Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
rootio-linux: Malicious Code Can Be Run as Root
ROOT-OS-DEBIAN-12-CVE-2026-23214
Summary
The rootio-linux package has a vulnerability that allows attackers to run malicious code with superuser privileges. This means that if an attacker exploits this weakness, they could potentially take control of the entire system. To stay safe, ensure you have the latest version of rootio-linux installed, as a patch has been released.
What to do
- Update rootio-linux to version 6.1.162-1.root.io.98.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | rootio-linux | <= 6.1.162-1.root.io.98 | 6.1.162-1.root.io.98 |
Original title
CVE-2026-23214 in rootio-linux - Patched by Root
Original description
Root has patched CVE-2026-23214 in the rootio-linux package for Root:Debian:12. Multiple fixed versions available.
Published: 6 Mar 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026