{"id":"GO-2026-4962","summary":"Excessive memory allocation when decoding malicious SFNT in golang.org/x/image","details":"Parsing a malicious font file can cause excessive memory allocation.","aliases":["CVE-2026-33812"],"modified":"2026-04-21T19:15:13.253886Z","published":"2026-04-21T18:59:51Z","database_specific":{"review_status":"REVIEWED","url":"https://pkg.go.dev/vuln/GO-2026-4962"},"references":[{"type":"FIX","url":"https://go.dev/cl/761180"},{"type":"REPORT","url":"https://go.dev/issue/78382"}],"affected":[{"package":{"name":"golang.org/x/image","ecosystem":"Go","purl":"pkg:golang/golang.org/x/image"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"0.39.0"}]}],"ecosystem_specific":{"imports":[{"symbols":["Collection.Font","Font.GlyphAdvance","Font.GlyphBounds","Font.GlyphIndex","Font.GlyphName","Font.Kern","Font.LoadGlyph","Font.Name","Font.WriteSourceTo","Parse","ParseCollection","ParseCollectionReaderAt","ParseReaderAt","source.view"],"path":"golang.org/x/image/font/sfnt"}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2026-4962.json"}}],"schema_version":"1.7.5","credits":[{"name":"Andy Gill, ZephrSec Ltd"}]}