libarchive-3.5.3-9.el9_7
エラータID: AXSA:2026-455:02
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: libarchive: Information disclosure via heap out-of-bounds read in RAR archive processing (CVE-2026-4424)
* libarchive: libarchive: Arbitrary code execution via integer overflow in ISO9660 image processing (CVE-2026-5121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-4424
A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.
CVE-2026-5121
A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.
Update packages.
A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.
A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.
N/A
SRPMS
- libarchive-3.5.3-9.el9_7.src.rpm
MD5: d3d3acf9b3cff05380861e92ca703149
SHA-256: e5be1a0c210bc18553c7590ebf13771c58f5367ef2b9002fa92f268e42432567
Size: 6.73 MB
Asianux Server 9 for x86_64
- bsdtar-3.5.3-9.el9_7.x86_64.rpm
MD5: 13d1dbdd082c6ede524c67f7395aa93a
SHA-256: ffbe14bf1212f1ec1ac60c5bb9d89ffdce337684db881ab4580a6c5aedb81e85
Size: 61.73 kB - libarchive-3.5.3-9.el9_7.i686.rpm
MD5: 9e61ed8102183afa4778c88c3deca836
SHA-256: 726c327b8b9c9d530f9ae971e78599daa793e6433af40ae19137d18e0f916b93
Size: 434.36 kB - libarchive-3.5.3-9.el9_7.x86_64.rpm
MD5: 1fa14e47e7bcb2c33515fac3d917510f
SHA-256: 18f6c2cd65e24e29a6dd1b9f5eb52acf8a949f3f9d9e380ac6d89bb39a6c2c1a
Size: 386.94 kB - libarchive-devel-3.5.3-9.el9_7.i686.rpm
MD5: 2c475965b29ec8d3bf9833d592c2bf86
SHA-256: 0dfd4210cac9eb4c99897e1723ea4ffa0451ac42ac923e3af4fd8786dfdb2226
Size: 134.55 kB - libarchive-devel-3.5.3-9.el9_7.x86_64.rpm
MD5: c68e20ddaf93b311f99c1522ac53f079
SHA-256: d1613e2dea70edffdc7f803012ca75c0122b99281bf587f39f252e4fff591233
Size: 134.52 kB