CVE-2026-2219
Published: 07 March 2026
Summary
CVE-2026-2219 is a high-severity Infinite Loop (CWE-835) vulnerability in Debian (inferred from references). Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 5.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct mapping to application exploitation causing endpoint DoS via infinite loop/CPU exhaustion in dpkg-deb decompression.
NVD Description
It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning…
more
the CPU).
Deeper analysisAI
CVE-2026-2219 is a vulnerability in dpkg-deb, a component of dpkg, the Debian package management system. It stems from improper validation of the end of the data stream during decompression of zstd-compressed .deb archives, which can trigger a denial of service via an infinite loop that consumes CPU resources (CWE-835: Loop with Unreachable Exit Condition). The issue was published on 2026-03-07 and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
An unauthenticated remote attacker can exploit this vulnerability over the network with low attack complexity and no user interaction or privileges required. By providing a specially crafted zstd-compressed .deb archive for extraction via dpkg-deb, the attacker induces an infinite decompression loop, resulting in high availability impact through sustained CPU exhaustion, while confidentiality and integrity remain unaffected.
Mitigation is provided through a patch in the dpkg Git repository at commit 6610297a62c0780dd0e80b0e302ef64fdcc9d313. Further details, including the bug report and resolution, are documented in the Debian bug tracker at https://bugs.debian.org/1129722. Security practitioners should update affected dpkg installations promptly.
Details
- CWE(s)