CVE-2026-40341
Out-of-Bounds Read in libgphoto2 Causes Crash via USB Input
Publication date: 2026-04-18
Last updated on: 2026-04-18
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| libgphoto2 | libgphoto2 | to 2.5.33 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-126 | The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in libgphoto2, a library used for camera access and control. In versions up to and including 2.5.33, there is an out of bound read issue in the function ptp_unpack_EOS_FocusInfoEx. This flaw can be triggered when processing input from untrusted USB devices, potentially causing libgphoto2 to crash.
How can this vulnerability impact me? :
The vulnerability can cause libgphoto2 to crash when it processes specially crafted input from untrusted USB devices. This may lead to denial of service conditions in applications relying on libgphoto2 for camera access and control. The CVSS score indicates a low severity impact on confidentiality and availability, with no impact on integrity.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update libgphoto2 to a version later than 2.5.33 where the patch commit c385b34af260595dfbb5f9329526be5158985987 has been applied.
No known workarounds are available, so applying the patch or upgrading is the recommended immediate step.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in libgphoto2 involves an out of bound read that can cause a crash when processing input from untrusted USB devices. It has a low CVSS score indicating limited impact on confidentiality and availability, and no impact on integrity.
There is no information provided about any direct effects on compliance with common standards and regulations such as GDPR or HIPAA.