High severity7.5NVD Advisory· Published Mar 19, 2026· Updated May 14, 2026
CVE-2026-4424
CVE-2026-4424
Description
A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.
Affected products
13- cpe:2.3:a:libarchive:libarchive:-:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:hardened_images:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform:4.16:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform_for_arm64:4.16:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform_for_power:4.16:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
31- access.redhat.com/errata/RHSA-2026:10065nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2026:10097nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2026:11768nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2026:8492nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2026:8510nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2026:8517nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2026:8521nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2026:8534nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2026:8864nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2026:8865nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2026:8866nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2026:8867nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2026:8873nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2026:8908nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2026:8944nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2026:9026nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2026:9592nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2026:9832nvdThird Party Advisory
- access.redhat.com/security/cve/CVE-2026-4424nvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party Advisory
- github.com/libarchive/libarchive/pull/2898nvdIssue TrackingThird Party Advisory
- access.redhat.com/errata/RHSA-2026:12071nvd
- access.redhat.com/errata/RHSA-2026:12274nvd
- access.redhat.com/errata/RHSA-2026:13812nvd
- access.redhat.com/errata/RHSA-2026:14773nvd
- access.redhat.com/errata/RHSA-2026:14937nvd
- access.redhat.com/errata/RHSA-2026:15087nvd
- access.redhat.com/errata/RHSA-2026:16008nvd
- access.redhat.com/errata/RHSA-2026:16009nvd
- access.redhat.com/errata/RHSA-2026:16030nvd
- access.redhat.com/errata/RHSA-2026:16174nvd
News mentions
0No linked articles in our index yet.