MiracleLinux 9 : java-21-openjdk-21.0.8.0.9-1.el9.ML.1 (AXSA:2025-10689:14)

high Nessus Plugin ID 283131

Synopsis

The remote MiracleLinux host is missing one or more security updates.

Description

The remote MiracleLinux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the AXSA:2025-10689:14 advisory.

JDK: Better Glyph drawing (CVE-2025-30749) JDK: Enhance TLS protocol support (CVE-2025-30754) JDK: Improve HTTP client header handling (CVE-2025-50059) JDK: Better Glyph drawing redux (CVE-2025-50106) Bug Fix(es):
In Red Hat Enterprise Linux 9 and Red Hat Enterprise Linux 10 systems, the default graphical display system is Wayland. The use of Wayland in these systems causes a failure in the traditional X11 method that java.awt.Robot uses to take a screen capture, producing a blank image. With this update, the RPM now recommends installing the PipeWire package, which the JDK can use to take screen captures in Wayland systems (RHEL-102683, RHEL-102684, RHEL-102685) On NUMA systems, the operating system can choose to migrate a task from one NUMA node to another. In the G1 garbage collector, G1AllocRegion objects are associated with NUMA nodes. The G1Allocator code assumes that obtaining the G1AllocRegion object for the current thread is sufficient, but OS scheduling can lead to arbitrary changes in the NUMA-to-thread association. This can cause crashes when the G1AllocRegion being used changes mid-operation. This update resolves this issue by always using the same NUMA node and associated G1AllocRegion object throughout an operation. (RHEL-90307, RHEL-90308, RHEL-90311) CVE(s):
CVE-2025-30749 CVE-2025-30754 CVE-2025-50059 CVE-2025-50106

Tenable has extracted the preceding description block directly from the MiracleLinux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://tsn.miraclelinux.com/en/node/21873

Plugin Details

Severity: High

ID: 283131

File Name: miracle_linux_AXSA-2025-10689.nasl

Version: 1.1

Type: local

Published: 1/13/2026

Updated: 1/13/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

Vendor

Vendor Severity: High

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-50106

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:miracle:linux:java-21-openjdk-src-fastdebug, p-cpe:/a:miracle:linux:java-21-openjdk-src, p-cpe:/a:miracle:linux:java-21-openjdk-headless, p-cpe:/a:miracle:linux:java-21-openjdk-demo-slowdebug, p-cpe:/a:miracle:linux:java-21-openjdk-javadoc, p-cpe:/a:miracle:linux:java-21-openjdk-devel-slowdebug, p-cpe:/a:miracle:linux:java-21-openjdk-slowdebug, p-cpe:/a:miracle:linux:java-21-openjdk-static-libs-slowdebug, p-cpe:/a:miracle:linux:java-21-openjdk-headless-slowdebug, p-cpe:/a:miracle:linux:java-21-openjdk-devel, p-cpe:/a:miracle:linux:java-21-openjdk-fastdebug, p-cpe:/a:miracle:linux:java-21-openjdk-headless-fastdebug, p-cpe:/a:miracle:linux:java-21-openjdk-static-libs-fastdebug, p-cpe:/a:miracle:linux:java-21-openjdk, p-cpe:/a:miracle:linux:java-21-openjdk-devel-fastdebug, p-cpe:/a:miracle:linux:java-21-openjdk-src-slowdebug, cpe:/o:miracle:linux:9, p-cpe:/a:miracle:linux:java-21-openjdk-javadoc-zip, p-cpe:/a:miracle:linux:java-21-openjdk-jmods-slowdebug, p-cpe:/a:miracle:linux:java-21-openjdk-demo-fastdebug, p-cpe:/a:miracle:linux:java-21-openjdk-demo, p-cpe:/a:miracle:linux:java-21-openjdk-jmods-fastdebug, p-cpe:/a:miracle:linux:java-21-openjdk-static-libs, p-cpe:/a:miracle:linux:java-21-openjdk-jmods

Required KB Items: Host/local_checks_enabled, Host/MiracleLinux/release, Host/MiracleLinux/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 8/4/2025

Vulnerability Publication Date: 7/15/2025

Reference Information

CVE: CVE-2025-30749, CVE-2025-30754, CVE-2025-50059, CVE-2025-50106