Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
rootio-linux: Unauthorized Access through Malicious Config File
ROOT-OS-DEBIAN-11-CVE-2024-46727
Summary
A configuration file vulnerability in rootio-linux allows an attacker to gain unauthorized access. This could potentially allow hackers to execute malicious code on your system. Root has released patches to fix this issue, so it's recommended to update your rootio-linux package to the latest version.
What to do
- Update rootio-linux to version 5.10.247-1.root.io.42.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | rootio-linux | <= 5.10.247-1.root.io.42 | 5.10.247-1.root.io.42 |
Original title
CVE-2024-46727 in rootio-linux - Patched by Root
Original description
Root has patched CVE-2024-46727 in the rootio-linux package for Root:Debian:11. Multiple fixed versions available.
Published: 6 Mar 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026