RHEL 10 / 8 / 9 : java-21-openjdk (RHSA-2025:10873)

high Nessus Plugin ID 242209

Synopsis

The remote Red Hat host is missing one or more security updates for java-21-openjdk.

Description

The remote Redhat Enterprise Linux 10 / 8 / 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2025:10873 advisory.

The OpenJDK 21 packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit.

Security Fix(es):

* JDK: Better Glyph drawing (CVE-2025-30749)
* JDK: Enhance TLS protocol support (CVE-2025-30754)
* JDK: Improve HTTP client header handling (CVE-2025-50059)
* JDK: Better Glyph drawing redux (CVE-2025-50106)

Bug Fix(es):

* In Red Hat Enterprise Linux 9 and Red Hat Enterprise Linux 10 systems, the default graphical display system is Wayland. The use of Wayland in these systems causes a failure in the traditional X11 method that java.awt.Robot uses to take a screen capture, producing a blank image. With this update, the RPM now recommends installing the PipeWire package, which the JDK can use to take screen captures in Wayland systems (RHEL-102683, RHEL-102684, RHEL-102685)
* On NUMA systems, the operating system can choose to migrate a task from one NUMA node to another. In the G1 garbage collector, G1AllocRegion objects are associated with NUMA nodes. The G1Allocator code assumes that obtaining the G1AllocRegion object for the current thread is sufficient, but OS scheduling can lead to arbitrary changes in the NUMA-to-thread association. This can cause crashes when the G1AllocRegion being used changes mid-operation. This update resolves this issue by always using the same NUMA node and associated G1AllocRegion object throughout an operation. (RHEL-90307, RHEL-90308, RHEL-90311)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL java-21-openjdk package based on the guidance in RHSA-2025:10873.

See Also

https://access.redhat.com/security/updates/classification/#important

http://www.nessus.org/u?cd531471

https://access.redhat.com/errata/RHSA-2025:10873

Plugin Details

Severity: High

ID: 242209

File Name: redhat-RHSA-2025-10873.nasl

Version: 1.1

Type: local

Agent: unix

Published: 7/16/2025

Updated: 7/16/2025

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-50106

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-fastdebug, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-devel, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-static-libs, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-jmods-slowdebug, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-src-fastdebug, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-headless, cpe:/o:redhat:enterprise_linux:9, cpe:/o:redhat:rhel_eus:8.10, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-demo, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-devel-fastdebug, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-jmods, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-demo-slowdebug, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-devel-slowdebug, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-headless-fastdebug, cpe:/o:redhat:rhel_eus:9.6, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-headless-slowdebug, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-demo-fastdebug, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-jmods-fastdebug, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-static-libs-fastdebug, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-src, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-src-slowdebug, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-static-libs-slowdebug, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-javadoc, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk, cpe:/o:redhat:rhel_eus:9.4, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-javadoc-zip, cpe:/o:redhat:enterprise_linux:10.0, p-cpe:/a:redhat:enterprise_linux:java-21-openjdk-slowdebug

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 7/16/2025

Vulnerability Publication Date: 7/15/2025

Reference Information

CVE: CVE-2025-30749, CVE-2025-30754, CVE-2025-50059, CVE-2025-50106

CWE: 122, 201, 325

RHSA: 2025:10873