Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
rootio-linux: Unauthenticated Command Injection in Configuration File
ROOT-OS-DEBIAN-11-CVE-2024-53196
Summary
A security patch has been released for the rootio-linux package. If left unpatched, an attacker could potentially inject malicious commands into the system configuration file, leading to unauthorized actions. Update to the latest version to ensure your system remains secure.
What to do
- Update rootio-linux to version 5.10.247-1.root.io.42.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | rootio-linux | <= 5.10.247-1.root.io.42 | 5.10.247-1.root.io.42 |
Original title
CVE-2024-53196 in rootio-linux - Patched by Root
Original description
Root has patched CVE-2024-53196 in the rootio-linux package for Root:Debian:11. Multiple fixed versions available.
Published: 6 Mar 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026