Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.
https://www.debian.org/security/2019/dsa-4551
https://www.arista.com/en/support/advisories-notices/security-advisories/10134-security-advisory-46
https://security.netapp.com/advisory/ntap-20191122-0005/
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://groups.google.com/d/msg/golang-announce/lVEm7llp0w0/VbafyRkgCgAJ
https://github.com/golang/go/issues/34960
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0101
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html