Debian dsa-6068 : libxen-dev - security update

medium Nessus Plugin ID 277079

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 12 / 13 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-6068 advisory.

- ------------------------------------------------------------------------- Debian Security Advisory DSA-6068-1 [email protected] https://www.debian.org/security/ Moritz Muehlenhoff December 02, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : xen CVE ID : CVE-2024-28956 CVE-2024-36350 CVE-2024-36357 CVE-2025-27465 CVE-2025-27466 CVE-2025-58142 CVE-2025-58143 CVE-2025-58144 CVE-2025-58145 CVE-2025-58147 CVE-2025-58148 CVE-2025-58149 CVE-2025-1713

Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in memory disclosure, denial of service or privilege escalation.

For the oldstable distribution (bookworm), these problems have been fixed in version 4.17.5+72-g01140da4e8-1.

For the stable distribution (trixie), these problems have been fixed in version 4.20.2+7-g1badcf5035-0+deb13u1.

We recommend that you upgrade your xen packages.

For the detailed security status of xen please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/xen

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: [email protected]

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the libxen-dev packages.

See Also

https://security-tracker.debian.org/tracker/source-package/xen

https://security-tracker.debian.org/tracker/CVE-2024-28956

https://security-tracker.debian.org/tracker/CVE-2024-36350

https://security-tracker.debian.org/tracker/CVE-2024-36357

https://security-tracker.debian.org/tracker/CVE-2025-1713

https://security-tracker.debian.org/tracker/CVE-2025-27465

https://security-tracker.debian.org/tracker/CVE-2025-27466

https://security-tracker.debian.org/tracker/CVE-2025-58142

https://security-tracker.debian.org/tracker/CVE-2025-58143

https://security-tracker.debian.org/tracker/CVE-2025-58144

https://security-tracker.debian.org/tracker/CVE-2025-58145

https://security-tracker.debian.org/tracker/CVE-2025-58147

https://security-tracker.debian.org/tracker/CVE-2025-58148

https://security-tracker.debian.org/tracker/CVE-2025-58149

https://packages.debian.org/source/bookworm/xen

https://packages.debian.org/source/trixie/xen

Plugin Details

Severity: Medium

ID: 277079

File Name: debian_DSA-6068.nasl

Version: 1.1

Type: local

Agent: unix

Published: 12/2/2025

Updated: 12/2/2025

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-58143

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS v4

Risk Factor: Medium

Base Score: 5.7

Threat Score: 1.9

Threat Vector: CVSS:4.0/E:U

Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2024-28956

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:xen-hypervisor-4.17-arm64-dbg, p-cpe:/a:debian:debian_linux:xen-system-armhf, p-cpe:/a:debian:debian_linux:xen-utils-4.17-dbg, p-cpe:/a:debian:debian_linux:libxendevicemodel1, p-cpe:/a:debian:debian_linux:xen-hypervisor-common, p-cpe:/a:debian:debian_linux:xen-hypervisor-4.17-arm64, p-cpe:/a:debian:debian_linux:xen-hypervisor-4.20-arm64-dbg, p-cpe:/a:debian:debian_linux:xen-doc, p-cpe:/a:debian:debian_linux:xenstore-utils, p-cpe:/a:debian:debian_linux:libxencall1, p-cpe:/a:debian:debian_linux:libxenmisc4.20, p-cpe:/a:debian:debian_linux:libxentoollog1, p-cpe:/a:debian:debian_linux:libxenstore4, p-cpe:/a:debian:debian_linux:libxenevtchn1, p-cpe:/a:debian:debian_linux:xen-utils-common, p-cpe:/a:debian:debian_linux:libxen-dev, p-cpe:/a:debian:debian_linux:xen-hypervisor-4.17-amd64-dbg, p-cpe:/a:debian:debian_linux:xen-hypervisor-4.17-armhf-dbg, p-cpe:/a:debian:debian_linux:xen-utils-4.20-dbg, p-cpe:/a:debian:debian_linux:libxentoolcore1, p-cpe:/a:debian:debian_linux:xen-hypervisor-4.20-amd64, p-cpe:/a:debian:debian_linux:xen-utils-4.20, p-cpe:/a:debian:debian_linux:xen-utils-4.17, p-cpe:/a:debian:debian_linux:libxenforeignmemory1, cpe:/o:debian:debian_linux:13.0, p-cpe:/a:debian:debian_linux:libxenmisc4.17, p-cpe:/a:debian:debian_linux:libxenhypfs1, p-cpe:/a:debian:debian_linux:xen-hypervisor-4.17-armhf, p-cpe:/a:debian:debian_linux:xen-system-arm64, p-cpe:/a:debian:debian_linux:xen-hypervisor-4.20-arm64, p-cpe:/a:debian:debian_linux:xen-hypervisor-4.20-amd64-dbg, p-cpe:/a:debian:debian_linux:xen-hypervisor-4.17-amd64, p-cpe:/a:debian:debian_linux:libxengnttab1, p-cpe:/a:debian:debian_linux:xen-system-amd64, cpe:/o:debian:debian_linux:12.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 12/2/2025

Vulnerability Publication Date: 2/27/2025

Reference Information

CVE: CVE-2024-28956, CVE-2024-36350, CVE-2024-36357, CVE-2025-1713, CVE-2025-27465, CVE-2025-27466, CVE-2025-58142, CVE-2025-58143, CVE-2025-58144, CVE-2025-58145, CVE-2025-58147, CVE-2025-58148, CVE-2025-58149