All released versions of m2crypto are vulnerable to Bleichenbacher timing attacks in the RSA decryption API, via timed processing of valid PKCS#1 v1.5 ciphertext. Upstream issue: https://gitlab.com/m2crypto/m2crypto/-/issues/285
Created m2crypto tracking bugs for this issue: Affects: fedora-all [bug 1898305]
This issue has been addressed in the following products: Red Hat Virtualization Engine 4.4 Via RHSA-2021:1169 https://access.redhat.com/errata/RHSA-2021:1169
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-25657
In the end we have decided to close this with https://gitlab.com/m2crypto/m2crypto/-/merge_requests/273 ... the port of the workaround Cryptography used.