Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-8249-1 | dpkg vulnerability |
Thu, 16 Apr 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | dpkg-deb Infinite Loop DoS via Improper Zstd Stream Validation |
Mon, 09 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-835 | |
| Metrics |
cvssV3_1
|
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Debian
Debian dpkg |
|
| Vendors & Products |
Debian
Debian dpkg |
Sat, 07 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 07 Mar 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU). | |
| References |
|
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2026-03-09T14:52:18.435Z
Reserved: 2026-02-08T15:48:51.824Z
Link: CVE-2026-2219
Updated: 2026-03-09T14:52:03.318Z
Status : Awaiting Analysis
Published: 2026-03-07T09:16:07.823
Modified: 2026-03-09T15:15:57.870
Link: CVE-2026-2219
No data.
OpenCVE Enrichment
Updated: 2026-04-16T11:00:10Z
Ubuntu USN