go is vulnerable to out-of-bounds access. The vulnerability exists due to a lack of sanitization of access to memory location after the end of the buffer.
groups.google.com/g/golang-announce/c/0fM21h43arc
lists.debian.org/debian-lts-announce/2022/01/msg00016.html
lists.debian.org/debian-lts-announce/2022/01/msg00017.html
lists.fedoraproject.org/archives/list/[email protected]/message/4OFS3M3OFB24SWPTIAPARKGPUMQVUY6Z/
lists.fedoraproject.org/archives/list/[email protected]/message/ON7BQRRJZBOR5TJHURBAB3WLF4YXFC6Z/
secdb.alpinelinux.org/edge/community.yaml
secdb.alpinelinux.org/v3.14/community.yaml
security.gentoo.org/glsa/202208-02
security.netapp.com/advisory/ntap-20211210-0003/
www.oracle.com/security-alerts/cpujul2022.html