In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0, command_size may be inconsistent with the real size. A specially crafted MachO file can cause an out-of-bounds memory access, resulting in Denial of Service (application crash) or potential code execution. Reference: https://github.com/VirusTotal/yara/issues/1178
Created yara tracking bugs for this issue: Affects: epel-all [bug 1783442] Affects: fedora-all [bug 1783440]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.