Synopsis
The remote Debian host is missing one or more security-related updates.
Description
The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-4251 advisory.
------------------------------------------------------------------------- Debian LTS Advisory DLA-4251-1 [email protected] https://www.debian.org/lts/security/ Guilhem Moulin July 26, 2025 https://wiki.debian.org/LTS
-------------------------------------------------------------------------
Package : libxml2 Version : 2.9.10+dfsg-6.7+deb11u8 CVE ID : CVE-2024-34459 CVE-2025-6021 CVE-2025-6170 CVE-2025-49794 CVE-2025-49796 Debian Bug : 1071162 1107720 1107755 1107938
Multiple security issues were found in libxml2, the GNOME XML library, which could yield to denial of service or potentially arbitrary code execution.
CVE-2024-34459
Zhineng Zhong discovered that formatting error messages with `xmllint
--htmlout` could result in a buffer over-read.
CVE-2025-6021
Ahmed Lekssays discovered an integer overflow issue in `xmlBuildQName()` which could result in memory corruption or a denial of service when processing crafted input.
CVE-2025-6170
Ahmed Lekssays discovered a stack-based buffer overflow issue in the command-parsing logic of the interactive shell in xmllint.
CVE-2025-49794
Nikita Sveshnikov discovered a heap use-after-free issue in the schematron. When processing XPath expressions in Schematron schema elements `<sch:name path=/>`, a pointer to freed memory is returned and then accessed, leading to undefined behavior or potential crashes.
CVE-2025-49796
Nikita Sveshnikov discovered a type confusion issue in the schematron. Processing `sch:name` elements and accessing namespace information may lead to leading to memory corruption or undefined behavior.
For Debian 11 bullseye, these problems have been fixed in version 2.9.10+dfsg-6.7+deb11u8.
We recommend that you upgrade your libxml2 packages.
For the detailed security status of libxml2 please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/libxml2
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS Attachment:
signature.asc Description: PGP signature
Tenable has extracted the preceding description block directly from the Debian security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Upgrade the libxml2 packages.
Plugin Details
File Name: debian_DLA-4251.nasl
Agent: unix
Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:L/AC:H/Au:N/C:N/I:N/A:P
Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Vulnerability Information
CPE: cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:libxml2, p-cpe:/a:debian:debian_linux:libxml2-dev, p-cpe:/a:debian:debian_linux:libxml2-doc, p-cpe:/a:debian:debian_linux:libxml2-utils, p-cpe:/a:debian:debian_linux:python3-libxml2, p-cpe:/a:debian:debian_linux:python3-libxml2-dbg
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Ease: No known exploits are available
Patch Publication Date: 7/26/2025
Vulnerability Publication Date: 12/12/2023