In YARA 3.8.1, bytecode in a specially crafted compiled rule can read uninitialized data from VM scratch memory in libyara/exec.c. This can allow attackers to discover addresses in the real stack (not the YARA virtual stack).
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "3.4.0+dfsg-2ubuntu0.1~esm1",
"binary_name": "libyara-dev"
},
{
"binary_version": "3.4.0+dfsg-2ubuntu0.1~esm1",
"binary_name": "libyara3"
},
{
"binary_version": "3.4.0+dfsg-2ubuntu0.1~esm1",
"binary_name": "python-yara"
},
{
"binary_version": "3.4.0+dfsg-2ubuntu0.1~esm1",
"binary_name": "python3-yara"
},
{
"binary_version": "3.4.0+dfsg-2ubuntu0.1~esm1",
"binary_name": "yara"
}
]
}
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "3.7.1-1ubuntu2+esm1",
"binary_name": "libyara-dev"
},
{
"binary_version": "3.7.1-1ubuntu2+esm1",
"binary_name": "libyara3"
},
{
"binary_version": "3.7.1-1ubuntu2+esm1",
"binary_name": "yara"
}
]
}