ROOT-OS-DEBIAN-12-CVE-2025-71073

Source
https://root.io/security/ROOT-OS-DEBIAN-12-CVE-2025-71073
Import Source
https://api.root.io/external/osv/ROOT-OS-DEBIAN-12-CVE-2025-71073.json
JSON Data
https://api.osv.dev/v1/vulns/ROOT-OS-DEBIAN-12-CVE-2025-71073
Upstream
Published
2026-02-12T03:25:13Z
Modified
2026-02-13T03:17:45.842869Z
Summary
CVE-2025-71073 in rootio-linux - Patched by Root
Details

Root has patched CVE-2025-71073 in the rootio-linux package for Root:Debian:12. Multiple fixed versions available.

Database specific
{
    "distro_version": "12",
    "source": "Root",
    "distro": "debian"
}
References

Affected packages

Root:Debian:12 / rootio-linux

Package

Name
rootio-linux

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.159-1.root.io.79
Fixed
6.1.159-1.root.io.77
Fixed
6.1.159-1.root.io.80
Fixed
6.1.159-1.root.io.82
Fixed
6.1.159-1.root.io.85
Fixed
6.1.159-1.root.io.78
Fixed
6.1.159-1.root.io.86
Fixed
6.1.159-1.root.io.89
Fixed
6.1.162-1.root.io.91
Fixed
6.1.162-1.root.io.92
Fixed
6.1.159-1.root.io.88
Fixed
6.1.162-1.root.io.90
Fixed
6.1.159-1.root.io.81
Fixed
6.1.159-1.root.io.87
Fixed
6.1.159-1.root.io.84
Fixed
6.1.159-1.root.io.83
Fixed
6.1.159-1.root.io.76

Database specific

root_patch_version
"root.io.92"
all_fixed_versions
[
    "6.1.159-1.root.io.79",
    "6.1.159-1.root.io.77",
    "6.1.159-1.root.io.80",
    "6.1.159-1.root.io.82",
    "6.1.159-1.root.io.85",
    "6.1.159-1.root.io.78",
    "6.1.159-1.root.io.86",
    "6.1.159-1.root.io.89",
    "6.1.162-1.root.io.91",
    "6.1.162-1.root.io.92",
    "6.1.159-1.root.io.88",
    "6.1.162-1.root.io.90",
    "6.1.159-1.root.io.81",
    "6.1.159-1.root.io.87",
    "6.1.159-1.root.io.84",
    "6.1.159-1.root.io.83",
    "6.1.159-1.root.io.76"
]
root_patched
true
source
"https://api.root.io/external/osv/ROOT-OS-DEBIAN-12-CVE-2025-71073.json"
upstream_version
"6.1.162-1"
total_fixed_versions
17.0