Miggo Logo

GHSA-v432-7f47-9g94: PostQuantum-Feldman-VSS'S Dependency Vulnerability in gmpy2 Leading to Interpreter Crash

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
3/17/2025
Updated
3/19/2025
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
PostQuantum-Feldman-VSSpip<= 0.7.6b00.7.7b0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability documentation explicitly lists these four operation types as vulnerable entry points. All are core cryptographic operations in the library that directly interface with gmpy2 for arbitrary-precision arithmetic. Their presence in CyclicGroup and FeldmanVSS classes aligns with the described mitigation integration points. The underscore-prefixed methods indicate internal implementation details where memory-intensive calculations occur. Confidence is high as the advisory specifically names these functions and describes their patching in 0.8.0b2 mitigations.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

****s*ription:** PostQu*ntum-**l*m*n-VSS, * Pyt*on li*r*ry impl*m*ntin* **l*m*n's V*ri*i**l* S**r*t S**rin* s***m* wit* post-qu*ntum s**urity, w*s vuln*r**l* to **ni*l-o*-s*rvi** *tt**ks in v*rsions up to *n* in*lu*in* *.*.***. T*is vuln*r**ility s

Reasoning

T** vuln*r**ility *o*um*nt*tion *xpli*itly lists t**s* *our op*r*tion typ*s *s vuln*r**l* *ntry points. *ll *r* *or* *rypto*r*p*i* op*r*tions in t** li*r*ry t**t *ir**tly int*r**** wit* `*mpy*` *or *r*itr*ry-pr**ision *rit*m*ti*. T**ir pr*s*n** in `*