MiracleLinux 8 : mingw-freetype-2.8-3.el8_10.1 (AXSA:2025-9969:01)

high Nessus Plugin ID 282988

Synopsis

The remote MiracleLinux host is missing one or more security updates.

Description

The remote MiracleLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the AXSA:2025-9969:01 advisory.

freetype: OOB write when attempting to parse font subglyph structures related to TrueType GX and variable font files (CVE-2025-27363) libsoup: Integer overflow in append_param_quoted (CVE-2025-32050) libsoup: Heap buffer overflow in sniff_unknown() (CVE-2025-32052) libsoup: Heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space() (CVE-2025-32053) libsoup: Out of bounds reads in soup_headers_parse_request() (CVE-2025-32906) libsoup: Denial of service in server when client requests a large amount of overlapping ranges with Range header (CVE-2025-32907) libsoup: NULL Pointer Dereference on libsoup through function sniff_mp4 in soup-content-sniffer.c (CVE-2025-32909) libsoup: Null pointer deference on libsoup via /auth/soup-auth-digest.c through soup_auth_digest_authenticate on client when server omits the realm parameter in an Unauthorized response with Digest authentication (CVE-2025-32910) libsoup: Double free on soup_message_headers_get_content_disposition() through soup-message-headers.c via params GHashTable value (CVE-2025-32911) libsoup: NULL pointer dereference in soup_message_headers_get_content_disposition when filename parameter is present, but has no value in Content-Disposition header (CVE-2025-32913)

Tenable has extracted the preceding description block directly from the MiracleLinux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://tsn.miraclelinux.com/en/node/21153

Plugin Details

Severity: High

ID: 282988

File Name: miracle_linux_AXSA-2025-9969.nasl

Version: 1.1

Type: local

Published: 1/13/2026

Updated: 1/13/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.1

Vendor

Vendor Severity: High

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-27363

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:miracle:linux:8, p-cpe:/a:miracle:linux:mingw64-freetype-static, p-cpe:/a:miracle:linux:mingw32-freetype, p-cpe:/a:miracle:linux:mingw64-freetype, p-cpe:/a:miracle:linux:mingw32-freetype-static

Required KB Items: Host/local_checks_enabled, Host/MiracleLinux/release, Host/MiracleLinux/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/30/2025

Vulnerability Publication Date: 3/11/2025

Reference Information

CVE: CVE-2025-27363, CVE-2025-32050, CVE-2025-32052, CVE-2025-32053, CVE-2025-32906, CVE-2025-32907, CVE-2025-32909, CVE-2025-32910, CVE-2025-32911, CVE-2025-32913