Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
rootio-linux: Unauthorized File Access via Malicious SUID Executable
ROOT-OS-DEBIAN-13-CVE-2025-68288
Summary
A vulnerability in the rootio-linux package on Root:Debian:13 allows an attacker to run a malicious executable with elevated privileges, potentially leading to unauthorized access to sensitive files. This issue has been patched by the developer, and users are advised to update their systems with the latest version to prevent exploitation. If you use rootio-linux, update to the fixed version as soon as possible.
What to do
- Update rootio-linux to version 6.12.63-1.root.io.64.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | rootio-linux | <= 6.12.63-1.root.io.64 | 6.12.63-1.root.io.64 |
Original title
CVE-2025-68288 in rootio-linux - Patched by Root
Original description
Root has patched CVE-2025-68288 in the rootio-linux package for Root:Debian:13. Multiple fixed versions available.
Published: 6 Mar 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026