{
  "threat_severity" : "Important",
  "public_date" : "2026-03-11T00:00:00Z",
  "bugzilla" : {
    "description" : "libarchive: Infinite Loop Denial of Service in RAR5 Decompression via archive_read_data() in libarchive",
    "id" : "2446453",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2446453"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-835",
  "details" : [ "A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.", "A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives." ],
  "statement" : "The Red Hat Product Security team would likely assess the severity of this vulnerability as High because it allows remote attackers to cause a persistent denial-of-service condition using a small crafted archive file. Successful exploitation requires no authentication, no special configuration, and no user interaction in environments that automatically process uploaded archives. By repeatedly submitting malicious archives, an attacker can exhaust CPU resources or worker threads in services such as file upload systems, CI/CD pipelines, mail scanners, and content indexing services that rely on libarchive for archive extraction.",
  "acknowledgement" : "Red Hat would like to thank Elhanan Haenel for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "release_date" : "2026-03-19T00:00:00Z",
    "advisory" : "RHSA-2026:5063",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10.1",
    "package" : "libarchive-0:3.7.7-5.el10_1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2026-03-19T00:00:00Z",
    "advisory" : "RHSA-2026:5080",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "libarchive-0:3.5.3-7.el9_7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2026-03-19T00:00:00Z",
    "advisory" : "RHSA-2026:5080",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "libarchive-0:3.5.3-7.el9_7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions",
    "release_date" : "2026-04-06T00:00:00Z",
    "advisory" : "RHSA-2026:6647",
    "cpe" : "cpe:/a:redhat:rhel_e4s:9.2",
    "package" : "libarchive-0:3.5.3-5.el9_2.1"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "libarchive",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "libarchive",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "libarchive",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Hardened Images 1",
    "fix_state" : "Affected",
    "package_name" : "libarchive",
    "cpe" : "cpe:/a:redhat:hummingbird:1"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Affected",
    "package_name" : "rhcos",
    "cpe" : "cpe:/a:redhat:openshift:4"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2026-4111\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-4111\nhttps://github.com/libarchive/libarchive/pull/2877" ],
  "name" : "CVE-2026-4111",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}