libyara/re.c in the regex component in YARA 3.5.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted rule that is mishandled in the yrreexec function.
{
"binaries": [
{
"binary_version": "3.4.0+dfsg-2build1",
"binary_name": "libyara-dev"
},
{
"binary_version": "3.4.0+dfsg-2build1",
"binary_name": "libyara3"
},
{
"binary_version": "3.4.0+dfsg-2build1",
"binary_name": "python-yara"
},
{
"binary_version": "3.4.0+dfsg-2build1",
"binary_name": "python3-yara"
},
{
"binary_version": "3.4.0+dfsg-2build1",
"binary_name": "yara"
}
]
}