A security flaw has been discovered in GPAC up to 2.4.0. Affected by this vulnerability is the function DumpMovieInfo of the file applications/mp4box/filedump.c. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. The patch is identified as d45c264c20addf0c1cc05124ede33f8ffa800e68. It is advisable to implement a patch to correct this issue.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1416.json"
[
{
"source": "https://github.com/enocknt/gpac/commit/d45c264c20addf0c1cc05124ede33f8ffa800e68",
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2026-1416-794e77af",
"digest": {
"threshold": 0.9,
"line_hashes": [
"56425586178644294519561890386559483806",
"50519370916286075096478125171545428070",
"215332061526122007929550392299774030587",
"337514838407083361343691039834617032292"
]
},
"signature_type": "Line",
"target": {
"file": "applications/mp4box/filedump.c"
}
},
{
"source": "https://github.com/enocknt/gpac/commit/d45c264c20addf0c1cc05124ede33f8ffa800e68",
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2026-1416-ac91ee60",
"digest": {
"length": 9164.0,
"function_hash": "145406205735920396705851762503550648110"
},
"signature_type": "Function",
"target": {
"file": "applications/mp4box/filedump.c",
"function": "DumpMovieInfo"
}
}
]