In YARA 3.8.1, bytecode in a specially crafted compiled rule can read uninitialized data from VM scratch memory in libyara/exec.c. This can allow attackers to discover addresses in the real stack (not the YARA virtual stack).
{
"binaries": [
{
"binary_version": "3.4.0+dfsg-2build1",
"binary_name": "libyara-dev"
},
{
"binary_version": "3.4.0+dfsg-2build1",
"binary_name": "libyara3"
},
{
"binary_version": "3.4.0+dfsg-2build1",
"binary_name": "python-yara"
},
{
"binary_version": "3.4.0+dfsg-2build1",
"binary_name": "python3-yara"
},
{
"binary_version": "3.4.0+dfsg-2build1",
"binary_name": "yara"
}
]
}