Heap buffer overflow in the yr_object_array_set_item() function in object.c in YARA 3.x allows a denial-of-service attack by scanning a crafted .NET file. Upstream patch: https://github.com/VirusTotal/yara/commit/4a342f01e5439b9bb901aff1c6c23c536baeeb3f
Created yara tracking bugs for this issue: Affects: epel-all [bug 1472781] Affects: fedora-all [bug 1472782]
already being handled in #1471490
ARRAY(0x558ebd712f58)