Linuxmint Linuxmint

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Linuxmint product.

RSS Feeds for Linuxmint security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Linuxmint products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Linuxmint Sorted by Most Security Vulnerabilities since 2018

Linuxmint Warpinator2 vulnerabilities

Linuxmint Xreader2 vulnerabilities

Linuxmint Cinnamon1 vulnerability

Linuxmint Linux Mint1 vulnerability

Linuxmint Mintinstall1 vulnerability

Linuxmint Pix1 vulnerability

By the Year

In 2026 there have been 0 vulnerabilities in Linuxmint. Linuxmint did not have any published security vulnerabilities last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 2 7.80
2023 1 7.50
2022 1 7.50
2021 0 0.00
2020 3 0.00
2019 1 0.00
2018 1 8.10

It may take a day or so for new Linuxmint vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Linuxmint Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2023-44452 May 03, 2024
Linux Mint Xreader CBT File Arg Injection RCE Linux Mint Xreader CBT File Parsing Argument Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Mint Xreader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CBT files. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22132.
Xreader
CVE-2023-44451 May 03, 2024
Linux Mint Xreader EPUB Directory Traversal RCE Linux Mint Xreader EPUB File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Mint Xreader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of EPUB files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-21897.
Xreader
CVE-2023-29380 May 29, 2023
Remote File Deletion in Warpinator <1.6 via Directory Traversal Warpinator before 1.6.0 allows remote file deletion via directory traversal in top_dir_basenames.
Warpinator
CVE-2022-42725 Oct 10, 2022
Path Traversal Vuln in Warpinator 1.2.14 via Symlink Warpinator through 1.2.14 allows access outside of an intended directory, as demonstrated by symbolic directory links.
Warpinator
CVE-2019-20326 Mar 16, 2020
A heap-based buffer overflow in _cairo_image_surface_create_from_jpeg() in extensions/cairo_io/cairo-image-surface-jpeg.c in GNOME gThumb before 3.8.3 and Linux Mint Pix before 2.4.5 A heap-based buffer overflow in _cairo_image_surface_create_from_jpeg() in extensions/cairo_io/cairo-image-surface-jpeg.c in GNOME gThumb before 3.8.3 and Linux Mint Pix before 2.4.5 allows attackers to cause a crash and potentially execute arbitrary code via a crafted JPEG file.
Pix
CVE-2012-1567 Feb 07, 2020
LinuxMint as of 2012-03-19 has temporary file creation vulnerabilities in mintUpdate. LinuxMint as of 2012-03-19 has temporary file creation vulnerabilities in mintUpdate.
CVE-2012-1566 Feb 07, 2020
LinuxMint as of 2012-03-19 has temporary file creation vulnerabilities in mintNanny. LinuxMint as of 2012-03-19 has temporary file creation vulnerabilities in mintNanny.
CVE-2019-17080 Oct 02, 2019
mintinstall (aka Software Manager) 7.9.9 for Linux Mint mintinstall (aka Software Manager) 7.9.9 for Linux Mint allows code execution if a REVIEWS_CACHE file is controlled by an attacker, because an unpickle occurs. This is resolved in 8.0.0 and backports.
Mintinstall
CVE-2018-13054 Jul 02, 2018
An issue was discovered in Cinnamon 1.9.2 through 3.8.6 An issue was discovered in Cinnamon 1.9.2 through 3.8.6. The cinnamon-settings-users.py GUI runs as root and allows configuration of (for example) other users' icon files in _on_face_browse_menuitem_activated and _on_face_menuitem_activated. These icon files are written to the respective user's $HOME/.face location. If an unprivileged user prepares a symlink pointing to an arbitrary location, then this location will be overwritten with the icon content.
Cinnamon
CVE-2014-1949 Jan 16, 2015
GTK+ 3.10.9 and earlier, as used in cinnamon-screensaver, gnome-screensaver, and other applications GTK+ 3.10.9 and earlier, as used in cinnamon-screensaver, gnome-screensaver, and other applications, allows physically proximate attackers to bypass the lock screen by pressing the menu button.
Linux Mint
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.