PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-4424 Redhat CVE debrief

CVE-2026-4424 is a high-severity information-disclosure issue in libarchive's RAR handling. A specially crafted RAR archive can trigger a heap out-of-bounds read and expose sensitive heap memory, with no authentication or user interaction required.

Vendor
Redhat
Product
CVE-2026-4424
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-03-19
Original CVE updated
2026-05-12
Advisory published
2026-03-19
Advisory updated
2026-05-12

Who should care

Security teams, Linux/package maintainers, and administrators running libarchive directly or through Red Hat products listed in NVD affected-configuration data. Systems that automatically preview, scan, or extract untrusted archives should treat this as a priority issue.

Technical summary

NVD and Red Hat's advisory references describe a heap out-of-bounds read in libarchive's RAR archive processing logic. The flaw stems from improper validation of the LZSS sliding window size after transitions between compression methods. The CVSS vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) indicates a remotely reachable confidentiality impact only, consistent with heap memory disclosure rather than integrity or availability loss. NVD maps the issue to CWE-125.

Defensive priority

High. Prioritize remediation where libarchive is exposed to untrusted RAR content or embedded in services that process archives automatically, because the issue is remotely triggerable and can leak heap memory without user interaction.

Recommended defensive actions

  • Upgrade libarchive to a vendor-fixed version when available from your distribution or upstream package channel.
  • Apply the relevant Red Hat advisories listed in NVD for affected products and confirm the corrected package build is deployed.
  • Inventory systems and applications that use libarchive, including container images and appliance base layers.
  • Restrict or sandbox processing of untrusted archive files until patched systems are in place.
  • Treat extracted or parsed archive data from untrusted sources as sensitive until remediation is complete and review any exposed memory-sensitive workflows.

Evidence notes

This debrief is based on the NVD CVE record and its modified-feed entry, which provide the vulnerability description, CVSS vector, affected CPEs, and CWE mapping. The NVD reference set includes Red Hat security advisories plus issue-tracking links to a Red Hat Bugzilla entry and a libarchive GitHub pull request, supporting the downstream-impact and fix-tracking context. Published date used here is the CVE publication timestamp supplied with the record; no later generation or review date is treated as the issue date.

Official resources

CVE published: 2026-03-19T15:16:28.300Z; CVE modified and source modified: 2026-05-12T10:16:46.960Z. No KEV listing was supplied.