Storing session data in a database is a common approach and is broadly supported by major php frameworks (for reference see PdoSessionHandler in symfony2 and DatabaseSessionHandler in laravel).
The basic principle of such session handlers is to save session data in a database table while the session id is saved in one column and data in another one. When reading session data, the handler will run a database query reading the table row with the given session id, which was provided by users cookies.
According to another stackoverflow question, comparing strings in a database query can be vulnerable to timing attacks.
So, Is it possible to combine a timing attack and session hijacking to steal a session id used by another user? If so, then why isn't it considered by the major frameworks?