An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.
The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate or incorrectly validates that the input complies with the syntax.
Link | Tags |
---|---|
https://go.dev/cl/652155 | patch |
https://go.dev/issue/71490 | patch issue tracking |
https://pkg.go.dev/vuln/GO-2025-3488 | third party advisory |