Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

rootio-linux: Unauthorized Code Execution via Config File

ROOT-OS-DEBIAN-12-CVE-2025-21872
Summary

The rootio-linux package has a security issue that allows an attacker to run unauthorized code on your system by manipulating a configuration file. This could potentially allow them to take control of your system. Make sure to update to a patched version of rootio-linux to fix this issue.

What to do
  • Update rootio-linux to version 6.1.164-1.root.io.108.
Affected software
VendorProductAffected versionsFix available
– rootio-linux <= 6.1.164-1.root.io.108 6.1.164-1.root.io.108
Original title
CVE-2025-21872 in rootio-linux - Patched by Root
Original description
Root has patched CVE-2025-21872 in the rootio-linux package for Root:Debian:12. Multiple fixed versions available.
Published: 1 Apr 2026 · Updated: 1 Apr 2026 · First seen: 29 Mar 2026