[フレーム]
Oracle Linux Security Advisory ELSA-2025-22376
https://linux.oracle.com/errata/ELSA-2025-22376.html
The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:
x86_64:
libxml2-2.9.13-14.el9_7.i686.rpm
libxml2-2.9.13-14.el9_7.x86_64.rpm
libxml2-devel-2.9.13-14.el9_7.i686.rpm
libxml2-devel-2.9.13-14.el9_7.x86_64.rpm
python3-libxml2-2.9.13-14.el9_7.x86_64.rpm
aarch64:
libxml2-2.9.13-14.el9_7.aarch64.rpm
libxml2-devel-2.9.13-14.el9_7.aarch64.rpm
python3-libxml2-2.9.13-14.el9_7.aarch64.rpm
SRPMS:
https://oss.oracle.com/ol9/SRPMS-updates/libxml2-2.9.13-14.el9_7.src.rpm
Related CVEs:
CVE-2025-9714
Description of changes:
[2.9.13-14]
- Rebuilt for the correct target in RHEL (9.7-z) (RHEL-119283)
[2.9.13-13]
- Fix CVE-2025-9714 (RHEL-119283)
_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle Linux 9 Security Advisory ELSA-2025-22376 for libxml2 CVE-2025-9714

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

Summary

[2.9.13-14] - Rebuilt for the correct target in RHEL (9.7-z) (RHEL-119283) [2.9.13-13] - Fix CVE-2025-9714 (RHEL-119283)

SRPMs

https://oss.oracle.com/ol9/SRPMS-updates/libxml2-2.9.13-14.el9_7.src.rpm

x86_64

libxml2-2.9.13-14.el9_7.i686.rpm libxml2-2.9.13-14.el9_7.x86_64.rpm libxml2-devel-2.9.13-14.el9_7.i686.rpm libxml2-devel-2.9.13-14.el9_7.x86_64.rpm python3-libxml2-2.9.13-14.el9_7.x86_64.rpm

aarch64

libxml2-2.9.13-14.el9_7.aarch64.rpm libxml2-devel-2.9.13-14.el9_7.aarch64.rpm python3-libxml2-2.9.13-14.el9_7.aarch64.rpm

i386

Get the Latest News & Insights

Sign up to get the latest security news affecting Linux and open source delivered straight to your inbox

Please enable the javascript to submit this form

Related News

[画像:Exploring AI Predictive Cybersecurity Models for Linux Systems][画像:Exploring AI Predictive Cybersecurity Models for Linux Systems][画像:Exploring AI Predictive Cybersecurity Models for Linux Systems]
4 - 7 min read
It's always been a matter of responding to cybersecurity. Threats happen, defenses are made, attackers adjust their plans, and the cycle starts all
[画像:Linux Integrity Verification: SHA256 and GPG Checks Explained][画像:Linux Integrity Verification: SHA256 and GPG Checks Explained][画像:Linux Integrity Verification: SHA256 and GPG Checks Explained]
8 - 16 min read
Linux treats anything pulled from outside the system as untrusted until it is checked, and that expectation shapes how files move through real

Get the Latest News & Insights

Sign up to get the latest security news affecting Linux and open source delivered straight to your inbox.

Please enable the javascript to submit this form
© 2024 Guardian Digital, Inc All Rights Reserved
You are now being logged in using your Facebook credentials

AltStyle によって変換されたページ (->オリジナル) /