Browse all 3 CVE security advisories affecting mate-desktop. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Mate-desktop serves as a lightweight desktop environment for Linux systems, prioritizing traditional desktop functionality with resource efficiency. Historically, its vulnerabilities have commonly included remote code execution and privilege escalation flaws, often stemming from improper input validation in components like MATE Panel and Marco window manager. The project maintains a moderate security posture with three CVEs recorded, addressing issues such as buffer overflows and privilege boundary violations. While no major security incidents have been widely documented, the codebase continues to receive regular security updates, reflecting the project's commitment to addressing potential threats in a timely manner.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-52138 | Path traversal via crafted cpio archives in Engrampa archivers — engrampaCWE-25 | 8.2 | High | 2024-02-05 |
| CVE-2023-52076 | Remote Code Execution Vulnerability in Atril's EPUB ebook parsing — atrilCWE-24 | 8.5 | High | 2024-01-25 |
| CVE-2023-51698 | Atril's CBT comic book parsing vulnerable to Remote Code Execution — atrilCWE-78 | 9.6 | Critical | 2024-01-12 |
This page lists every published CVE security advisory associated with mate-desktop. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.