Description
A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.
Published: 2026-03-13
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via CPU exhaustion
Action: Apply Patch
AI Analysis

Impact

An infinite loop is triggered in libarchive’s RAR5 decompression when a specially crafted archive is processed, causing continuous CPU consumption. The archive passes checksum validation and appears structurally valid, so the application cannot detect the issue before use. The result is a persistent denial‑of‑service condition affecting any service that automatically processes such archives.

Affected Systems

Red Hat AI Inference Server 3.2, Red Hat Discovery 2, Red Hat Enterprise Linux 10, 8, 7, 6, and RHEL 9 (including base, appstream, extended update support 9.0, 9.2, 9.4, 9.6), Red Hat Hardened Images, and OpenShift Container Platform 4 are all impacted by the libarchive vulnerability.

Risk and Exploitability

The CVSS score of 7.5 indicates a moderately high severity, but the EPSS score of less than 1% suggests a very low likelihood of exploitation in the wild as of now. It is not listed in the CISA KEV catalog. The vulnerability requires an attacker to deliver a malicious RAR5 archive to the target process, which could occur through remote upload or local file consumption depending on the application’s configuration. No known public exploit has been observed, but the lack of detection means that legitimate looking archives can silently consume system resources.

Generated by OpenCVE AI on April 15, 2026 at 15:59 UTC.

Remediation

Vendor Workaround

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.


OpenCVE Recommended Actions

  • Install the Red Hat Security Advisories RHSA-2026:5063, RHSA-2026:5080, RHSA-2026:6647, RHSA-2026:7093, RHSA-2026:7105, RHSA-2026:7106, RHSA-2026:7329, and RHSA-2026:7335 which contain the libarchive patch.
  • Upgrade libarchive to the patched version that eliminates the infinite loop in RAR5 decompression.
  • If the application does not require processing of RAR5 archives, disable or restrict handling of such files to prevent potential denial‑of‑service scenarios.

Generated by OpenCVE AI on April 15, 2026 at 15:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 06:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhui
CPEs cpe:/a:redhat:rhui:5::el9
Vendors & Products Redhat rhui
References

Wed, 22 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat insights Proxy
CPEs cpe:/a:redhat:insights_proxy:1.5::el9
Vendors & Products Redhat insights Proxy
References

Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4.18::el9
References

Mon, 20 Apr 2026 04:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat enterprise Linux Eus
CPEs cpe:/o:redhat:enterprise_linux_eus:10.0
Vendors & Products Redhat enterprise Linux Eus
References

Fri, 17 Apr 2026 13:45:00 +0000


Fri, 17 Apr 2026 11:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:ai_inference_server:3.3::el9
References

Thu, 16 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4 cpe:/a:redhat:openshift:4.13::el9
References

Thu, 09 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat ai Inference Server
CPEs cpe:/a:redhat:ai_inference_server:3.2::el9
Vendors & Products Redhat ai Inference Server
References

Thu, 09 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat discovery
CPEs cpe:/a:redhat:discovery:2::el9
Vendors & Products Redhat discovery
References

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Eus
CPEs cpe:/a:redhat:rhel_eus:9.4::appstream
cpe:/a:redhat:rhel_eus:9.4::crb
cpe:/a:redhat:rhel_eus:9.6::appstream
cpe:/o:redhat:rhel_eus:9.4::baseos
cpe:/o:redhat:rhel_eus:9.6::baseos
Vendors & Products Redhat rhel Eus
References

Wed, 08 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:rhel_e4s:9.0::appstream
cpe:/o:redhat:rhel_e4s:9.0::baseos
References

Mon, 06 Apr 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel E4s
CPEs cpe:/a:redhat:rhel_e4s:9.2::appstream
cpe:/o:redhat:rhel_e4s:9.2::baseos
Vendors & Products Redhat rhel E4s
References

Fri, 03 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat hummingbird
CPEs cpe:/a:redhat:hummingbird:1
Vendors & Products Redhat hummingbird

Thu, 19 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:9 cpe:/a:redhat:enterprise_linux:9::appstream
cpe:/o:redhat:enterprise_linux:9::baseos
References

Thu, 19 Mar 2026 08:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:10.1
References

Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat openshift Container Platform
Vendors & Products Redhat openshift Container Platform

Sat, 14 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Fri, 13 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.
Title Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
Weaknesses CWE-835
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Redhat Ai Inference Server Discovery Enterprise Linux Enterprise Linux Eus Hummingbird Insights Proxy Openshift Openshift Container Platform Rhel E4s Rhel Eus Rhui
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-23T06:07:50.360Z

Reserved: 2026-03-13T11:33:42.645Z

Link: CVE-2026-4111

cve-icon Vulnrichment

Updated: 2026-03-13T13:36:15.741Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-13T19:55:13.917

Modified: 2026-04-23T07:16:41.313

Link: CVE-2026-4111

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-11T00:00:00Z

Links: CVE-2026-4111 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:00:07Z

Weaknesses