Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
rootio-linux Unpatched Code Execution on Ubuntu Systems
ROOT-OS-UBUNTU-2204-CVE-2024-50289
Summary
The rootio-linux package on Ubuntu 22.04 systems has a security issue that could allow an attacker to execute malicious code. This issue was fixed by Root, and users should update their system to a patched version to stay secure. If you're running rootio-linux on Ubuntu 22.04, update your package to the latest version to fix this issue.
What to do
- Update rootio-linux to version 5.15.0-164.174.root.io.60.
- Update rootio-linux to version 5.15.0-173.183.root.io.80.
- Update rootio-linux to version 5.15.0-174.184.root.io.81.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | rootio-linux | <= 5.15.0-164.174.root.io.60 | 5.15.0-164.174.root.io.60 |
| – | rootio-linux | <= 5.15.0-173.183.root.io.80 | 5.15.0-173.183.root.io.80 |
| – | rootio-linux | <= 5.15.0-174.184.root.io.81 | 5.15.0-174.184.root.io.81 |
Original title
CVE-2024-50289 in rootio-linux - Patched by Root
Original description
Root has patched CVE-2024-50289 in the rootio-linux package for Root:Ubuntu:22.04. Multiple fixed versions available.
Published: 8 Apr 2026 · Updated: 9 Apr 2026 · First seen: 16 Mar 2026