wolfSSL before 5.4.0 allows remote attackers to cause a denial of service via DTLS because a check for return-routability can be skipped.
{ "binaries": [ { "binary_name": "libcyassl5", "binary_version": "3.4.8+dfsg-1" }, { "binary_name": "libwolfssl-dev", "binary_version": "3.4.8+dfsg-1" }, { "binary_name": "libwolfssl0", "binary_version": "3.4.8+dfsg-1" } ] }
{ "binaries": [ { "binary_name": "libwolfssl-dev", "binary_version": "3.13.0+dfsg-1" }, { "binary_name": "libwolfssl15", "binary_version": "3.13.0+dfsg-1" } ] }
{ "binaries": [ { "binary_name": "libwolfssl-dev", "binary_version": "4.3.0+dfsg-2" }, { "binary_name": "libwolfssl24", "binary_version": "4.3.0+dfsg-2" } ] }
{ "binaries": [ { "binary_name": "libwolfssl-dev", "binary_version": "5.2.0-2" }, { "binary_name": "libwolfssl32", "binary_version": "5.2.0-2" } ] }
{ "binaries": [ { "binary_name": "libwolfssl-dev", "binary_version": "5.6.6-1.3build1" }, { "binary_name": "libwolfssl42t64", "binary_version": "5.6.6-1.3build1" } ] }
{ "binaries": [ { "binary_name": "libwolfssl-dev", "binary_version": "5.7.2-0.1" }, { "binary_name": "libwolfssl42t64", "binary_version": "5.7.2-0.1" } ] }