-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2021-dd62918333 2021-05-06 00:52:28.374770 --------------------------------------------------------------------------------
Name : python-yara Product : Fedora 33 Version : 4.1.0 Release : 1.fc33 URL : http://github.com/VirusTotal/yara-python/ Summary : Python binding for the YARA pattern matching tool Description :
Python binding for the YARA pattern matching tool. YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a Boolean expression which determine its logic.
-------------------------------------------------------------------------------- Update Information:
Update to bugfix release 4.1.0 Security fix for CVE-2017-9438, CVE-2021-3402, CVE-2019-19648, CVE-2017-9438 -------------------------------------------------------------------------------- ChangeLog:
* Tue Apr 27 2021 Michal Ambroz <rebus at, seznam.cz> - 4.1.0-1 - bump the python-yara as well to 4.1.0 * Tue Apr 27 2021 Michal Ambroz <rebus at, seznam.cz> - 4.0.5-3 - rebuild for new version of yara 4.1.0 * Sun Apr 25 2021 Michal Ambroz <rebus at, seznam.cz> - 4.0.5-2 - rebuild for epel * Sat Mar 13 2021 Michal Ambroz <rebus at, seznam.cz> - 4.0.5-1 - bump to version 4.0.5 * Wed Feb 10 2021 Michal Ambroz <rebus at, seznam.cz> - 4.0.4-1 - bump to version 4.0.4 * Thu Feb 4 2021 Michal Ambroz <rebus at, seznam.cz> - 4.0.3-1 - bump to version 4.0.3 * Wed Jan 27 2021 Fedora Release Engineering releng@fedoraproject.org - 4.0.2-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1459012 - CVE-2017-9438 yara: Stack consumption via a crafted rule mishandled in the _ur_re_emit function https://bugzilla.redhat.com/show_bug.cgi?id=1459012 [ 2 ] Bug #1930175 - CVE-2021-3402 libyara: Integer overflow in libyara/modules/macho/macho.c via a malicious Mach-O file https://bugzilla.redhat.com/show_bug.cgi?id=1930175 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2021-dd62918333' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------