A weakness has been identified in GPAC up to 2.4.0. Affected by this issue is the function dumpisomrtp of the file applications/mp4box/filedump.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been made available to the public and could be used for attacks. Patch name: f96bd57c3ccdcde4335a0be28cd3e8fe296993de. Applying a patch is the recommended action to fix this issue.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1417.json"
[
{
"signature_version": "v1",
"target": {
"file": "applications/mp4box/filedump.c"
},
"source": "https://github.com/enocknt/gpac/commit/f96bd57c3ccdcde4335a0be28cd3e8fe296993de",
"deprecated": false,
"digest": {
"line_hashes": [
"35474818441514346559164347454059341261",
"71403141866165313361734795766190246118",
"80931931569652790500014680581277163174",
"234071933924367474565275121161875600785"
],
"threshold": 0.9
},
"id": "CVE-2026-1417-8bf960c1",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "applications/mp4box/filedump.c",
"function": "dump_isom_rtp"
},
"source": "https://github.com/enocknt/gpac/commit/f96bd57c3ccdcde4335a0be28cd3e8fe296993de",
"deprecated": false,
"digest": {
"function_hash": "262678287620382324901013173267808909761",
"length": 1109.0
},
"id": "CVE-2026-1417-f28efb1c",
"signature_type": "Function"
}
]