libyara/re.c in the regexp module in YARA 3.5.0 allows remote attackers to cause a denial of service (stack consumption) via a crafted rule that is mishandled in the yrre_emit function.
{
"binaries": [
{
"binary_name": "libyara-dev",
"binary_version": "3.4.0+dfsg-2ubuntu0.1~esm1"
},
{
"binary_name": "libyara3",
"binary_version": "3.4.0+dfsg-2ubuntu0.1~esm1"
},
{
"binary_name": "python-yara",
"binary_version": "3.4.0+dfsg-2ubuntu0.1~esm1"
},
{
"binary_name": "python3-yara",
"binary_version": "3.4.0+dfsg-2ubuntu0.1~esm1"
},
{
"binary_name": "yara",
"binary_version": "3.4.0+dfsg-2ubuntu0.1~esm1"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}