{ "CVE_data_meta" : { "ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "DATE_ASSIGNED" : "2017-08-22T17:29:33.424422", "ID" : "CVE-2017-1000198", "REQUESTER" : "mgerstner@suse.de", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "tcmu-runner", "version" : { "version_data" : [ { "version_value" : "0.9.0 to 1.2.0" } ] } } ] }, "vendor_name" : "https://github.com/open-iscsi/tcmu-runner" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "tcmu-runner daemon version 0.9.0 to 1.2.0 is vulnerable to invalid memory references in the handler_glfs.so handler resulting in denial of service" } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "denial of service" } ] } ] }, "references" : { "reference_data" : [ { "name" : "https://github.com/open-iscsi/tcmu-runner/commit/61bd03e600d2abf309173e9186f4d465bb1b7157", "refsource" : "MISC", "url" : "https://github.com/open-iscsi/tcmu-runner/commit/61bd03e600d2abf309173e9186f4d465bb1b7157" }, { "name" : "RHSA-2017:3277", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2017:3277" } ] } }