Package: yara
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for yara.

CVE-2018-19974[0]:
| In YARA 3.8.1, bytecode in a specially crafted compiled rule can read
| uninitialized data from VM scratch memory in libyara/exec.c. This can
| allow attackers to discover addresses in the real stack (not the YARA
| virtual stack).

CVE-2018-19975[1]:
| In YARA 3.8.1, bytecode in a specially crafted compiled rule can read
| data from any arbitrary address in memory, in libyara/exec.c.
| Specifically, OP_COUNT can read a DWORD.

CVE-2018-19976[2]:
| In YARA 3.8.1, bytecode in a specially crafted compiled rule is
| exposed to information about its environment, in libyara/exec.c. This
| is a consequence of the design of the YARA virtual machine.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-19974
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19974
[1] https://security-tracker.debian.org/tracker/CVE-2018-19975
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19975
[2] https://security-tracker.debian.org/tracker/CVE-2018-19976
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19976

Please adjust the affected versions in the BTS as needed.

Regards,

Markus

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to