Vulnerability Description
A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2026:10065
- https://access.redhat.com/errata/RHSA-2026:10081
- https://access.redhat.com/errata/RHSA-2026:10097
- https://access.redhat.com/errata/RHSA-2026:14773
- https://access.redhat.com/errata/RHSA-2026:15087
- https://access.redhat.com/errata/RHSA-2026:16008
- https://access.redhat.com/errata/RHSA-2026:16009
- https://access.redhat.com/errata/RHSA-2026:16174
- https://access.redhat.com/errata/RHSA-2026:17596
- https://access.redhat.com/errata/RHSA-2026:5063
- https://access.redhat.com/errata/RHSA-2026:5080
- https://access.redhat.com/errata/RHSA-2026:6647
- https://access.redhat.com/errata/RHSA-2026:7093
- https://access.redhat.com/errata/RHSA-2026:7105
- https://access.redhat.com/errata/RHSA-2026:7106
FAQ
What is CVE-2026-4111?
CVE-2026-4111 is a vulnerability with a CVSS score of 7.5 (HIGH). A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed...
How severe is CVE-2026-4111?
CVE-2026-4111 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-4111?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.