Linuxmint
Products by Linuxmint Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2024 there have been 0 vulnerabilities in Linuxmint . Last year Linuxmint had 1 security vulnerability published. Right now, Linuxmint is on track to have less security vulnerabilities in 2024 than it did last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 1 | 7.50 |
2022 | 1 | 7.50 |
2021 | 0 | 0.00 |
2020 | 1 | 7.80 |
2019 | 1 | 7.80 |
2018 | 1 | 8.10 |
It may take a day or so for new Linuxmint vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Linuxmint Security Vulnerabilities
Warpinator before 1.6.0
CVE-2023-29380
7.5 - High
- May 29, 2023
Warpinator before 1.6.0 allows remote file deletion via directory traversal in top_dir_basenames.
Directory traversal
Warpinator through 1.2.14
CVE-2022-42725
7.5 - High
- October 10, 2022
Warpinator through 1.2.14 allows access outside of an intended directory, as demonstrated by symbolic directory links.
insecure temporary file
A heap-based buffer overflow in _cairo_image_surface_create_from_jpeg() in extensions/cairo_io/cairo-image-surface-jpeg.c in GNOME gThumb before 3.8.3 and Linux Mint Pix before 2.4.5
CVE-2019-20326
7.8 - High
- March 16, 2020
A heap-based buffer overflow in _cairo_image_surface_create_from_jpeg() in extensions/cairo_io/cairo-image-surface-jpeg.c in GNOME gThumb before 3.8.3 and Linux Mint Pix before 2.4.5 allows attackers to cause a crash and potentially execute arbitrary code via a crafted JPEG file.
Memory Corruption
mintinstall (aka Software Manager) 7.9.9 for Linux Mint
CVE-2019-17080
7.8 - High
- October 02, 2019
mintinstall (aka Software Manager) 7.9.9 for Linux Mint allows code execution if a REVIEWS_CACHE file is controlled by an attacker, because an unpickle occurs. This is resolved in 8.0.0 and backports.
Marshaling, Unmarshaling
An issue was discovered in Cinnamon 1.9.2 through 3.8.6
CVE-2018-13054
8.1 - High
- July 02, 2018
An issue was discovered in Cinnamon 1.9.2 through 3.8.6. The cinnamon-settings-users.py GUI runs as root and allows configuration of (for example) other users' icon files in _on_face_browse_menuitem_activated and _on_face_menuitem_activated. These icon files are written to the respective user's $HOME/.face location. If an unprivileged user prepares a symlink pointing to an arbitrary location, then this location will be overwritten with the icon content.
insecure temporary file
GTK+ 3.10.9 and earlier, as used in cinnamon-screensaver, gnome-screensaver, and other applications
CVE-2014-1949
- January 16, 2015
GTK+ 3.10.9 and earlier, as used in cinnamon-screensaver, gnome-screensaver, and other applications, allows physically proximate attackers to bypass the lock screen by pressing the menu button.
Authorization