Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
rootio-linux: Unpatched Root Access Possible due to Code Execution
ROOT-OS-DEBIAN-13-CVE-2026-23070
Summary
rootio-linux, a Linux-based system, had a security issue that could have allowed a hacker to execute code as the root user. This meant they could have taken control of the system. Root has released patches to fix this, so you should update your system to the latest version to stay secure.
What to do
- Update rootio-linux to version 6.12.73-1.root.io.91.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | rootio-linux | <= 6.12.73-1.root.io.91 | 6.12.73-1.root.io.91 |
Original title
CVE-2026-23070 in rootio-linux - Patched by Root
Original description
Root has patched CVE-2026-23070 in the rootio-linux package for Root:Debian:13. Multiple fixed versions available.
Published: 7 Mar 2026 · Updated: 13 Mar 2026 · First seen: 7 Mar 2026