Known Vulnerabilities for Libslirp by Libslirp Project

Listed below are 10 of the newest known vulnerabilities associated with "Libslirp" by "Libslirp Project".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-3595 An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the tftp... 3.8 - LOW 2021-06-15 2023-11-07
CVE-2021-3594 An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_... 3.8 - LOW 2021-06-15 2023-11-07
CVE-2021-3593 An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp6... 3.8 - LOW 2021-06-15 2023-11-07
CVE-2021-3592 An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the boot... 3.8 - LOW 2021-06-15 2023-11-07
CVE-2020-29129 ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that... 4.3 - MEDIUM 2020-11-26 2023-11-07
CVE-2020-10756 An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs i... 6.5 - MEDIUM 2020-07-09 2023-11-07
CVE-2020-8608 In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later co... 5.6 - MEDIUM 2020-02-06 2021-02-14
CVE-2020-7211 tftp.c in libslirp 4.1.0, as used in QEMU 4.2.0, does not prevent ..\ directory traversal on Windows. 7.5 - HIGH 2020-01-21 2020-01-23
CVE-2020-7039 tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages memory, as demonstrated by IRC DCC commands in EMU... 5.6 - MEDIUM 2020-01-16 2021-02-14
CVE-2020-1983 A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cau... 6.5 - MEDIUM 2020-04-22 2023-11-07

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationLibslirp ProjectLibslirp4.3.1AllAllAll
ApplicationLibslirp ProjectLibslirp4.3.0AllAllAll
ApplicationLibslirp ProjectLibslirp4.2.0AllAllAll
ApplicationLibslirp ProjectLibslirp4.1.0AllAllAll
ApplicationLibslirp ProjectLibslirp4.0.0-AllAll
ApplicationLibslirp ProjectLibslirp4.0.0rc0AllAll
ApplicationLibslirp ProjectLibslirp3.1.0-AllAll
ApplicationLibslirp ProjectLibslirp3.1.0rc0AllAll
ApplicationLibslirp ProjectLibslirp3.1.0rc1AllAll
ApplicationLibslirp ProjectLibslirp3.1.0rc2AllAll
ApplicationLibslirp ProjectLibslirp3.1.0rc3AllAll
ApplicationLibslirp ProjectLibslirp3.1.0rc4AllAll
ApplicationLibslirp ProjectLibslirp3.1.0rc5AllAll
ApplicationLibslirp ProjectLibslirp3.0.0-AllAll
ApplicationLibslirp ProjectLibslirp3.0.0rc0AllAll
ApplicationLibslirp ProjectLibslirp3.0.0rc1AllAll
ApplicationLibslirp ProjectLibslirp3.0.0rc2AllAll
ApplicationLibslirp ProjectLibslirp3.0.0rc3AllAll
ApplicationLibslirp ProjectLibslirp3.0.0rc4AllAll
ApplicationLibslirp ProjectLibslirp2.9.0-AllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report