プラットフォーム
go
コンポーネント
golang.org/x/image/font/sfnt
修正版
0.39.0
0.39.0
CVE-2026-33812 describes a memory exhaustion vulnerability discovered in the golang.org/x/image/font/sfnt library, a component used for parsing SFNT (TrueType and OpenType) font files within Go applications. An attacker can trigger this vulnerability by providing a specially crafted malicious font file, leading to excessive memory allocation and potentially a denial-of-service condition. This vulnerability affects versions 0.0.0 through 0.39.0, and a fix is available in version 0.39.0.
The primary impact of CVE-2026-33812 is a denial-of-service (DoS). An attacker who can control the font files processed by applications using the vulnerable golang.org/x/image/font/sfnt library can craft a malicious font that triggers excessive memory allocation. This can exhaust available memory resources on the system, leading to application crashes, system instability, or even complete system unavailability. The severity of the impact depends on the criticality of the affected application and the resources available on the target system. While direct data exfiltration is unlikely, the DoS condition can disrupt services and potentially mask other malicious activities. The vulnerability's reliance on font file parsing means it's most likely to impact applications that render fonts, such as image processing tools, document viewers, or UI frameworks.
CVE-2026-33812 was publicly disclosed on 2026-04-21. There is currently no known public proof-of-concept (PoC) code available. The vulnerability is not listed on the CISA KEV catalog at the time of writing. The EPSS score is pending evaluation, but given the lack of public exploits, the probability of exploitation is currently considered low.
Applications written in Go that utilize the golang.org/x/image/font/sfnt library for font parsing are at risk. This includes image processing tools, document viewers, UI frameworks, and any other application that renders fonts. Specifically, projects relying on older versions of the library (0.0.0–0.39.0) are vulnerable, especially those that accept font files from untrusted sources.
• go: Inspect application code for usage of golang.org/x/image/font/sfnt and verify version. Use go list -m golang.org/x/image/font/sfnt to check the version.
• go: Monitor memory usage of Go applications that process font files. Unexpected spikes in memory consumption could indicate exploitation.
• generic web: If the application serves font files, check access logs for unusual requests for font files from unknown sources.
# Example: Check access logs for requests to font files
grep "/font/" access.log | grep -v "localhost" | sort | uniq -c | sort -nrdisclosure
エクスプロイト状況
EPSS
0.01% (2% パーセンタイル)
The recommended mitigation for CVE-2026-33812 is to upgrade to version 0.39.0 or later of the golang.org/x/image/font/sfnt library. If upgrading is not immediately feasible, consider implementing input validation on font files before processing them. This could involve checking file sizes, validating font file headers, or using a font validation library to detect potentially malicious fonts. While a WAF or proxy is unlikely to directly mitigate this vulnerability (as it operates at the application layer), implementing strict file type validation at the web server level can prevent malicious font files from reaching the application. Regularly scan dependencies for known vulnerabilities using tools like go mod tidy and vulnerability scanners.
Actualice la biblioteca golang.org/x/image/font/sfnt a la versión 0.39.0 o superior para mitigar el riesgo de asignación excesiva de memoria al decodificar fuentes SFNT maliciosas. Esto evitará posibles denegaciones de servicio o vulnerabilidades de seguridad.
脆弱性分析と重要アラートをメールでお届けします。
CVE-2026-33812 is a vulnerability in the golang.org/x/image/font/sfnt library where parsing malicious font files can cause excessive memory allocation, potentially leading to a denial-of-service.
You are affected if your Go application uses golang.org/x/image/font/sfnt version 0.0.0–0.39.0 and processes font files from untrusted sources.
Upgrade to version 0.39.0 or later of the golang.org/x/image/font/sfnt library. Implement input validation on font files if immediate upgrading is not possible.
There is currently no evidence of active exploitation or publicly available proof-of-concept code.
Refer to the official Go project security announcements for details: https://go.dev/security
依存関係ファイルをアップロードすれば、このCVEや他のCVEがあなたに影響するか即座にわかります。
go.mod ファイルをアップロードすると、影響の有無を即座にお知らせします。