The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-34558.json"