazvimosti-red-os-8-0/uyazvimost-expat-cve-2026-32778-8.0/" type="self" id="ROS-20260410-80-0016" title="ROS-20260410-80-0016" />
			<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32778" type="cve" id="CVE-2026-32778" title="CVE-2026-32778" />
		</references>
		<pkglist>
			<collection short="x86_64">
				<name>x86_64</name>
				<package name="expat" epoch="0" version="2.7.5" release="1.red80" arch="x86_64" src="expat-2.7.5-1.red80.src.rpm">
					<filename>expat-0:2.7.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="expat-devel" epoch="0" version="2.7.5" release="1.red80" arch="x86_64" src="expat-2.7.5-1.red80.src.rpm">
					<filename>expat-devel-0:2.7.5-1.red80.x86_64.rpm</filename>
				</package>
				<package name="expat-static" epoch="0" version="2.7.5" release="1.red80" arch="x86_64" src="expat-2.7.5-1.red80.src.rpm">
					<filename>expat-static-0:2.7.5-1.red80.x86_64.rpm</filename>
				</package>
			</collection>
			<collection short="aarch64">
				<name>aarch64</name>
				<package name="expat" epoch="0" version="2.7.5" release="1.red80" arch="aarch64" src="expat-2.7.5-1.red80.src.rpm">
					<filename>expat-0:2.7.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="expat-devel" epoch="0" version="2.7.5" release="1.red80" arch="aarch64" src="expat-2.7.5-1.red80.src.rpm">
					<filename>expat-devel-0:2.7.5-1.red80.aarch64.rpm</filename>
				</package>
				<package name="expat-static" epoch="0" version="2.7.5" release="1.red80" arch="aarch64" src="expat-2.7.5-1.red80.src.rpm">
					<filename>expat-static-0:2.7.5-1.red80.aarch64.rpm</filename>
				</package>
			</collection>
		</pkglist>
	</update>
</updates>
