Covert Timing Channel Affecting postquantum-feldman-vss package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (22nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-POSTQUANTUMFELDMANVSS-9459048
  • published16 Mar 2025
  • disclosed14 Mar 2025
  • creditDavidOsipov

Introduced: 14 Mar 2025

CVE-2025-29780  (opens in a new tab)
CWE-385  (opens in a new tab)

How to fix?

There is no fixed version for PostQuantum-Feldman-VSS.

Overview

PostQuantum-Feldman-VSS is a Post-Quantum Secure Feldman's Verifiable Secret Sharing (VSS) in Python

Affected versions of this package are vulnerable to Covert Timing Channel through the _find_secure_pivot and _secure_matrix_solve functions. An attacker can extract secret information used in the Verifiable Secret Sharing (VSS) scheme by measuring the execution time of these functions with carefully crafted inputs.

Workaround

This vulnerability can be mitigated by using the library only in environments where timing measurements by attackers are infeasible, or by implementing wrappers around critical operations using constant-time libraries in languages like Rust, Go, or C.

References

CVSS Base Scores

version 4.0
version 3.1