libyara/re.c in the regex component in YARA 3.5.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted rule that is mishandled in the yrreexec function.
{ "binaries": [ { "binary_name": "libyara-dev", "binary_version": "3.4.0+dfsg-2build1" }, { "binary_name": "libyara3", "binary_version": "3.4.0+dfsg-2build1" }, { "binary_name": "python-yara", "binary_version": "3.4.0+dfsg-2build1" }, { "binary_name": "python3-yara", "binary_version": "3.4.0+dfsg-2build1" }, { "binary_name": "yara", "binary_version": "3.4.0+dfsg-2build1" } ] }