ROOT-OS-DEBIAN-12-CVE-2026-23097

Source
https://root.io/security/ROOT-OS-DEBIAN-12-CVE-2026-23097
Import Source
https://api.root.io/external/osv/ROOT-OS-DEBIAN-12-CVE-2026-23097.json
JSON Data
https://api.test.osv.dev/v1/vulns/ROOT-OS-DEBIAN-12-CVE-2026-23097
Upstream
Published
2026-03-07T03:33:47Z
Modified
2026-03-08T23:14:03.690796Z
Summary
CVE-2026-23097 in rootio-linux - Patched by Root
Details

Root has patched CVE-2026-23097 in the rootio-linux package for Root:Debian:12. Multiple fixed versions available.

Database specific
{
    "source": "Root",
    "distro_version": "12",
    "distro": "debian"
}
References

Affected packages

Root:Debian:12 / rootio-linux

Package

Name
rootio-linux

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.159-1.root.io.89
Fixed
6.1.162-1.root.io.91
Fixed
6.1.162-1.root.io.94
Fixed
6.1.162-1.root.io.92
Fixed
6.1.162-1.root.io.99
Fixed
6.1.162-1.root.io.90
Fixed
6.1.162-1.root.io.93
Fixed
6.1.162-1.root.io.100
Fixed
6.1.162-1.root.io.102
Fixed
6.1.162-1.root.io.103
Fixed
6.1.162-1.root.io.101
Fixed
6.1.162-1.root.io.104
Fixed
6.1.162-1.root.io.105
Fixed
6.1.162-1.root.io.97
Fixed
6.1.162-1.root.io.95
Fixed
6.1.162-1.root.io.96
Fixed
6.1.162-1.root.io.98

Database specific

total_fixed_versions
17.0
all_fixed_versions
[
    "6.1.159-1.root.io.89",
    "6.1.162-1.root.io.91",
    "6.1.162-1.root.io.94",
    "6.1.162-1.root.io.92",
    "6.1.162-1.root.io.99",
    "6.1.162-1.root.io.90",
    "6.1.162-1.root.io.93",
    "6.1.162-1.root.io.100",
    "6.1.162-1.root.io.102",
    "6.1.162-1.root.io.103",
    "6.1.162-1.root.io.101",
    "6.1.162-1.root.io.104",
    "6.1.162-1.root.io.105",
    "6.1.162-1.root.io.97",
    "6.1.162-1.root.io.95",
    "6.1.162-1.root.io.96",
    "6.1.162-1.root.io.98"
]
source
"https://api.root.io/external/osv/ROOT-OS-DEBIAN-12-CVE-2026-23097.json"
root_patch_version
"root.io.105"
root_patched
true
upstream_version
"6.1.162-1"