libyara/re.c in the regexp module in YARA 3.5.0 allows remote attackers to cause a denial of service (stack consumption) via a crafted rule that is mishandled in the yrre_emit function.
{
"binaries": [
{
"binary_version": "3.4.0+dfsg-2ubuntu0.1~esm1",
"binary_name": "libyara-dev"
},
{
"binary_version": "3.4.0+dfsg-2ubuntu0.1~esm1",
"binary_name": "libyara3"
},
{
"binary_version": "3.4.0+dfsg-2ubuntu0.1~esm1",
"binary_name": "python-yara"
},
{
"binary_version": "3.4.0+dfsg-2ubuntu0.1~esm1",
"binary_name": "python3-yara"
},
{
"binary_version": "3.4.0+dfsg-2ubuntu0.1~esm1",
"binary_name": "yara"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}