PyQuorum is a cryptographic library for secret sharing and key management. Prior to 0.2.1, the mul_mod function implements multiplication via a binary expansion loop whose execution time depends on the Hamming weight of the second operand (the exponent). An attacker who can measure the time of secret‑sharing operations (e.g., via a remote service) could progressively recover the values of shares, ultimately leading to secret reconstruction. This vulnerability is fixed in 0.2.1.

Project Subscriptions

No data.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7r92-3jgr-r65q pyquorum: Timing side‑channel in mul_mod
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 13 May 2026 20:30:00 +0000

Type Values Removed Values Added
Description PyQuorum is a cryptographic library for secret sharing and key management. Prior to 0.2.1, the mul_mod function implements multiplication via a binary expansion loop whose execution time depends on the Hamming weight of the second operand (the exponent). An attacker who can measure the time of secret‑sharing operations (e.g., via a remote service) could progressively recover the values of shares, ultimately leading to secret reconstruction. This vulnerability is fixed in 0.2.1.
Title PyQuorum: Timing side‑channel in mul_mod
Weaknesses CWE-208
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-13T20:18:12.910Z

Reserved: 2026-05-05T20:15:20.631Z

Link: CVE-2026-44368

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-13T21:16:47.730

Modified: 2026-05-13T21:16:47.730

Link: CVE-2026-44368

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses