{"id":"RHSA-2025:8292","summary":"Red Hat Security Advisory: mingw-freetype and spice-client-win security update","modified":"2026-04-23T10:35:13.847565Z","published":"2025-05-29T10:03:34Z","upstream":["CVE-2025-27363","CVE-2025-32050","CVE-2025-32052","CVE-2025-32053","CVE-2025-32906","CVE-2025-32907","CVE-2025-32909","CVE-2025-32910","CVE-2025-32911","CVE-2025-32913"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:8292"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351357"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357067"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357069"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357070"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359341"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359342"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359353"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359354"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359355"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359357"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_8292.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-27363"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-27363"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-27363"},{"type":"ARTICLE","url":"https://www.facebook.com/security/advisories/cve-2025-27363"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-32050"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-32050"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-32050"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-32052"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-32052"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-32052"},{"type":"ARTICLE","url":"https://gitlab.gnome.org/GNOME/libsoup/-/issues/425"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-32053"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-32053"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-32053"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-32906"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-32906"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-32906"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-32907"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-32907"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-32907"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-32909"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-32909"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-32909"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-32910"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-32910"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-32910"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-32911"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-32911"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-32911"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-32913"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-32913"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-32913"}],"affected":[{"package":{"name":"spice-client-win","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/spice-client-win"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.10-1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:8292.json"}},{"package":{"name":"spice-client-win-x64","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/spice-client-win-x64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.10-1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:8292.json"}},{"package":{"name":"spice-client-win-x86","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/spice-client-win-x86"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.10-1.el8_10"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:8292.json"}},{"package":{"name":"mingw-freetype","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/mingw-freetype"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.8-3.el8_10.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:8292.json"}},{"package":{"name":"mingw32-freetype","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/mingw32-freetype"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.8-3.el8_10.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:8292.json"}},{"package":{"name":"mingw32-freetype-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/mingw32-freetype-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.8-3.el8_10.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:8292.json"}},{"package":{"name":"mingw32-freetype-static","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/mingw32-freetype-static"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.8-3.el8_10.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:8292.json"}},{"package":{"name":"mingw64-freetype","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/mingw64-freetype"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.8-3.el8_10.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:8292.json"}},{"package":{"name":"mingw64-freetype-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/mingw64-freetype-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.8-3.el8_10.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:8292.json"}},{"package":{"name":"mingw64-freetype-static","ecosystem":"Red Hat:enterprise_linux:8::crb","purl":"pkg:rpm/redhat/mingw64-freetype-static"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.8-3.el8_10.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:8292.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}]}