Go before 1.10.8 and 1.11.x before 1.11.5 mishandles P-521 and P-384 elliptic curves, which allows attackers to cause a denial of service (CPU consumption) or possibly conduct ECDH private key recovery attacks.
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html
http://www.securityfocus.com/bid/106740
https://github.com/golang/go/commit/42b42f71cf8f5956c09e66230293dfb5db652360
https://github.com/golang/go/issues/29903
https://github.com/google/wycheproof
https://groups.google.com/forum/#!topic/golang-announce/mVeX35iXuSw
https://lists.debian.org/debian-lts-announce/2019/02/msg00009.html
Source: MITRE
Published: 2019-01-24
Updated: 2020-08-24
Type: CWE-770
Base Score: 6.4
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact Score: 4.9
Exploitability Score: 10
Severity: MEDIUM
Base Score: 8.2
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
Impact Score: 4.2
Exploitability Score: 3.9
Severity: HIGH