Vulnerability DatabaseGHSA-v432-7f47-9g94

GHSA-v432-7f47-9g94
Python vulnerability analysis and mitigation

Overview

A high-severity vulnerability (GHSA-v432-7f47-9g94) was discovered in PostQuantum-Feldman-VSS, a Python library implementing Feldman's Verifiable Secret Sharing scheme with post-quantum security. The vulnerability affects versions up to and including 0.7.6b0, stemming from the library's dependency on gmpy2 for arbitrary-precision arithmetic. The issue was published on March 15, 2025, and received a CVSS score of 8.7. The vulnerability allows attackers to cause denial-of-service attacks by exploiting gmpy2's behavior when memory allocation fails (GitHub Advisory).

Technical details

The vulnerability arises from the behavior of the GNU Multiple Precision Arithmetic Library (GMP), which gmpy2 depends on. When GMP fails to allocate memory, it terminates the entire process instead of raising a standard Python exception. Several operations were particularly vulnerable, including large exponentiation (exp, secureexp), multi-exponentiation (efficientmultiexp), matrix operations (securematrixsolve), and polynomial evaluation (evaluatepolynomial). The vulnerability has a Network attack vector, Low attack complexity, requires No privileges, and No user interaction for exploitation (GitHub Advisory).

Impact

The primary impact of this vulnerability is on system availability. When successfully exploited, an attacker can cause the Python interpreter to crash by providing carefully crafted inputs that trigger excessive memory allocation attempts. This results in a complete denial of service of the affected application. The vulnerability does not impact system confidentiality or integrity (GitHub Advisory).

Mitigation and workarounds

Version 0.8.0b2 implements significant mitigations including a new MemoryMonitor class for tracking memory usage, memory safety checks, enhanced input validation, and safer defaults. For versions <= 0.7.6b0, workarounds include limiting input sizes, implementing resource monitoring, thorough input validation, and rate limiting. The recommended action is to upgrade to version 0.8.0b2 or later as soon as possible. Users should also configure appropriate memory limits using the MemoryMonitor and implement robust input validation (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66423HIGH7.1
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-66454MEDIUM6.5
  • PythonPython
  • arcade-mcp-server
NoYesDec 02, 2025
CVE-2025-66424MEDIUM6.5
  • PythonPython
  • trytond
NoYesNov 30, 2025
CVE-2025-66422MEDIUM4.3
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-65858LOW3.5
  • PythonPython
  • calibreweb
NoNoDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management