wolfSSL 4.3.0 has mulmod code in wceccmulmod_ex in ecc.c that does not properly resist timing side-channel attacks.
{ "binaries": [ { "binary_version": "3.4.8+dfsg-1", "binary_name": "libcyassl5" }, { "binary_version": "3.4.8+dfsg-1", "binary_name": "libwolfssl-dev" }, { "binary_version": "3.4.8+dfsg-1", "binary_name": "libwolfssl0" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-11713.json"
{ "binaries": [ { "binary_version": "3.13.0+dfsg-1", "binary_name": "libwolfssl-dev" }, { "binary_version": "3.13.0+dfsg-1", "binary_name": "libwolfssl15" } ] }
{ "binaries": [ { "binary_version": "4.3.0+dfsg-2", "binary_name": "libwolfssl-dev" }, { "binary_version": "4.3.0+dfsg-2", "binary_name": "libwolfssl24" } ] }