UBUNTU-CVE-2026-2219

Source
https://ubuntu.com/security/CVE-2026-2219
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2219.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2026-2219
Upstream
Published
2026-03-07T09:16:00Z
Modified
2026-03-13T18:01:19.907279Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU).

References

Affected packages

Ubuntu:18.04:LTS
dpkg

Package

Name
dpkg
Purl
pkg:deb/ubuntu/dpkg@1.19.0.5ubuntu2.4?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.18.24ubuntu1
1.19.0.4ubuntu1
1.19.0.5ubuntu1
1.19.0.5ubuntu2
1.19.0.5ubuntu2.1
1.19.0.5ubuntu2.2
1.19.0.5ubuntu2.3
1.19.0.5ubuntu2.4

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.19.0.5ubuntu2.4",
            "binary_name": "dpkg"
        },
        {
            "binary_version": "1.19.0.5ubuntu2.4",
            "binary_name": "dpkg-dev"
        },
        {
            "binary_version": "1.19.0.5ubuntu2.4",
            "binary_name": "dselect"
        },
        {
            "binary_version": "1.19.0.5ubuntu2.4",
            "binary_name": "libdpkg-dev"
        },
        {
            "binary_version": "1.19.0.5ubuntu2.4",
            "binary_name": "libdpkg-perl"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2219.json"
Ubuntu:20.04:LTS
dpkg

Package

Name
dpkg
Purl
pkg:deb/ubuntu/dpkg@1.19.7ubuntu3.2?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.19.7ubuntu2
1.19.7ubuntu3
1.19.7ubuntu3.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.19.7ubuntu3.2",
            "binary_name": "dpkg"
        },
        {
            "binary_version": "1.19.7ubuntu3.2",
            "binary_name": "dpkg-dev"
        },
        {
            "binary_version": "1.19.7ubuntu3.2",
            "binary_name": "dselect"
        },
        {
            "binary_version": "1.19.7ubuntu3.2",
            "binary_name": "libdpkg-dev"
        },
        {
            "binary_version": "1.19.7ubuntu3.2",
            "binary_name": "libdpkg-perl"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2219.json"
Ubuntu:22.04:LTS
dpkg

Package

Name
dpkg
Purl
pkg:deb/ubuntu/dpkg@1.21.1ubuntu2.6?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.20.9ubuntu2
1.20.9ubuntu3
1.21.1ubuntu1
1.21.1ubuntu2
1.21.1ubuntu2.1
1.21.1ubuntu2.2
1.21.1ubuntu2.3
1.21.1ubuntu2.6

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.21.1ubuntu2.6",
            "binary_name": "dpkg"
        },
        {
            "binary_version": "1.21.1ubuntu2.6",
            "binary_name": "dpkg-dev"
        },
        {
            "binary_version": "1.21.1ubuntu2.6",
            "binary_name": "dselect"
        },
        {
            "binary_version": "1.21.1ubuntu2.6",
            "binary_name": "libdpkg-dev"
        },
        {
            "binary_version": "1.21.1ubuntu2.6",
            "binary_name": "libdpkg-perl"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2219.json"
Ubuntu:24.04:LTS
dpkg

Package

Name
dpkg
Purl
pkg:deb/ubuntu/dpkg@1.22.6ubuntu6.5?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.22.0ubuntu1
1.22.1ubuntu2
1.22.1ubuntu3
1.22.1ubuntu5
1.22.2ubuntu2
1.22.4ubuntu3
1.22.4ubuntu5
1.22.6ubuntu5
1.22.6ubuntu6
1.22.6ubuntu6.1
1.22.6ubuntu6.2
1.22.6ubuntu6.5

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.22.6ubuntu6.5",
            "binary_name": "dpkg"
        },
        {
            "binary_version": "1.22.6ubuntu6.5",
            "binary_name": "dpkg-dev"
        },
        {
            "binary_version": "1.22.6ubuntu6.5",
            "binary_name": "dselect"
        },
        {
            "binary_version": "1.22.6ubuntu6.5",
            "binary_name": "libdpkg-dev"
        },
        {
            "binary_version": "1.22.6ubuntu6.5",
            "binary_name": "libdpkg-perl"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2219.json"
Ubuntu:25.10
dpkg

Package

Name
dpkg
Purl
pkg:deb/ubuntu/dpkg@1.22.21ubuntu3.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.22.18ubuntu2
1.22.18ubuntu3
1.22.21ubuntu1
1.22.21ubuntu3
1.22.21ubuntu3.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.22.21ubuntu3.1",
            "binary_name": "dpkg"
        },
        {
            "binary_version": "1.22.21ubuntu3.1",
            "binary_name": "dpkg-dev"
        },
        {
            "binary_version": "1.22.21ubuntu3.1",
            "binary_name": "dselect"
        },
        {
            "binary_version": "1.22.21ubuntu3.1",
            "binary_name": "libdpkg-dev"
        },
        {
            "binary_version": "1.22.21ubuntu3.1",
            "binary_name": "libdpkg-perl"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2219.json"
Ubuntu:Pro:14.04:LTS
dpkg

Package

Name
dpkg
Purl
pkg:deb/ubuntu/dpkg@1.17.5ubuntu5.8+esm1?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.16.12ubuntu1
1.17.1ubuntu1
1.17.5ubuntu1
1.17.5ubuntu2
1.17.5ubuntu3
1.17.5ubuntu4
1.17.5ubuntu5
1.17.5ubuntu5.1
1.17.5ubuntu5.2
1.17.5ubuntu5.3
1.17.5ubuntu5.4
1.17.5ubuntu5.5
1.17.5ubuntu5.6
1.17.5ubuntu5.7
1.17.5ubuntu5.8
1.17.5ubuntu5.8+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.17.5ubuntu5.8+esm1",
            "binary_name": "dpkg"
        },
        {
            "binary_version": "1.17.5ubuntu5.8+esm1",
            "binary_name": "dpkg-dev"
        },
        {
            "binary_version": "1.17.5ubuntu5.8+esm1",
            "binary_name": "dselect"
        },
        {
            "binary_version": "1.17.5ubuntu5.8+esm1",
            "binary_name": "libdpkg-dev"
        },
        {
            "binary_version": "1.17.5ubuntu5.8+esm1",
            "binary_name": "libdpkg-perl"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2219.json"
Ubuntu:Pro:16.04:LTS
dpkg

Package

Name
dpkg
Purl
pkg:deb/ubuntu/dpkg@1.18.4ubuntu1.7+esm1?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.18.2ubuntu5
1.18.3ubuntu1
1.18.4ubuntu1
1.18.4ubuntu1.1
1.18.4ubuntu1.2
1.18.4ubuntu1.3
1.18.4ubuntu1.4
1.18.4ubuntu1.5
1.18.4ubuntu1.6
1.18.4ubuntu1.7
1.18.4ubuntu1.7+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.18.4ubuntu1.7+esm1",
            "binary_name": "dpkg"
        },
        {
            "binary_version": "1.18.4ubuntu1.7+esm1",
            "binary_name": "dpkg-dev"
        },
        {
            "binary_version": "1.18.4ubuntu1.7+esm1",
            "binary_name": "dselect"
        },
        {
            "binary_version": "1.18.4ubuntu1.7+esm1",
            "binary_name": "libdpkg-dev"
        },
        {
            "binary_version": "1.18.4ubuntu1.7+esm1",
            "binary_name": "libdpkg-perl"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2219.json"