Package: yara X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security
Hi, The following vulnerabilities were published for yara. CVE-2018-19974[0]: | In YARA 3.8.1, bytecode in a specially crafted compiled rule can read | uninitialized data from VM scratch memory in libyara/exec.c. This can | allow attackers to discover addresses in the real stack (not the YARA | virtual stack). CVE-2018-19975[1]: | In YARA 3.8.1, bytecode in a specially crafted compiled rule can read | data from any arbitrary address in memory, in libyara/exec.c. | Specifically, OP_COUNT can read a DWORD. CVE-2018-19976[2]: | In YARA 3.8.1, bytecode in a specially crafted compiled rule is | exposed to information about its environment, in libyara/exec.c. This | is a consequence of the design of the YARA virtual machine. If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2018-19974 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19974 [1] https://security-tracker.debian.org/tracker/CVE-2018-19975 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19975 [2] https://security-tracker.debian.org/tracker/CVE-2018-19976 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19976 Please adjust the affected versions in the BTS as needed. Regards, Markus
signature.asc
Description: OpenPGP digital signature