The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
https://www.tenable.com/blog/oracle-october-2021-critical-patch-update-addresses-231-cves
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://security.netapp.com/advisory/ntap-20210813-0005/
https://security.gentoo.org/glsa/202208-02
https://groups.google.com/g/golang-announce/c/n9FxMelZGAQ