Description
Buffer overflow in the mpfr_strtofr function in GNU MPFR before 3.1.2-p11 allows context-dependent attackers to have unspecified impact via vectors related to incorrect documentation for mpn_set_str.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-9293 | Buffer overflow in the mpfr_strtofr function in GNU MPFR before 3.1.2-p11 allows context-dependent attackers to have unspecified impact via vectors related to incorrect documentation for mpn_set_str. |
References
History
Mon, 23 Jun 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat rhel Els |
|
| CPEs | cpe:/o:redhat:rhel_els:7 | |
| Vendors & Products |
Redhat
Redhat rhel Els |
Fri, 30 May 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
threat_severity
|
threat_severity
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T13:47:41.281Z
Reserved: 2015-01-03T00:00:00.000Z
Link: CVE-2014-9474
No data.
Status : Modified
Published: 2017-10-10T01:30:20.297
Modified: 2026-05-13T00:24:29.033
Link: CVE-2014-9474
OpenCVE Enrichment
No data.
Weaknesses
EUVD