Go before 1.10.8 and 1.11.x before 1.11.5 mishandles P-521 and P-384 elliptic curves, which allows attackers to cause a denial of service (CPU consumption) or possibly conduct ECDH private key recovery attacks.Referenceshttps://github.com/golang/go/issues/29903https://www.debian.org/security/2019/dsa-4380https://groups.google.com/forum/#%21topic/golang-announce/mVeX35iXuSwhttps://www.debian.org/security/2019/dsa-4379https://github.com/golang/go/commit/42b42f71cf8f5956c09e66230293dfb5db652360https://lists.debian.org/debian-lts-announce/2019/02/msg00009.htmlhttp://www.securityfocus.com/bid/106740https://github.com/google/wycheproofhttp://lists.opensuse.org/opensuse-security-announce/2019-04/msg00042.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html