Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.
{
"binaries": [
{
"binary_version": "1.8.3-2ubuntu1.18.04.1",
"binary_name": "golang-1.8"
},
{
"binary_version": "1.8.3-2ubuntu1.18.04.1",
"binary_name": "golang-1.8-go"
},
{
"binary_version": "1.8.3-2ubuntu1.18.04.1",
"binary_name": "golang-1.8-go-shared-dev"
},
{
"binary_version": "1.8.3-2ubuntu1.18.04.1",
"binary_name": "golang-1.8-src"
},
{
"binary_version": "1.8.3-2ubuntu1.18.04.1",
"binary_name": "libgolang-1.8-std1"
}
]
}{
"binaries": [
{
"binary_version": "1.13.3-1ubuntu1",
"binary_name": "golang-1.13"
},
{
"binary_version": "1.13.3-1ubuntu1",
"binary_name": "golang-1.13-go"
},
{
"binary_version": "1.13.3-1ubuntu1",
"binary_name": "golang-1.13-src"
}
],
"availability": "No subscription required"
}