Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
rootio-python3.11: Unauthenticated Code Execution via HTTP Request
ROOT-OS-DEBIAN-12-CVE-2026-6100
Summary
The rootio-python3.11 package had a security issue that could allow an attacker to execute code on your system without a password. This was fixed by the Root team, so you should update to the latest version to stay safe. If you're using this package, check with your vendor for an update.
What to do
- Update rootio-python3.11 to version 3.11.2-6+deb12u6.root.io.32.
Affected software
| Ecosystem | Vendor | Product | Affected versions |
|---|---|---|---|
| Root:Debian:12 | – | rootio-python3.11 |
< 3.11.2-6+deb12u6.root.io.32 Fix: upgrade to 3.11.2-6+deb12u6.root.io.32
|
Original title
CVE-2026-6100 in rootio-python3.11 - Patched by Root
Original description
Root has patched CVE-2026-6100 in the rootio-python3.11 package for Root:Debian:12. Multiple fixed versions available.
Published: 16 Apr 2026 · Updated: 16 Apr 2026 · First seen: 16 Apr 2026