Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
Rootio Linux: Unpatched System Can Be Compromised by Unauthorized Access
ROOT-OS-DEBIAN-11-CVE-2024-35949
Summary
If you're using Rootio Linux with Debian 11, it's recommended to update to the latest version of the rootio-linux package to prevent unauthorized access to your system. This issue was previously patched by Root, so installing the latest update will ensure you have the security fix. Update your system to protect against potential security risks.
What to do
- Update rootio-linux to version 5.10.247-1.root.io.42.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | rootio-linux | <= 5.10.247-1.root.io.42 | 5.10.247-1.root.io.42 |
Original title
CVE-2024-35949 in rootio-linux - Patched by Root
Original description
Root has patched CVE-2024-35949 in the rootio-linux package for Root:Debian:11. Multiple fixed versions available.
Published: 12 Mar 2026 · Updated: 13 Mar 2026 · First seen: 13 Mar 2026