libyara/re.c in the regexp module in YARA 3.5.0 allows remote attackers to cause a denial of service (stack consumption) via a crafted rule that is mishandled in the yrre_emit function.
{ "binaries": [ { "binary_name": "libyara-dev", "binary_version": "3.7.1-1ubuntu2" }, { "binary_name": "libyara3", "binary_version": "3.7.1-1ubuntu2" }, { "binary_name": "libyara3-dbgsym", "binary_version": "3.7.1-1ubuntu2" }, { "binary_name": "yara", "binary_version": "3.7.1-1ubuntu2" }, { "binary_name": "yara-dbgsym", "binary_version": "3.7.1-1ubuntu2" }, { "binary_name": "yara-doc", "binary_version": "3.7.1-1ubuntu2" } ], "ubuntu_priority": "medium", "availability": "No subscription required" }