Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

rootio-linux: Unauthenticated Command Execution on Root Servers

ROOT-OS-UBUNTU-2204-CVE-2025-38248
Summary

The rootio-linux package on Root servers has a security issue that allows unauthorized access to the system. This means that an attacker can potentially execute commands on the server without permission. You should update your rootio-linux package to the latest version to fix this issue.

What to do
  • Update rootio-linux to version 5.15.0-164.174.root.io.60.
  • Update rootio-linux to version 5.15.0-173.183.root.io.80.
  • Update rootio-linux to version 5.15.0-174.184.root.io.81.
Affected software
VendorProductAffected versionsFix available
rootio-linux <= 5.15.0-164.174.root.io.60 5.15.0-164.174.root.io.60
rootio-linux <= 5.15.0-173.183.root.io.80 5.15.0-173.183.root.io.80
rootio-linux <= 5.15.0-174.184.root.io.81 5.15.0-174.184.root.io.81
Original title
CVE-2025-38248 in rootio-linux - Patched by Root
Original description
Root has patched CVE-2025-38248 in the rootio-linux package for Root:Ubuntu:22.04. Multiple fixed versions available.
Published: 8 Apr 2026 · Updated: 9 Apr 2026 · First seen: 16 Mar 2026