Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.Referenceshttps://groups.google.com/d/msg/golang-announce/lVEm7llp0w0/VbafyRkgCgAJhttps://github.com/golang/go/issues/34960https://www.debian.org/security/2019/dsa-4551https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5VS3HPSE25ZSGS4RSOTADC67YNOHIGVV/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WVOWGM7IQGRO7DS2MCUMYZRQ4TYOZNAS/http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.htmlhttps://security.netapp.com/advisory/ntap-20191122-0005/https://access.redhat.com/errata/RHSA-2020:0101https://access.redhat.com/errata/RHSA-2020:0329https://lists.debian.org/debian-lts-announce/2021/03/msg00014.htmlhttps://lists.debian.org/debian-lts-announce/2021/03/msg00015.htmlhttps://www.arista.com/en/support/advisories-notices/security-advisories/10134-security-advisory-46