UBUNTU-CVE-2025-66037

Source
https://ubuntu.com/security/CVE-2025-66037
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-66037.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2025-66037
Upstream
Published
2026-03-30T18:16:00Z
Modified
2026-04-07T12:01:30.688919Z
Severity
  • 3.9 (Low) CVSS_V3 - CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, feeding a crafted input to the fuzzpkcs15reader harness causes OpenSC to perform an out-of-bounds heap read in the X.509/SPKI handling path. Specifically, scpkcs15pubkeyfromspki_fields() allocates a zero-length buffer and then reads one byte past the end of that allocation. This issue has been patched in version 0.27.0.

References

Affected packages

Ubuntu:25.10
opensc

Package

Name
opensc
Purl
pkg:deb/ubuntu/opensc@0.26.1-3?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.26.1-1
0.26.1-2
0.26.1-3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "opensc",
            "binary_version": "0.26.1-3"
        },
        {
            "binary_name": "opensc-pkcs11",
            "binary_version": "0.26.1-3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-66037.json"
Ubuntu:Pro:16.04:LTS
opensc

Package

Name
opensc
Purl
pkg:deb/ubuntu/opensc@0.15.0-1ubuntu1+esm3?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.15.0-1ubuntu1
0.15.0-1ubuntu1+esm1
0.15.0-1ubuntu1+esm2
0.15.0-1ubuntu1+esm3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "opensc",
            "binary_version": "0.15.0-1ubuntu1+esm3"
        },
        {
            "binary_name": "opensc-pkcs11",
            "binary_version": "0.15.0-1ubuntu1+esm3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-66037.json"
Ubuntu:Pro:18.04:LTS
opensc

Package

Name
opensc
Purl
pkg:deb/ubuntu/opensc@0.17.0-3ubuntu0.1~esm3?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.17.0-1
0.17.0-2
0.17.0-2build1
0.17.0-3
0.17.0-3ubuntu0.1~esm1
0.17.0-3ubuntu0.1~esm2
0.17.0-3ubuntu0.1~esm3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "opensc",
            "binary_version": "0.17.0-3ubuntu0.1~esm3"
        },
        {
            "binary_name": "opensc-pkcs11",
            "binary_version": "0.17.0-3ubuntu0.1~esm3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-66037.json"
Ubuntu:Pro:20.04:LTS
opensc

Package

Name
opensc
Purl
pkg:deb/ubuntu/opensc@0.20.0-3ubuntu0.1~esm4?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.19.0-2
0.20.0-1
0.20.0-2
0.20.0-3
0.20.0-3ubuntu0.1~esm1
0.20.0-3ubuntu0.1~esm2
0.20.0-3ubuntu0.1~esm3
0.20.0-3ubuntu0.1~esm4

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "opensc",
            "binary_version": "0.20.0-3ubuntu0.1~esm4"
        },
        {
            "binary_name": "opensc-pkcs11",
            "binary_version": "0.20.0-3ubuntu0.1~esm4"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-66037.json"
Ubuntu:Pro:22.04:LTS
opensc

Package

Name
opensc
Purl
pkg:deb/ubuntu/opensc@0.22.0-1ubuntu2.1+esm1?arch=source&distro=esm-apps/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.21.0-1ubuntu1
0.22.0-1ubuntu2
0.22.0-1ubuntu2+esm1
0.22.0-1ubuntu2.1
0.22.0-1ubuntu2.1+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "opensc",
            "binary_version": "0.22.0-1ubuntu2.1+esm1"
        },
        {
            "binary_name": "opensc-pkcs11",
            "binary_version": "0.22.0-1ubuntu2.1+esm1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-66037.json"
Ubuntu:Pro:24.04:LTS
opensc

Package

Name
opensc
Purl
pkg:deb/ubuntu/opensc@0.25.0~rc1-1ubuntu0.2+esm1?arch=source&distro=esm-apps/noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.23.0-1ubuntu4
0.24.0~rc1-1
0.25.0~rc1-1
0.25.0~rc1-1build1
0.25.0~rc1-1build2
0.25.0~rc1-1ubuntu0.1~esm1
0.25.0~rc1-1ubuntu0.1
0.25.0~rc1-1ubuntu0.2
0.25.0~rc1-1ubuntu0.2+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "opensc",
            "binary_version": "0.25.0~rc1-1ubuntu0.2+esm1"
        },
        {
            "binary_name": "opensc-pkcs11",
            "binary_version": "0.25.0~rc1-1ubuntu0.2+esm1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-66037.json"