ROOT-OS-DEBIAN-12-CVE-2026-0672

Source
https://root.io/security/ROOT-OS-DEBIAN-12-CVE-2026-0672
Import Source
https://api.root.io/external/osv/ROOT-OS-DEBIAN-12-CVE-2026-0672.json
JSON Data
https://api.test.osv.dev/v1/vulns/ROOT-OS-DEBIAN-12-CVE-2026-0672
Upstream
Published
2026-02-18T11:22:40Z
Modified
2026-02-18T13:17:26.221374Z
Summary
CVE-2026-0672 in rootio-python3.11 - Patched by Root
Details

Root has patched CVE-2026-0672 in the rootio-python3.11 package for Root:Debian:12. Multiple fixed versions available.

Database specific
{
    "distro": "debian",
    "source": "Root",
    "distro_version": "12"
}
References

Affected packages

Root:Debian:12 / rootio-python3.11

Package

Name
rootio-python3.11

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.11.2-6+deb12u6.root.io.18
Fixed
3.11.2-6+deb12u6.root.io.22
Fixed
3.11.2-6+deb12u6.root.io.20
Fixed
3.11.2-6+deb12u6.root.io.24
Fixed
3.11.2-6+deb12u6.root.io.21
Fixed
3.11.2-6+deb12u6.root.io.19
Fixed
3.11.2-6+deb12u6.root.io.23
Fixed
3.11.2-6+deb12u6.root.io.17

Database specific

root_patch_version
"root.io.24"
root_patched
true
total_fixed_versions
8.0
source
"https://api.root.io/external/osv/ROOT-OS-DEBIAN-12-CVE-2026-0672.json"
all_fixed_versions
[
    "3.11.2-6+deb12u6.root.io.18",
    "3.11.2-6+deb12u6.root.io.22",
    "3.11.2-6+deb12u6.root.io.20",
    "3.11.2-6+deb12u6.root.io.24",
    "3.11.2-6+deb12u6.root.io.21",
    "3.11.2-6+deb12u6.root.io.19",
    "3.11.2-6+deb12u6.root.io.23",
    "3.11.2-6+deb12u6.root.io.17"
]
upstream_version
"3.11.2-6+deb12u6"