Description
A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.
Published: 2026-03-30
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via heap overflow
Action: Immediate patch
AI Analysis

Impact

The vulnerability is an integer overflow in libarchive’s ISO9660 zisofs block pointer allocation logic. Processing a specially crafted ISO image can trigger a heap buffer overflow, allowing an attacker to execute arbitrary code with the privileges of the process that uses libarchive. This weakness is classified as CWE‑190 and can lead to complete compromise of the affected system.

Affected Systems

Affected systems include Red Hat Enterprise Linux distributions 6 through 10, Red Hat Hardened Images, and Red Hat OpenShift Container Platform 4—all of which ship libarchive. The flaw is limited to 32‑bit builds and impacts any component that extracts ISO9660 images, such as the default container runtime and related tooling.

Risk and Exploitability

The CVSS score of 7.5 indicates high severity, yet the EPSS score is below 1 %, showing rare exploitation evidence. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires an application to process a malicious ISO image; thus, the attack vector is primarily through supply of untrusted ISO files, either locally or over a network service that extracts them. No additional conditions are noted beyond the use of libarchive on a 32‑bit system.

Generated by OpenCVE AI on April 14, 2026 at 17:28 UTC.

Remediation

Vendor Workaround

To mitigate this issue, avoid processing untrusted ISO9660 images with applications that utilize `libarchive`. Users should only extract or read content from ISO images obtained from trusted sources.


OpenCVE Recommended Actions

  • Apply the latest Red Hat security updates that replace the vulnerable libarchive library for all affected RHEL releases
  • Ensure that the system remains fully patched by running the standard package manager update commands (yum/dnf update) and verifying that the libarchive package is at or above the patched version
  • If the system must handle ISO images, restrict processing to ISO files obtained from trusted sources and avoid performing extraction on untrusted input
  • Consider using alternative libraries or tools that do not contain the vulnerable code if remediation is not immediately possible
  • Implement network controls to block exposure of applications that automatically extract ISO images from external sources

Generated by OpenCVE AI on April 14, 2026 at 17:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:rhel_e4s:8.8::baseos
cpe:/o:redhat:rhel_tus:8.8::baseos
References

Mon, 20 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:rhel_eus:9.6::appstream
cpe:/o:redhat:rhel_eus:9.6::baseos
References

Mon, 20 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Tus
CPEs cpe:/o:redhat:rhel_aus:8.6::baseos
cpe:/o:redhat:rhel_e4s:8.6::baseos
cpe:/o:redhat:rhel_tus:8.6::baseos
Vendors & Products Redhat rhel Tus
References

Mon, 20 Apr 2026 05:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Eus
CPEs cpe:/a:redhat:rhel_eus:9.4::appstream
cpe:/a:redhat:rhel_eus:9.4::crb
cpe:/o:redhat:rhel_eus:9.4::baseos
Vendors & Products Redhat rhel Eus
References

Mon, 20 Apr 2026 04:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:rhel_e4s:9.2::appstream
cpe:/o:redhat:rhel_e4s:9.2::baseos
References

Mon, 20 Apr 2026 02:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel E4s
CPEs cpe:/a:redhat:rhel_e4s:9.0::appstream
cpe:/o:redhat:rhel_e4s:9.0::baseos
Vendors & Products Redhat rhel E4s
References

Thu, 16 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Aus
Redhat rhel Els
CPEs cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:rhel_aus:8.2::baseos
cpe:/o:redhat:rhel_els:7
Vendors & Products Redhat rhel Aus
Redhat rhel Els
References

Thu, 16 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:8::crb
cpe:/o:redhat:enterprise_linux:8::baseos
References

Thu, 16 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:9 cpe:/a:redhat:enterprise_linux:9::appstream
cpe:/o:redhat:enterprise_linux:9::baseos
References

Tue, 14 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
References

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Libarchive
Libarchive libarchive
Redhat hardened Images
CPEs cpe:2.3:a:libarchive:libarchive:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:hardened_images:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Vendors & Products Libarchive
Libarchive libarchive
Redhat hardened Images

Tue, 14 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Tue, 14 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
References

Thu, 09 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat hummingbird
CPEs cpe:/a:redhat:hummingbird:1
Vendors & Products Redhat hummingbird

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat openshift Container Platform
Vendors & Products Redhat openshift Container Platform

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-122
CWE-680

Tue, 31 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-190
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-122
CWE-680

Mon, 30 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Mon, 30 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.
Title Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References

Subscriptions

Libarchive Libarchive
Redhat Enterprise Linux Hardened Images Hummingbird Openshift Openshift Container Platform Rhel Aus Rhel E4s Rhel Els Rhel Eus Rhel Tus
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-20T13:51:21.011Z

Reserved: 2026-03-30T07:39:27.352Z

Link: CVE-2026-5121

cve-icon Vulnrichment

Updated: 2026-03-31T13:51:59.651Z

cve-icon NVD

Status : Modified

Published: 2026-03-30T08:16:18.780

Modified: 2026-04-20T14:16:21.317

Link: CVE-2026-5121

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-30T07:44:15Z

Links: CVE-2026-5121 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:45:09Z

Weaknesses