GO-2026-4962

Source
https://pkg.go.dev/vuln/GO-2026-4962
Import Source
https://vuln.go.dev/ID/GO-2026-4962.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2026-4962
Aliases
  • CVE-2026-33812
Published
2026-04-21T18:59:51Z
Modified
2026-04-21T19:15:13.253886Z
Summary
Excessive memory allocation when decoding malicious SFNT in golang.org/x/image
Details

Parsing a malicious font file can cause excessive memory allocation.

Database specific
{
    "review_status": "REVIEWED",
    "url": "https://pkg.go.dev/vuln/GO-2026-4962"
}
References
Credits
    • Andy Gill, ZephrSec Ltd

Affected packages

Go / golang.org/x/image

Package

Name
golang.org/x/image
View open source insights on deps.dev
Purl
pkg:golang/golang.org/x/image

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.39.0

Ecosystem specific

{
    "imports": [
        {
            "symbols": [
                "Collection.Font",
                "Font.GlyphAdvance",
                "Font.GlyphBounds",
                "Font.GlyphIndex",
                "Font.GlyphName",
                "Font.Kern",
                "Font.LoadGlyph",
                "Font.Name",
                "Font.WriteSourceTo",
                "Parse",
                "ParseCollection",
                "ParseCollectionReaderAt",
                "ParseReaderAt",
                "source.view"
            ],
            "path": "golang.org/x/image/font/sfnt"
        }
    ]
}

Database specific

source
"https://vuln.go.dev/ID/GO-2026-4962.json"