Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
rootio-linux: Unpatched Code Execution in Rootio-Linux
ROOT-OS-DEBIAN-13-CVE-2025-40282
Summary
A security patch has been released for the rootio-linux package in Root:Debian:13, which fixes a critical issue that could allow hackers to execute unauthorized code on your system. This means that if you're using an unpatched version, you may be leaving your system open to attack. To stay secure, update your rootio-linux package to the latest version.
What to do
- Update rootio-linux to version 6.12.63-1.root.io.64.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | rootio-linux | <= 6.12.63-1.root.io.64 | 6.12.63-1.root.io.64 |
Original title
CVE-2025-40282 in rootio-linux - Patched by Root
Original description
Root has patched CVE-2025-40282 in the rootio-linux package for Root:Debian:13. Multiple fixed versions available.
Published: 6 Mar 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026