Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
CVE-2021-41043
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2021-41043
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-41043.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-41043
Downstream
DEBIAN-CVE-2021-41043
RHSA-2024:0410
RHSA-2024:0571
RHSA-2024:0769
RHSA-2024:1090
RHSA-2024:2211
RLSA-2024:2211
UBUNTU-CVE-2021-41043
Related
ALSA-2024:0769
ALSA-2024:2211
RLSA-2024:0769
Published
2022-01-05T12:15:08Z
Modified
2025-09-24T11:10:13.254770Z
Severity
5.5 (Medium)
CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS Calculator
Summary
[none]
Details
Use after free in tcpslice triggers AddressSanitizer, no other confirmed impact.
References
https://github.com/the-tcpdump-group/tcpslice/issues/11
Affected packages
Git
/
github.com/the-tcpdump-group/tcpslice
Affected ranges
Type
GIT
Repo
https://github.com/the-tcpdump-group/tcpslice
Events
Introduced
0
Unknown introduced commit / All previous commits are affected
Fixed
f73194ceb7e3a20b23ffd7ef4925d3d9ce737e06
Affected versions
tcpslice-1.*
tcpslice-1.3
tcpslice-1.4
CVE-2021-41043 - OSV