Fedora Linux 8568 Published by

A python-yara security update has been released for Fedora 33.



SECURITY: Fedora 33 Update: python-yara-4.1.0-1.fc33


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2021-dd62918333
2021-05-06 00:52:28.374770
--------------------------------------------------------------------------------

Name : python-yara
Product : Fedora 33
Version : 4.1.0
Release : 1.fc33
URL :   http://github.com/VirusTotal/yara-python/
Summary : Python binding for the YARA pattern matching tool
Description :

Python binding for the YARA pattern matching tool.
YARA is a tool aimed at (but not limited to) helping malware researchers to
identify and classify malware samples. With YARA you can create descriptions
of malware families (or whatever you want to describe) based on textual or
binary patterns. Each description, a.k.a rule, consists of a set of strings
and a Boolean expression which determine its logic.

--------------------------------------------------------------------------------
Update Information:

Update to bugfix release 4.1.0 Security fix for CVE-2017-9438, CVE-2021-3402,
CVE-2019-19648, CVE-2017-9438
--------------------------------------------------------------------------------
ChangeLog:

* Tue Apr 27 2021 Michal Ambroz - 4.1.0-1
- bump the python-yara as well to 4.1.0
* Tue Apr 27 2021 Michal Ambroz - 4.0.5-3
- rebuild for new version of yara 4.1.0
* Sun Apr 25 2021 Michal Ambroz - 4.0.5-2
- rebuild for epel
* Sat Mar 13 2021 Michal Ambroz - 4.0.5-1
- bump to version 4.0.5
* Wed Feb 10 2021 Michal Ambroz - 4.0.4-1
- bump to version 4.0.4
* Thu Feb 4 2021 Michal Ambroz - 4.0.3-1
- bump to version 4.0.3
* Wed Jan 27 2021 Fedora Release Engineering - 4.0.2-3
- Rebuilt for   https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #1459012 - CVE-2017-9438 yara: Stack consumption via a crafted rule mishandled in the _ur_re_emit function
  https://bugzilla.redhat.com/show_bug.cgi?id=1459012
[ 2 ] Bug #1930175 - CVE-2021-3402 libyara: Integer overflow in libyara/modules/macho/macho.c via a malicious Mach-O file
  https://bugzilla.redhat.com/show_bug.cgi?id=1930175
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-dd62918333' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys