VYPR
Low severity3.3NVD Advisory· Published May 8, 2026· Updated May 14, 2026

CVE-2026-8124

CVE-2026-8124

Description

A security vulnerability has been detected in GPAC up to 26.02.0. This affects the function sidx_box_read of the file src/isomedia/box_code_base.c. The manipulation leads to allocation of resources. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The identifier of the patch is 442e2299530138d8f874fd885c565ba98a6318ba. It is suggested to install a patch to address this issue.

Affected products

1

Patches

1
442e22995301

fuzz: prevent unwanted allocs in sidx_box_read() + typo

https://github.com/gpac/gpacAurelien DavidApr 15, 2026via nvd-ref
2 files changed · +6 1
  • src/isomedia/box_code_3gpp.c+1 1 modified
    @@ -412,7 +412,7 @@ GF_Err text_box_read(GF_Box *s, GF_BitStream *bs)
     		return GF_OK;
     	}
     	if (pSize) {
    -		ptr->textName = (char*) gf_malloc(pSize+1 * sizeof(char));
    +		ptr->textName = (char*) gf_malloc((pSize+1) * sizeof(char));
     		if (!ptr->textName) return GF_OUT_OF_MEM;
     
     		if (gf_bs_read_data(bs, ptr->textName, pSize) != pSize) {
    
  • src/isomedia/box_code_base.c+5 0 modified
    @@ -9517,6 +9517,11 @@ GF_Err sidx_box_read(GF_Box *s,GF_BitStream *bs)
     	gf_bs_read_u16(bs); /* reserved */
     	ptr->nb_refs = gf_bs_read_u16(bs);
     
    +	if ((u64)ptr->nb_refs > ptr->size / 12 || (u64)ptr->nb_refs > (u64)SIZE_MAX / sizeof(GF_SIDXReference)) {
    +		GF_LOG(GF_LOG_ERROR, GF_LOG_CONTAINER, ("[iso file] Invalid number of references %u in sidx\n", ptr->nb_refs));
    +		return GF_ISOM_INVALID_FILE;
    +	}
    +
     	ptr->refs = gf_malloc(sizeof(GF_SIDXReference)*ptr->nb_refs);
     	if (!ptr->refs) return GF_OUT_OF_MEM;
     	for (i=0; i<ptr->nb_refs; i++) {
    

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.