Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-66037

Опубликовано: 30 мар. 2026
Источник: debian
EPSS Низкий

Описание

OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, feeding a crafted input to the fuzz_pkcs15_reader harness causes OpenSC to perform an out-of-bounds heap read in the X.509/SPKI handling path. Specifically, sc_pkcs15_pubkey_from_spki_fields() allocates a zero-length buffer and then reads one byte past the end of that allocation. This issue has been patched in version 0.27.0.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openscfixed0.27.1-1package
openscno-dsatrixiepackage
openscno-dsabookwormpackage
openscpostponedbullseyepackage

Примечания

  • https://github.com/OpenSC/OpenSC/security/advisories/GHSA-m58q-rmjm-mmfx

  • https://github.com/OpenSC/OpenSC/wiki/CVE-2025-66037

  • Fixed by: https://github.com/OpenSC/OpenSC/commit/65fc211015cfcac27b10d0876054156c97225f50 (0.27.0)

EPSS

Процентиль: 0%
0.00005
Низкий

Связанные уязвимости

CVSS3: 3.9
ubuntu
7 дней назад

OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, feeding a crafted input to the fuzz_pkcs15_reader harness causes OpenSC to perform an out-of-bounds heap read in the X.509/SPKI handling path. Specifically, sc_pkcs15_pubkey_from_spki_fields() allocates a zero-length buffer and then reads one byte past the end of that allocation. This issue has been patched in version 0.27.0.

CVSS3: 3.9
redhat
7 дней назад

OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, feeding a crafted input to the fuzz_pkcs15_reader harness causes OpenSC to perform an out-of-bounds heap read in the X.509/SPKI handling path. Specifically, sc_pkcs15_pubkey_from_spki_fields() allocates a zero-length buffer and then reads one byte past the end of that allocation. This issue has been patched in version 0.27.0.

CVSS3: 3.9
nvd
7 дней назад

OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, feeding a crafted input to the fuzz_pkcs15_reader harness causes OpenSC to perform an out-of-bounds heap read in the X.509/SPKI handling path. Specifically, sc_pkcs15_pubkey_from_spki_fields() allocates a zero-length buffer and then reads one byte past the end of that allocation. This issue has been patched in version 0.27.0.

msrc
4 дня назад

OpenSC: Out of Bounds vulnerability

EPSS

Процентиль: 0%
0.00005
Низкий