CVE-2026-40333 PUBLISHED

libgphoto2 has OOB read in ptp_unpack_EOS_ImageFormat() and ptp_unpack_EOS_CustomFuncEx() due to missing length parameter in ptp-pack.c

Assigner: GitHub_M
Reserved: 10.04.2026 Published: 17.04.2026 Updated: 20.04.2026

libgphoto2 is a camera access and control library. In versions up to and including 2.5.33, two functions in camlibs/ptp2/ptp-pack.c accept a data pointer but no length parameter, performing unbounded reads. Their callers in ptp_unpack_EOS_events() have xsize available but never pass it, leaving both functions unable to validate reads against the actual buffer boundary. Commit 1817ecead20c2aafa7549dac9619fe38f47b2f53 patches the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CVSS Score: 6.1

Product Status

Vendor gphoto
Product libgphoto2
Versions
  • Version <= 2.5.33 is affected

References

Problem Types

  • CWE-125: Out-of-bounds Read CWE