Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
Rootio-libxml2: Privilege Escalation Risk on Debian 13
ROOT-OS-DEBIAN-13-CVE-2025-12863
Summary
The rootio-libxml2 package, used by Root on Debian 13, had a security issue that could allow an attacker to gain elevated privileges. This has been fixed with a software update. Affected users should update to a patched version to prevent potential security risks.
What to do
- Update rootio-libxml2 to version 2.12.7+dfsg+really2.9.14-2.1+deb13u2.root.io.9.
- Update rootio-libxml2 to version 2.12.7+dfsg+really2.9.14-2.1+deb13u2.root.io.11.
Affected software
| Ecosystem | Vendor | Product | Affected versions |
|---|---|---|---|
| Root:Debian:13 | – | rootio-libxml2 |
< 2.12.7+dfsg+really2.9.14-2.1+deb13u2.root.io.9 < 2.12.7+dfsg+really2.9.14-2.1+deb13u2.root.io.11 Fix: upgrade to 2.12.7+dfsg+really2.9.14-2.1+deb13u2.root.io.9
|
Original title
CVE-2025-12863 in rootio-libxml2 - Patched by Root
Original description
Root has patched CVE-2025-12863 in the rootio-libxml2 package for Root:Debian:13. Multiple fixed versions available.
Published: 16 Apr 2026 · Updated: 16 Apr 2026 · First seen: 30 Mar 2026