Debian Trixie Vulnerabilities: PowerDNS and NSS Denial of Service Issues
Severity: Medium (Score: 57.8)
Sources: Linuxsecurity
Published: · Updated:
Keywords: trixie, debian, denial, service, stable, distribution, problems
Summary
Recent security advisories from Debian detail vulnerabilities in the Trixie stable distribution. The PowerDNS vulnerability (DSA-6284) allows for denial of service and information disclosure, fixed in version 4.9.15-0+deb13u1. The NSS vulnerability (DSA-6290) presents a major denial of service risk and uncontrolled code execution, patched in version 2:3.110-1+deb13u2. Both vulnerabilities affect Debian Trixie users and require immediate updates to mitigate risks. Users are advised to upgrade their packages to the latest versions to ensure system security. Key Points: • Debian Trixie users must upgrade PowerDNS and NSS packages due to critical vulnerabilities. • PowerDNS vulnerability allows denial of service and information disclosure. • NSS vulnerability poses a major risk of denial of service and uncontrolled code execution.
Detailed Analysis
**Impact** Users of the Debian Trixie stable distribution running PowerDNS and NSS packages are affected by denial of service vulnerabilities. These issues could disrupt DNS resolution and security services, impacting network reliability and availability. No specific sectors, geographies, or data exposure details are provided in the articles. **Technical Details** The vulnerabilities involve denial of service conditions in PowerDNS (fixed in version 4.9.15-0+deb13u1) and NSS (fixed in version 2:3.110-1+deb13u2) packages. No CVE identifiers or detailed attack vectors, TTPs, malware, or infrastructure information are provided. The kill chain stage corresponds to disruption of service availability. **Recommended Response** Apply the updated PowerDNS package version 4.9.15-0+deb13u1 and NSS package version 2:3.110-1+deb13u2 immediately on all affected Debian Trixie systems. Monitor for unusual service disruptions related to DNS and NSS components. No additional detection rules or IOCs are provided in the source articles.
Source articles (2)
- Debian Trixie NSS Major Denial of Service Uncontrolled Code Exec DSA-6290 — Linuxsecurity · 2026-05-21
For the stable distribution (trixie), these problems have been fixed in version 2:3.110-1+deb13u2. We recommend that you upgrade your nss packages. For the detailed security status of nss please refer… - Debian Trixie PowerDNS Denial of Service Info Disclosure Vuln DSA-6284 — Linuxsecurity · 2026-05-20
For the stable distribution (trixie), these problems have been fixed in version 4.9.15-0+deb13u1. We recommend that you upgrade your pdns packages. For the detailed security status of pdns please refe…
Timeline
- 2026-05-20 — PowerDNS vulnerability disclosed: Debian released DSA-6284 detailing a denial of service and info disclosure vulnerability in PowerDNS.
- 2026-05-20 — PowerDNS patch released: Version 4.9.15-0+deb13u1 was released to fix the PowerDNS vulnerabilities in the Trixie distribution.
- 2026-05-21 — NSS vulnerability disclosed: Debian announced DSA-6290, highlighting a major denial of service and code execution vulnerability in NSS.
- 2026-05-21 — NSS patch released: Version 2:3.110-1+deb13u2 was released to address the NSS vulnerabilities in the Trixie distribution.
Related entities
- DDoS (Attack Type)
- Denial of Service (Attack Type)
- CWE-200 - Exposure of Sensitive Information (Cwe)
- Debian (Company)
- PowerDNS (Platform)