Name: | yara |
---|---|
Version: | 4.1.0 |
Release: | 1.el8 |
Architecture: | aarch64 |
Group: | Unspecified |
Size: | 626043 |
License: | ASL 2.0 |
RPM: | yara-4.1.0-1.el8.aarch64.rpm |
Source RPM: | yara-4.1.0-1.el8.src.rpm |
Build Date: | Wed May 12 2021 |
Build Host: | ca-buildarm05 |
Vendor: | Oracle America |
URL: | http://VirusTotal.github.io/yara/ |
Summary: | Pattern matching Swiss knife for malware researchers |
Description: | YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a Boolean expression which determine its logic. |
- bump to 4.1.0
- rebuild for epel
- bump to yara bugfix 4.0.5 release
- bump to yara bugfix 4.0.4 release
- bump to yara bugfix 4.0.2 release - fix build on epel7
- Rebuilt for protobuf 3.12
- bump to yara bugfix 4.0.1 release
- bump to yara 4.0.0 release
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
- bump to 3.11.0 release (#1760678) - BUGFIX: Some regexp character classes not matching correctly when used with “nocase” modifier (upstream #1117) - BUGFIX: Reduce the number of ERROR_TOO_MANY_RE_FIBERS errors for certain hex pattern containing large jumps (upstream #1107) - BUGFIX: Buffer overrun in “dotnet” module (upstream #1108) - BUGFIX: Memory leak while attaching to a process fails (upstream #1070)