UBUNTU-CVE-2025-66038

Source
https://ubuntu.com/security/CVE-2025-66038
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-66038.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2025-66038
Upstream
Published
2026-03-30T18:16:00Z
Modified
2026-04-07T12:02:08.334950Z
Severity
  • 3.9 (Low) CVSS_V3 - CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, sccompacttlvfindtag searches a compact-TLV buffer for a given tag. In compact-TLV, a single byte encodes the tag (high nibble) and value length (low nibble). With a 1-byte buffer {0x0A}, the encoded element claims tag=0 and length=10 but no value bytes follow. Calling sccompacttlvfindtag with search tag 0x00 returns a pointer equal to buf+1 and outlen=10 without verifying that the claimed value length fits within the remaining buffer. In cases where the sccompacttlvfind_tag is provided untrusted data (such as being read from cards/files), attackers may be able to influence it to return out-of-bounds pointers leading to downstream memory corruption when subsequent code tries to dereference the pointer. This issue has been patched in version 0.27.0.

References

Affected packages

Ubuntu:25.10
opensc

Package

Name
opensc
Purl
pkg:deb/ubuntu/opensc@0.26.1-3?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.26.1-1
0.26.1-2
0.26.1-3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "opensc",
            "binary_version": "0.26.1-3"
        },
        {
            "binary_name": "opensc-pkcs11",
            "binary_version": "0.26.1-3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-66038.json"
Ubuntu:Pro:16.04:LTS
opensc

Package

Name
opensc
Purl
pkg:deb/ubuntu/opensc@0.15.0-1ubuntu1+esm3?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.15.0-1ubuntu1
0.15.0-1ubuntu1+esm1
0.15.0-1ubuntu1+esm2
0.15.0-1ubuntu1+esm3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "opensc",
            "binary_version": "0.15.0-1ubuntu1+esm3"
        },
        {
            "binary_name": "opensc-pkcs11",
            "binary_version": "0.15.0-1ubuntu1+esm3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-66038.json"
Ubuntu:Pro:18.04:LTS
opensc

Package

Name
opensc
Purl
pkg:deb/ubuntu/opensc@0.17.0-3ubuntu0.1~esm3?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.17.0-1
0.17.0-2
0.17.0-2build1
0.17.0-3
0.17.0-3ubuntu0.1~esm1
0.17.0-3ubuntu0.1~esm2
0.17.0-3ubuntu0.1~esm3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "opensc",
            "binary_version": "0.17.0-3ubuntu0.1~esm3"
        },
        {
            "binary_name": "opensc-pkcs11",
            "binary_version": "0.17.0-3ubuntu0.1~esm3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-66038.json"
Ubuntu:Pro:20.04:LTS
opensc

Package

Name
opensc
Purl
pkg:deb/ubuntu/opensc@0.20.0-3ubuntu0.1~esm4?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.19.0-2
0.20.0-1
0.20.0-2
0.20.0-3
0.20.0-3ubuntu0.1~esm1
0.20.0-3ubuntu0.1~esm2
0.20.0-3ubuntu0.1~esm3
0.20.0-3ubuntu0.1~esm4

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "opensc",
            "binary_version": "0.20.0-3ubuntu0.1~esm4"
        },
        {
            "binary_name": "opensc-pkcs11",
            "binary_version": "0.20.0-3ubuntu0.1~esm4"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-66038.json"
Ubuntu:Pro:22.04:LTS
opensc

Package

Name
opensc
Purl
pkg:deb/ubuntu/opensc@0.22.0-1ubuntu2.1+esm1?arch=source&distro=esm-apps/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.21.0-1ubuntu1
0.22.0-1ubuntu2
0.22.0-1ubuntu2+esm1
0.22.0-1ubuntu2.1
0.22.0-1ubuntu2.1+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "opensc",
            "binary_version": "0.22.0-1ubuntu2.1+esm1"
        },
        {
            "binary_name": "opensc-pkcs11",
            "binary_version": "0.22.0-1ubuntu2.1+esm1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-66038.json"
Ubuntu:Pro:24.04:LTS
opensc

Package

Name
opensc
Purl
pkg:deb/ubuntu/opensc@0.25.0~rc1-1ubuntu0.2+esm1?arch=source&distro=esm-apps/noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.23.0-1ubuntu4
0.24.0~rc1-1
0.25.0~rc1-1
0.25.0~rc1-1build1
0.25.0~rc1-1build2
0.25.0~rc1-1ubuntu0.1~esm1
0.25.0~rc1-1ubuntu0.1
0.25.0~rc1-1ubuntu0.2
0.25.0~rc1-1ubuntu0.2+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "opensc",
            "binary_version": "0.25.0~rc1-1ubuntu0.2+esm1"
        },
        {
            "binary_name": "opensc-pkcs11",
            "binary_version": "0.25.0~rc1-1ubuntu0.2+esm1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-66038.json"