Debian 10927 Published by

Evince users need to install a quick security patch that closes a command injection hole triggered by specially crafted PDF documents. The linux package also received a major update to address several kernel flaws capable of causing privilege escalation, service disruptions, or data exposure. Debian fixed these issues in version 6.12.90 for the trixie release while simultaneously resolving a separate Bluetooth regression tied to MediaTek chips. You should prioritize installing both updates right away since leaving them unpatched leaves your systems wide open to serious threats.

ELA-1731-1 evince security update
[DSA 6295-1] linux security update




ELA-1731-1 evince security update (by )


Package : evince

Version : 3.22.1-3+deb9u4 (stretch), 3.30.2-3+deb10u2 (buster)

Related CVEs :
CVE-2026-46529

It was discovered that evince, a simple multi-page document viewer, is
prone to a command injection vulnerability if a specially crafted PDF
file is opened.


ELA-1731-1 evince security update (by )



[SECURITY] [DSA 6295-1] linux security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-6295-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
May 23, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : linux
CVE ID : CVE-2026-23171 CVE-2026-43503 CVE-2026-46300
Debian Bug : 1136790

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.

For the stable distribution (trixie), these problems have been fixed in
version 6.12.90-1. Additionally this update includes a fix for a
regression introduced with MediaTek Bluetooth devices (#1136790).

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/