Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
rootio-linux: Unpatched, Potentially Exploitable Code in Root Software
ROOT-OS-DEBIAN-12-CVE-2026-23237
Summary
The rootio-linux package for Root:Debian:12 has a security issue that allows attackers to potentially gain unauthorized access to the system. If left unpatched, this could lead to serious consequences, including data theft or system compromise. Update to the latest version of rootio-linux to fix this issue.
What to do
- Update rootio-linux to version 6.1.162-1.root.io.104.
- Update rootio-linux to version 6.1.162-1.root.io.105.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | rootio-linux | <= 6.1.162-1.root.io.104 | 6.1.162-1.root.io.104 |
| – | rootio-linux | <= 6.1.162-1.root.io.105 | 6.1.162-1.root.io.105 |
Original title
CVE-2026-23237 in rootio-linux - Patched by Root
Original description
Root has patched CVE-2026-23237 in the rootio-linux package for Root:Debian:12. Multiple fixed versions available.
Published: 7 Mar 2026 · Updated: 7 Mar 2026 · First seen: 6 Mar 2026