<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for libgphoto2 is now available for openEuler-24.03-LTS</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2026-2067</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2026-04-25</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2026-04-25</InitialReleaseDate>
		<CurrentReleaseDate>2026-04-25</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2026-04-25</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">libgphoto2 security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for libgphoto2 is now available for openEuler-24.03-LTS</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">is the core of gphoto2 software. It is a portable library which gives access to literally hundreds of digital cameras.

Security Fix(es):

libgphoto2 is a camera access and control library. In versions up to and including 2.5.33, a missing null terminator exists in the ptp_unpack_Canon_FE() function in camlibs/ptp2/ptp-pack.c (line 1377). The function copies a filename into a 13-byte buffer using strncpy without explicitly null-terminating the result. If the source data is exactly 13 bytes with no null terminator, the buffer is left unterminated, leading to out-of-bounds reads in any subsequent string operation.(CVE-2026-40334)

libgphoto2 is a camera access and control library. Versions up to and including 2.5.33 contain an out-of-bounds read vulnerability in the `ptp_unpack_DPV()` function within `camlibs/ptp2/ptp-pack.c` (lines 622–629). When handling UINT128 and INT128 data types, the code advances the buffer offset by `*offset += 16` without verifying that 16 bytes remain in the buffer. The entry check at line 609 only ensures `*offset &lt; total` (at least 1 byte available), leaving up to 15 bytes unvalidated. This could lead to reading beyond the buffer boundary, resulting in a crash or information disclosure. The issue has been patched in commit 433bde9888d70aa726e32744cd751d7dbe94379a.(CVE-2026-40335)

libgphoto2 is an open-source library for accessing and controlling cameras. Versions up to and including 2.5.33 contain an out-of-bounds read vulnerability in the `ptp_unpack_Sony_DPD()` function (line 856) within the file `camlibs/ptp2/ptp-pack.c`, specifically in the `PTP_DPFF_Enumeration` case. The function reads a 2-byte enumeration count N via `dtoh16o(data, *poffset)` without verifying that at least 2 bytes remain in the buffer. The standard `ptp_unpack_DPD()` function (line 704) includes this exact check, indicating the omission in the Sony variant was an oversight. An attacker could exploit this vulnerability to read data beyond the bounds of the process memory, potentially leading to information disclosure or application crash.(CVE-2026-40338)

libgphoto2 is an open-source library for accessing and controlling cameras. Versions up to and including 2.5.33 contain an out-of-bounds read vulnerability in the `ptp_unpack_Sony_DPD()` function (line 842) within the file `camlibs/ptp2/ptp-pack.c`. The function reads the FormFlag byte via `dtoh8o(data, *poffset)` without performing a prior bounds check. The standard `ptp_unpack_DPD()` function (lines 686–687) correctly validates `*offset + sizeof(uint8_t) &gt; dpdlen` before this same read, but the Sony-specific variant omits this check entirely, potentially allowing read access beyond the allocated buffer.(CVE-2026-40339)

libgphoto2 is a camera access and control library. Versions up to and including 2.5.33 contain an out-of-bounds read vulnerability in the `ptp_unpack_OI()` function within `camlibs/ptp2/ptp-pack.c` (lines 530–563). The function validates `len &lt; PTP_oi_SequenceNumber` (i.e., len &lt; 48) but subsequently accesses offsets 48–56, up to 9 bytes beyond the validated boundary, via the Samsung Galaxy 64-bit objectsize detection heuristic. An attacker can exploit this vulnerability by sending a malicious PTP ObjectInfo response, potentially leading to sensitive information disclosure or application crash.(CVE-2026-40340)

libgphoto2 is a camera access and control library. In versions up to and including 2.5.33, an out-of-bounds read vulnerability exists in the `ptp_unpack_EOS_FocusInfoEx` function. This vulnerability could be exploited by an attacker to crash libgphoto2 (Denial of Service) when processing input from untrusted USB devices.(CVE-2026-40341)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for libgphoto2 is now available for openEuler-24.03-LTS.

openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">libgphoto2</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2067</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-40334</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-40335</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-40338</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-40339</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-40340</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-40341</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-40334</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-40335</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-40338</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-40339</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-40340</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-40341</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="libgphoto2-2.5.31-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libgphoto2-2.5.31-3.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libgphoto2-debuginfo-2.5.31-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libgphoto2-debuginfo-2.5.31-3.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libgphoto2-debugsource-2.5.31-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libgphoto2-debugsource-2.5.31-3.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="libgphoto2-devel-2.5.31-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libgphoto2-devel-2.5.31-3.oe2403.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="libgphoto2-2.5.31-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libgphoto2-2.5.31-3.oe2403.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="libgphoto2-2.5.31-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libgphoto2-2.5.31-3.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libgphoto2-debuginfo-2.5.31-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libgphoto2-debuginfo-2.5.31-3.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libgphoto2-debugsource-2.5.31-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libgphoto2-debugsource-2.5.31-3.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="libgphoto2-devel-2.5.31-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libgphoto2-devel-2.5.31-3.oe2403.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="libgphoto2-help-2.5.31-3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">libgphoto2-help-2.5.31-3.oe2403.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libgphoto2 is a camera access and control library. In versions up to and including 2.5.33, a missing null terminator exists in the ptp_unpack_Canon_FE() function in camlibs/ptp2/ptp-pack.c (line 1377). The function copies a filename into a 13-byte buffer using strncpy without explicitly null-terminating the result. If the source data is exactly 13 bytes with no null terminator, the buffer is left unterminated, leading to out-of-bounds reads in any subsequent string operation.</Note>
		</Notes>
		<ReleaseDate>2026-04-25</ReleaseDate>
		<CVE>CVE-2026-40334</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Low</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>3.5</BaseScore>
				<Vector>AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>libgphoto2 security update</Description>
				<DATE>2026-04-25</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2067</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libgphoto2 is a camera access and control library. Versions up to and including 2.5.33 contain an out-of-bounds read vulnerability in the `ptp_unpack_DPV()` function within `camlibs/ptp2/ptp-pack.c` (lines 622–629). When handling UINT128 and INT128 data types, the code advances the buffer offset by `*offset += 16` without verifying that 16 bytes remain in the buffer. The entry check at line 609 only ensures `*offset &lt; total` (at least 1 byte available), leaving up to 15 bytes unvalidated. This could lead to reading beyond the buffer boundary, resulting in a crash or information disclosure. The issue has been patched in commit 433bde9888d70aa726e32744cd751d7dbe94379a.</Note>
		</Notes>
		<ReleaseDate>2026-04-25</ReleaseDate>
		<CVE>CVE-2026-40335</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.2</BaseScore>
				<Vector>AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>libgphoto2 security update</Description>
				<DATE>2026-04-25</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2067</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libgphoto2 is an open-source library for accessing and controlling cameras. Versions up to and including 2.5.33 contain an out-of-bounds read vulnerability in the `ptp_unpack_Sony_DPD()` function (line 856) within the file `camlibs/ptp2/ptp-pack.c`, specifically in the `PTP_DPFF_Enumeration` case. The function reads a 2-byte enumeration count N via `dtoh16o(data, *poffset)` without verifying that at least 2 bytes remain in the buffer. The standard `ptp_unpack_DPD()` function (line 704) includes this exact check, indicating the omission in the Sony variant was an oversight. An attacker could exploit this vulnerability to read data beyond the bounds of the process memory, potentially leading to information disclosure or application crash.</Note>
		</Notes>
		<ReleaseDate>2026-04-25</ReleaseDate>
		<CVE>CVE-2026-40338</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.2</BaseScore>
				<Vector>AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>libgphoto2 security update</Description>
				<DATE>2026-04-25</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2067</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libgphoto2 is an open-source library for accessing and controlling cameras. Versions up to and including 2.5.33 contain an out-of-bounds read vulnerability in the `ptp_unpack_Sony_DPD()` function (line 842) within the file `camlibs/ptp2/ptp-pack.c`. The function reads the FormFlag byte via `dtoh8o(data, *poffset)` without performing a prior bounds check. The standard `ptp_unpack_DPD()` function (lines 686–687) correctly validates `*offset + sizeof(uint8_t) &gt; dpdlen` before this same read, but the Sony-specific variant omits this check entirely, potentially allowing read access beyond the allocated buffer.</Note>
		</Notes>
		<ReleaseDate>2026-04-25</ReleaseDate>
		<CVE>CVE-2026-40339</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.2</BaseScore>
				<Vector>AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>libgphoto2 security update</Description>
				<DATE>2026-04-25</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2067</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libgphoto2 is a camera access and control library. Versions up to and including 2.5.33 contain an out-of-bounds read vulnerability in the `ptp_unpack_OI()` function within `camlibs/ptp2/ptp-pack.c` (lines 530–563). The function validates `len &lt; PTP_oi_SequenceNumber` (i.e., len &lt; 48) but subsequently accesses offsets 48–56, up to 9 bytes beyond the validated boundary, via the Samsung Galaxy 64-bit objectsize detection heuristic. An attacker can exploit this vulnerability by sending a malicious PTP ObjectInfo response, potentially leading to sensitive information disclosure or application crash.</Note>
		</Notes>
		<ReleaseDate>2026-04-25</ReleaseDate>
		<CVE>CVE-2026-40340</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.1</BaseScore>
				<Vector>AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>libgphoto2 security update</Description>
				<DATE>2026-04-25</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2067</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="6" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libgphoto2 is a camera access and control library. In versions up to and including 2.5.33, an out-of-bounds read vulnerability exists in the `ptp_unpack_EOS_FocusInfoEx` function. This vulnerability could be exploited by an attacker to crash libgphoto2 (Denial of Service) when processing input from untrusted USB devices.</Note>
		</Notes>
		<ReleaseDate>2026-04-25</ReleaseDate>
		<CVE>CVE-2026-40341</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Low</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>3.5</BaseScore>
				<Vector>AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>libgphoto2 security update</Description>
				<DATE>2026-04-25</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2067</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>