CVE-2026-40341
Received Received - Intake
Out-of-Bounds Read in libgphoto2 Causes Crash via USB Input

Publication date: 2026-04-18

Last updated on: 2026-04-18

Assigner: GitHub, Inc.

Description
libgphoto2 is a camera access and control library. In versions up to and including 2.5.33, an out of bound read in ptp_unpack_EOS_FocusInfoEx could be used to crash libgphoto2 when processing input from untrusted USB devices. Commit c385b34af260595dfbb5f9329526be5158985987 contains a patch. No known workarounds are available.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-18
Last Modified
2026-04-18
Generated
2026-05-06
AI Q&A
2026-04-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
libgphoto2 libgphoto2 to 2.5.33 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-126 The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in libgphoto2, a library used for camera access and control. In versions up to and including 2.5.33, there is an out of bound read issue in the function ptp_unpack_EOS_FocusInfoEx. This flaw can be triggered when processing input from untrusted USB devices, potentially causing libgphoto2 to crash.


How can this vulnerability impact me? :

The vulnerability can cause libgphoto2 to crash when it processes specially crafted input from untrusted USB devices. This may lead to denial of service conditions in applications relying on libgphoto2 for camera access and control. The CVSS score indicates a low severity impact on confidentiality and availability, with no impact on integrity.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update libgphoto2 to a version later than 2.5.33 where the patch commit c385b34af260595dfbb5f9329526be5158985987 has been applied.

No known workarounds are available, so applying the patch or upgrading is the recommended immediate step.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in libgphoto2 involves an out of bound read that can cause a crash when processing input from untrusted USB devices. It has a low CVSS score indicating limited impact on confidentiality and availability, and no impact on integrity.

There is no information provided about any direct effects on compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart