CVE-2026-2219

NameCVE-2026-2219
DescriptionIt was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU).
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1129722

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dpkg (PTS)bullseye1.20.13fixed
bullseye (security)1.20.10fixed
bookworm1.21.22vulnerable
trixie1.22.21vulnerable
forky, sid1.23.7fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dpkgsourcebullseye(not affected)
dpkgsource(unstable)1.23.61129722

Notes

[trixie] - dpkg <no-dsa> (Minor issue; can be fixed in point release)
[bookworm] - dpkg <no-dsa> (Minor issue; can be fixed in point release)
[bullseye] - dpkg <not-affected> (Vulnerable code introduced later)
Introduced with: https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=2c2f7066bd8c3209762762fa6905fa567b08ca5a (1.21.18)
Fixed by: https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=6610297a62c0780dd0e80b0e302ef64fdcc9d313 (1.23.6)

Search for package or bug name: Reporting problems