--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2021-dd62918333
2021-05-06 00:52:28.374770
--------------------------------------------------------------------------------Name        : yara
Product     : Fedora 33
Version     : 4.1.0
Release     : 1.fc33
URL         : http://VirusTotal.github.io/yara/
Summary     : Pattern matching Swiss knife for malware researchers
Description :
YARA is a tool aimed at (but not limited to) helping malware researchers to
identify and classify malware samples. With YARA you can create descriptions
of malware families (or whatever you want to describe) based on textual or
binary patterns. Each description, a.k.a rule, consists of a set of strings
and a Boolean expression which determine its logic.

--------------------------------------------------------------------------------Update Information:

Update to bugfix release 4.1.0 Security fix for CVE-2017-9438,  CVE-2021-3402,
CVE-2019-19648, CVE-2017-9438
--------------------------------------------------------------------------------ChangeLog:

* Mon Apr 26 2021 Michal Ambroz  - 4.1.0-1
- bump to 4.1.0
* Sun Apr 25 2021 Michal Ambroz  - 4.0.5-2
- rebuild for epel
* Fri Feb  5 2021 Michal Ambroz  - 4.0.5-1
- bump to yara bugfix 4.0.5 release
* Wed Feb  3 2021 Michal Ambroz  - 4.0.4-1
- bump to yara bugfix 4.0.4 release
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #1459012 - CVE-2017-9438 yara: Stack consumption via a crafted rule mishandled in the _ur_re_emit function
        https://bugzilla.redhat.com/show_bug.cgi?id=1459012
  [ 2 ] Bug #1930175 - CVE-2021-3402 libyara: Integer overflow in libyara/modules/macho/macho.c via a malicious Mach-O file
        https://bugzilla.redhat.com/show_bug.cgi?id=1930175
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-dd62918333' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

Fedora 33: yara 2021-dd62918333

May 5, 2021
Update to bugfix release 4.1.0 Security fix for CVE-2017-9438, CVE-2021-3402, CVE-2019-19648, CVE-2017-9438

Summary

YARA is a tool aimed at (but not limited to) helping malware researchers to

identify and classify malware samples. With YARA you can create descriptions

of malware families (or whatever you want to describe) based on textual or

binary patterns. Each description, a.k.a rule, consists of a set of strings

and a Boolean expression which determine its logic.

Update to bugfix release 4.1.0 Security fix for CVE-2017-9438, CVE-2021-3402,

CVE-2019-19648, CVE-2017-9438

* Mon Apr 26 2021 Michal Ambroz - 4.1.0-1

- bump to 4.1.0

* Sun Apr 25 2021 Michal Ambroz - 4.0.5-2

- rebuild for epel

* Fri Feb 5 2021 Michal Ambroz - 4.0.5-1

- bump to yara bugfix 4.0.5 release

* Wed Feb 3 2021 Michal Ambroz - 4.0.4-1

- bump to yara bugfix 4.0.4 release

[ 1 ] Bug #1459012 - CVE-2017-9438 yara: Stack consumption via a crafted rule mishandled in the _ur_re_emit function

https://bugzilla.redhat.com/show_bug.cgi?id=1459012

[ 2 ] Bug #1930175 - CVE-2021-3402 libyara: Integer overflow in libyara/modules/macho/macho.c via a malicious Mach-O file

https://bugzilla.redhat.com/show_bug.cgi?id=1930175

su -c 'dnf upgrade --advisory FEDORA-2021-dd62918333' at the command

line. For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/security/

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/

Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

FEDORA-2021-dd62918333 2021-05-06 00:52:28.374770 Product : Fedora 33 Version : 4.1.0 Release : 1.fc33 URL : http://VirusTotal.github.io/yara/ Summary : Pattern matching Swiss knife for malware researchers Description : YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a Boolean expression which determine its logic. Update to bugfix release 4.1.0 Security fix for CVE-2017-9438, CVE-2021-3402, CVE-2019-19648, CVE-2017-9438 * Mon Apr 26 2021 Michal Ambroz - 4.1.0-1 - bump to 4.1.0 * Sun Apr 25 2021 Michal Ambroz - 4.0.5-2 - rebuild for epel * Fri Feb 5 2021 Michal Ambroz - 4.0.5-1 - bump to yara bugfix 4.0.5 release * Wed Feb 3 2021 Michal Ambroz - 4.0.4-1 - bump to yara bugfix 4.0.4 release [ 1 ] Bug #1459012 - CVE-2017-9438 yara: Stack consumption via a crafted rule mishandled in the _ur_re_emit function https://bugzilla.redhat.com/show_bug.cgi?id=1459012 [ 2 ] Bug #1930175 - CVE-2021-3402 libyara: Integer overflow in libyara/modules/macho/macho.c via a malicious Mach-O file https://bugzilla.redhat.com/show_bug.cgi?id=1930175 su -c 'dnf upgrade --advisory FEDORA-2021-dd62918333' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/ Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

Change Log

References

Update Instructions

Severity
Product : Fedora 33
Version : 4.1.0
Release : 1.fc33
URL : http://VirusTotal.github.io/yara/
Summary : Pattern matching Swiss knife for malware researchers

Related News