Infinite Loop in libarchive RAR5 Decompression causing DoS
CVE-2026-4111 Published on March 13, 2026
Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive
A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.
Vulnerability Analysis
CVE-2026-4111 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Timeline
Reported to Red Hat.
Made public.
Weakness Type
What is an Infinite Loop Vulnerability?
The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop. If the loop can be influenced by an attacker, this weakness could allow attackers to consume excessive resources such as CPU or memory.
CVE-2026-4111 has been classified to as an Infinite Loop vulnerability or weakness.
Products Associated with CVE-2026-4111
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2026-4111 are published in these products:
Affected Versions
Red Hat Enterprise Linux 10:- Version 0:3.7.7-5.el10_1 and below * is unaffected.
- Version 0:3.5.3-7.el9_7 and below * is unaffected.
- Version 0:3.5.3-7.el9_7 and below * is unaffected.
- Version 0:3.5.3-2.el9_0.3 and below * is unaffected.
- Version 0:3.5.3-5.el9_2.1 and below * is unaffected.
- Version 0:3.5.3-4.el9_4.2 and below * is unaffected.
- Version 0:3.5.3-6.el9_6.1 and below * is unaffected.
- Version 413.92.202604080111-0 and below * is unaffected.
- Version sha256:54616c9f3e4d27120504b0b2020432ef3ff85286a50de7be842f05df0cfcd69e and below * is unaffected.
- Version sha256:0ec114881d9dcd28a5dbbb2ec0ea1301ad87d5ae133121ce8167ef29d19802cc and below * is unaffected.
- Version sha256:813ba7ccd1696b44deb90d9e6cd8af114bdb47781eae7f27246a81fba062a892 and below * is unaffected.
- Version sha256:be6d568f28044533e4ad80f0856407c359e2eaf31a6b89cada433e6575d2300e and below * is unaffected.
- Version sha256:040dadd657afdb9f0914f896a4962fd3dbf40b70c8037e4d72b6801b766c9b7d and below * is unaffected.
- Version sha256:062310de4b34e278f8c7e4634def673a77d1228d493541ef1264ba4cb83b68eb and below * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.