libyara/re.c in the regex component in YARA 3.5.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted rule that is mishandled in the yrreexec function.
{ "binaries": [ { "binary_version": "3.4.0+dfsg-2build1", "binary_name": "libyara-dev" }, { "binary_version": "3.4.0+dfsg-2build1", "binary_name": "libyara3" }, { "binary_version": "3.4.0+dfsg-2build1", "binary_name": "python-yara" }, { "binary_version": "3.4.0+dfsg-2build1", "binary_name": "python3-yara" }, { "binary_version": "3.4.0+dfsg-2build1", "binary_name": "yara" } ] }