Description
libgphoto2 is a camera access and control library. Versions up to and including 2.5.33 have an out-of-bounds read in `ptp_unpack_Sony_DPD()` in `camlibs/ptp2/ptp-pack.c` (line 842). The function reads the FormFlag byte via `dtoh8o(data, *poffset)` without a prior bounds check. The standard `ptp_unpack_DPD()` at lines 686–687 correctly validates `*offset + sizeof(uint8_t) > dpdlen` before this same read, but the Sony variant omits this check entirely. Commit 09f8a940b1e418b5693f5c11e3016a1ad2cea62d fixes the issue.
Published: 2026-04-17
Score: 5.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure via Out‑of‑Bounds Read
Action: Apply Patch
AI Analysis

Impact

A specific function used to read Sony camera metadata performs an out‑of‑bounds read of a byte that holds a FormFlag value, because it lacks a bounds check that other camera variants correctly perform. This flaw is classified as CWE‑125 and permits an attacker who can control input to a library function to read memory bytes that the library should not expose. The read is limited to a single byte, so it does not enable arbitrary code execution or the modification of program state, but the leaked data could reveal confidential information or aid in further attack development.

Affected Systems

The library libgphoto2, provided by the gphoto vendor, is affected in all releases up to and including version 2.5.33. Any software that links with these versions and processes Sony camera packets that trigger the ptp_unpack_Sony_DPD function is potentially vulnerable.

Risk and Exploitability

The CVSS score of 5.2 indicates a moderate severity. EPSS information is not available and the vulnerability is not listed in the CISA KEV catalog. The most likely attack vector is local; an attacker would need to supply crafted camera data or invoke the library in a controlled way to trigger the out‑of‑bounds read, so the risk is contained to environments that expose the library to untrusted input.

Generated by OpenCVE AI on April 18, 2026 at 08:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade libgphoto2 to the latest release that includes the commit that adds the bounds check (min version 2.5.34).
  • If an upgrade is not immediately possible, rebuild the library from source using the patched commit to ensure the bounds check is present.
  • For systems that cannot update immediately, limit the use of libgphoto2 to trusted processes or disable processing of Sony camera data until the firmware fix is applied.

Generated by OpenCVE AI on April 18, 2026 at 08:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description libgphoto2 is a camera access and control library. Versions up to and including 2.5.33 have an out-of-bounds read in `ptp_unpack_Sony_DPD()` in `camlibs/ptp2/ptp-pack.c` (line 842). The function reads the FormFlag byte via `dtoh8o(data, *poffset)` without a prior bounds check. The standard `ptp_unpack_DPD()` at lines 686–687 correctly validates `*offset + sizeof(uint8_t) > dpdlen` before this same read, but the Sony variant omits this check entirely. Commit 09f8a940b1e418b5693f5c11e3016a1ad2cea62d fixes the issue.
Title libgphoto2 has OOB read in ptp_unpack_Sony_DPD() FormFlag parsing in ptp-pack.c
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 5.2, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-17T23:42:32.586Z

Reserved: 2026-04-10T22:50:01.358Z

Link: CVE-2026-40339

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-18T00:16:37.947

Modified: 2026-04-18T00:16:37.947

Link: CVE-2026-40339

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T09:00:05Z

Weaknesses