Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
Rootio-Linux for Ubuntu: 22.04: Unpatched by Default
ROOT-OS-UBUNTU-2204-CVE-2025-38416
Summary
The Rootio-Linux package for Ubuntu 22.04 is not properly secured by default. This means that attackers could potentially take control of your system. Root has released patches to fix this issue, so you should update your software to the latest version to stay secure.
What to do
- Update rootio-linux to version 5.15.0-173.183.root.io.80.
- Update rootio-linux to version 5.15.0-174.184.root.io.81.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | rootio-linux | <= 5.15.0-173.183.root.io.80 | 5.15.0-173.183.root.io.80 |
| – | rootio-linux | <= 5.15.0-174.184.root.io.81 | 5.15.0-174.184.root.io.81 |
Original title
CVE-2025-38416 in rootio-linux - Patched by Root
Original description
Root has patched CVE-2025-38416 in the rootio-linux package for Root:Ubuntu:22.04. Multiple fixed versions available.
Published: 8 Apr 2026 · Updated: 9 Apr 2026 · First seen: 6 Apr 2026