DEBIAN-CVE-2026-2219

Source
https://security-tracker.debian.org/tracker/CVE-2026-2219
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-2219.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-2219
Upstream
Published
2026-03-07T09:16:07.823Z
Modified
2026-03-14T15:00:10.395339Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU).

References

Affected packages

Debian:12 / dpkg

Package

Name
dpkg
Purl
pkg:deb/debian/dpkg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.21.22
1.22.0
1.22.1
1.22.2
1.22.3
1.22.4
1.22.5
1.22.6
1.22.7
1.22.8
1.22.9
1.22.10
1.22.11
1.22.12
1.22.13
1.22.14
1.22.15
1.22.16
1.22.17
1.22.18
1.22.19
1.22.20
1.22.21
1.22.22
1.23.0
1.23.1
1.23.2
1.23.3
1.23.4
1.23.5
1.23.6
1.23.7

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-2219.json"

Debian:13 / dpkg

Package

Name
dpkg
Purl
pkg:deb/debian/dpkg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.22.22

Affected versions

1.*
1.22.21

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-2219.json"

Debian:14 / dpkg

Package

Name
dpkg
Purl
pkg:deb/debian/dpkg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.23.6

Affected versions

1.*
1.22.21
1.22.22
1.23.0
1.23.1
1.23.2
1.23.3
1.23.4
1.23.5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-2219.json"