In YARA 3.8.1, bytecode in a specially crafted compiled rule can read uninitialized data from VM scratch memory in libyara/exec.c. This can allow attackers to discover addresses in the real stack (not the YARA virtual stack).
{
"binaries": [
{
"binary_name": "libyara-dev",
"binary_version": "3.4.0+dfsg-2build1"
},
{
"binary_name": "libyara3",
"binary_version": "3.4.0+dfsg-2build1"
},
{
"binary_name": "python-yara",
"binary_version": "3.4.0+dfsg-2build1"
},
{
"binary_name": "python3-yara",
"binary_version": "3.4.0+dfsg-2build1"
},
{
"binary_name": "yara",
"binary_version": "3.4.0+dfsg-2build1"
}
]
}