Linuxmint
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Linuxmint product.
RSS Feeds for Linuxmint security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Linuxmint products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Linuxmint Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 0 vulnerabilities in Linuxmint. Linuxmint did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 2 | 7.80 |
| 2023 | 1 | 7.50 |
| 2022 | 1 | 7.50 |
| 2021 | 0 | 0.00 |
| 2020 | 3 | 0.00 |
| 2019 | 1 | 0.00 |
| 2018 | 1 | 8.10 |
It may take a day or so for new Linuxmint vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Linuxmint Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2023-44452 | May 03, 2024 |
Linux Mint Xreader CBT File Arg Injection RCELinux Mint Xreader CBT File Parsing Argument Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Mint Xreader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CBT files. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22132. |
|
| CVE-2023-44451 | May 03, 2024 |
Linux Mint Xreader EPUB Directory Traversal RCELinux Mint Xreader EPUB File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Mint Xreader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of EPUB files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-21897. |
|
| CVE-2023-29380 | May 29, 2023 |
Remote File Deletion in Warpinator <1.6 via Directory TraversalWarpinator before 1.6.0 allows remote file deletion via directory traversal in top_dir_basenames. |
|
| CVE-2022-42725 | Oct 10, 2022 |
Path Traversal Vuln in Warpinator 1.2.14 via SymlinkWarpinator through 1.2.14 allows access outside of an intended directory, as demonstrated by symbolic directory links. |
|
| CVE-2019-20326 | Mar 16, 2020 |
A heap-based buffer overflow in _cairo_image_surface_create_from_jpeg() in extensions/cairo_io/cairo-image-surface-jpeg.c in GNOME gThumb before 3.8.3 and Linux Mint Pix before 2.4.5A heap-based buffer overflow in _cairo_image_surface_create_from_jpeg() in extensions/cairo_io/cairo-image-surface-jpeg.c in GNOME gThumb before 3.8.3 and Linux Mint Pix before 2.4.5 allows attackers to cause a crash and potentially execute arbitrary code via a crafted JPEG file. |
|
| CVE-2012-1567 | Feb 07, 2020 |
LinuxMint as of 2012-03-19 has temporary file creation vulnerabilities in mintUpdate.LinuxMint as of 2012-03-19 has temporary file creation vulnerabilities in mintUpdate. |
|
| CVE-2012-1566 | Feb 07, 2020 |
LinuxMint as of 2012-03-19 has temporary file creation vulnerabilities in mintNanny.LinuxMint as of 2012-03-19 has temporary file creation vulnerabilities in mintNanny. |
|
| CVE-2019-17080 | Oct 02, 2019 |
mintinstall (aka Software Manager) 7.9.9 for Linux Mintmintinstall (aka Software Manager) 7.9.9 for Linux Mint allows code execution if a REVIEWS_CACHE file is controlled by an attacker, because an unpickle occurs. This is resolved in 8.0.0 and backports. |
|
| CVE-2018-13054 | Jul 02, 2018 |
An issue was discovered in Cinnamon 1.9.2 through 3.8.6An issue was discovered in Cinnamon 1.9.2 through 3.8.6. The cinnamon-settings-users.py GUI runs as root and allows configuration of (for example) other users' icon files in _on_face_browse_menuitem_activated and _on_face_menuitem_activated. These icon files are written to the respective user's $HOME/.face location. If an unprivileged user prepares a symlink pointing to an arbitrary location, then this location will be overwritten with the icon content. |
|
| CVE-2014-1949 | Jan 16, 2015 |
GTK+ 3.10.9 and earlier, as used in cinnamon-screensaver, gnome-screensaver, and other applicationsGTK+ 3.10.9 and earlier, as used in cinnamon-screensaver, gnome-screensaver, and other applications, allows physically proximate attackers to bypass the lock screen by pressing the menu button. |
|