An Infinite Loop Denial-of-Service vulnerability exists in the RAR5 decompression implementation of libarchive. The flaw occurs in the uncompress_file() routine within archive_read_support_format_rar5.c due to a logical deadlock between the filter activation threshold and the half-window output limiter. When a specially crafted RAR5 archive is processed through archive_read_data(), the decompressor enters a state where neither the filter activation condition nor the output window progress condition can be satisfied. As a result, the loop continues indefinitely while consuming 100% CPU. Because the archive passes all CRC and checksum validation, the issue can be triggered using a valid-looking archive without authentication or user interaction. This allows attackers to exhaust worker threads or processing pipelines in applications that automatically extract or scan archives.
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:5063 https://access.redhat.com/errata/RHSA-2026:5063
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:5080 https://access.redhat.com/errata/RHSA-2026:5080
This issue has been addressed in the following products: Service Interconnect 1 for RHEL 9 Via RHSA-2026:6481 https://access.redhat.com/errata/RHSA-2026:6481
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2026:6647 https://access.redhat.com/errata/RHSA-2026:6647
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2026:7093 https://access.redhat.com/errata/RHSA-2026:7093
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.6 Extended Update Support Via RHSA-2026:7105 https://access.redhat.com/errata/RHSA-2026:7105
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2026:7106 https://access.redhat.com/errata/RHSA-2026:7106
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.13 Via RHSA-2026:7239 https://access.redhat.com/errata/RHSA-2026:7239
This issue has been addressed in the following products: Red Hat Enterprise Linux 10.0 Extended Update Support Via RHSA-2026:8865 https://access.redhat.com/errata/RHSA-2026:8865
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.18 Via RHSA-2026:8423 https://access.redhat.com/errata/RHSA-2026:8423
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.19 Via RHSA-2026:10081 https://access.redhat.com/errata/RHSA-2026:10081
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.16 Via RHSA-2026:10097 https://access.redhat.com/errata/RHSA-2026:10097