UBUNTU-CVE-2026-2219

Source
https://ubuntu.com/security/CVE-2026-2219
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2219.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-2219
Upstream
Downstream
Related
Published
2026-03-07T09:16:00Z
Modified
2026-05-08T13:26:08.075003Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU).

References

Affected packages

Ubuntu:24.04:LTS / dpkg

Package

Name
dpkg
Purl
pkg:deb/ubuntu/dpkg@1.22.6ubuntu6.6?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.22.6ubuntu6.6

Affected versions

1.*
1.22.0ubuntu1
1.22.1ubuntu2
1.22.1ubuntu3
1.22.1ubuntu5
1.22.2ubuntu2
1.22.4ubuntu3
1.22.4ubuntu5
1.22.6ubuntu5
1.22.6ubuntu6
1.22.6ubuntu6.1
1.22.6ubuntu6.2
1.22.6ubuntu6.5

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1.22.6ubuntu6.6",
            "binary_name": "dpkg"
        },
        {
            "binary_version": "1.22.6ubuntu6.6",
            "binary_name": "dselect"
        },
        {
            "binary_version": "1.22.6ubuntu6.6",
            "binary_name": "libdpkg-perl"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2219.json"

Ubuntu:25.10 / dpkg

Package

Name
dpkg
Purl
pkg:deb/ubuntu/dpkg@1.22.21ubuntu3.2?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.22.21ubuntu3.2

Affected versions

1.*
1.22.18ubuntu2
1.22.18ubuntu3
1.22.21ubuntu1
1.22.21ubuntu3
1.22.21ubuntu3.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1.22.21ubuntu3.2",
            "binary_name": "dpkg"
        },
        {
            "binary_version": "1.22.21ubuntu3.2",
            "binary_name": "dselect"
        },
        {
            "binary_version": "1.22.21ubuntu3.2",
            "binary_name": "libdpkg-perl"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2219.json"