Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

rootio-linux Unpatched Code Execution on Ubuntu Systems

ROOT-OS-UBUNTU-2204-CVE-2024-50289
Summary

The rootio-linux package on Ubuntu 22.04 systems has a security issue that could allow an attacker to execute malicious code. This issue was fixed by Root, and users should update their system to a patched version to stay secure. If you're running rootio-linux on Ubuntu 22.04, update your package to the latest version to fix this issue.

What to do
  • Update rootio-linux to version 5.15.0-164.174.root.io.60.
  • Update rootio-linux to version 5.15.0-173.183.root.io.80.
  • Update rootio-linux to version 5.15.0-174.184.root.io.81.
Affected software
VendorProductAffected versionsFix available
rootio-linux <= 5.15.0-164.174.root.io.60 5.15.0-164.174.root.io.60
rootio-linux <= 5.15.0-173.183.root.io.80 5.15.0-173.183.root.io.80
rootio-linux <= 5.15.0-174.184.root.io.81 5.15.0-174.184.root.io.81
Original title
CVE-2024-50289 in rootio-linux - Patched by Root
Original description
Root has patched CVE-2024-50289 in the rootio-linux package for Root:Ubuntu:22.04. Multiple fixed versions available.
Published: 8 Apr 2026 · Updated: 9 Apr 2026 · First seen: 16 Mar 2026