ROOT-OS-DEBIAN-11-CVE-2022-43551

Source
https://root.io/security/ROOT-OS-DEBIAN-11-CVE-2022-43551
Import Source
https://api.root.io/external/osv/ROOT-OS-DEBIAN-11-CVE-2022-43551.json
JSON Data
https://api.test.osv.dev/v1/vulns/ROOT-OS-DEBIAN-11-CVE-2022-43551
Upstream
Published
2026-02-27T06:25:07Z
Modified
2026-03-06T11:34:17.445153Z
Summary
CVE-2022-43551 in rootio-curl - Patched by Root
Details

Root has patched CVE-2022-43551 in the rootio-curl package for Root:Debian:11. Multiple fixed versions available.

Database specific
{
    "source": "Root",
    "distro_version": "11",
    "distro": "debian"
}
References

Affected packages

Root:Debian:11 / rootio-curl

Package

Name
rootio-curl

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.74.0-1.3+deb11u13.root.io.1
Fixed
7.74.0-1.3+deb11u13.root.io.12
Fixed
7.74.0-1.3+deb11u13.root.io.2
Fixed
7.74.0-1.3+deb11u13.root.io.3
Fixed
7.74.0-1.3+deb11u13.root.io.4
Fixed
7.74.0-1.3+deb11u15.root.io.5
Fixed
7.74.0-1.3+deb11u15.root.io.6
Fixed
7.74.0-1.3+deb11u15.root.io.7
Fixed
7.74.0-1.3+deb11u15.root.io.8
Fixed
7.74.0-1.3+deb11u15.root.io.9
Fixed
7.74.0-1.3+deb11u15.root.io.10
Fixed
7.74.0-1.3+deb11u15.root.io.11

Database specific

total_fixed_versions
12.0
all_fixed_versions
[
    "7.74.0-1.3+deb11u13.root.io.1",
    "7.74.0-1.3+deb11u13.root.io.12",
    "7.74.0-1.3+deb11u13.root.io.2",
    "7.74.0-1.3+deb11u13.root.io.3",
    "7.74.0-1.3+deb11u13.root.io.4",
    "7.74.0-1.3+deb11u15.root.io.5",
    "7.74.0-1.3+deb11u15.root.io.6",
    "7.74.0-1.3+deb11u15.root.io.7",
    "7.74.0-1.3+deb11u15.root.io.8",
    "7.74.0-1.3+deb11u15.root.io.9",
    "7.74.0-1.3+deb11u15.root.io.10",
    "7.74.0-1.3+deb11u15.root.io.11"
]
source
"https://api.root.io/external/osv/ROOT-OS-DEBIAN-11-CVE-2022-43551.json"
root_patch_version
"root.io.12"
root_patched
true
upstream_version
"7.74.0-1.3+deb11u13"