{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2017-7963","title":"Title"},{"category":"description","text":"The GNU Multiple Precision Arithmetic Library (GMP) interfaces for PHP through 7.1.4 allow attackers to cause a denial of service (memory consumption and application crash) via operations on long strings. NOTE: the vendor disputes this, stating \"There is no security issue here, because GMP safely aborts in case of an OOM condition. The only attack vector here is denial of service. However, if you allow attacker-controlled, unbounded allocations you have a DoS vector regardless of GMP's OOM behavior.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2017-7963","url":"https://www.suse.com/security/cve/CVE-2017-7963"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1035029 for CVE-2017-7963","url":"https://bugzilla.suse.com/1035029"},{"category":"external","summary":"SUSE Bug 990636 for CVE-2017-7963","url":"https://bugzilla.suse.com/990636"}],"title":"SUSE CVE CVE-2017-7963","tracking":{"current_release_date":"2025-07-08T00:23:47Z","generator":{"date":"2023-02-15T04:46:25Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2017-7963","initial_release_date":"2023-02-15T04:46:25Z","revision_history":[{"date":"2023-02-15T04:46:25Z","number":"2","summary":"Current version"},{"date":"2025-01-01T08:58:20Z","number":"3","summary":"Current version"},{"date":"2025-02-18T07:47:52Z","number":"4","summary":"Current version"},{"date":"2025-07-08T00:23:47Z","number":"5","summary":"Current version"}],"status":"interim","version":"5"}}}