Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.
{ "binaries": [ { "binary_version": "1.8.3-2ubuntu1.18.04.1", "binary_name": "golang-1.8" }, { "binary_version": "1.8.3-2ubuntu1.18.04.1", "binary_name": "golang-1.8-go" }, { "binary_version": "1.8.3-2ubuntu1.18.04.1", "binary_name": "golang-1.8-go-shared-dev" }, { "binary_version": "1.8.3-2ubuntu1.18.04.1", "binary_name": "golang-1.8-src" }, { "binary_version": "1.8.3-2ubuntu1.18.04.1", "binary_name": "libgolang-1.8-std1" } ] }
{ "binaries": [ { "binary_version": "1.13.3-1ubuntu1", "binary_name": "golang-1.13" }, { "binary_version": "1.13.3-1ubuntu1", "binary_name": "golang-1.13-go" }, { "binary_version": "1.13.3-1ubuntu1", "binary_name": "golang-1.13-src" } ], "availability": "No subscription required" }