{"id":"RUSTSEC-2026-0125","summary":"Signature Verification on AVX2 Platforms Mishandles Edge Case","details":"The AVX2 implementation of ML-DSA verification incorrectly implemented\nthe `use_hint` function, mishandling an edge case that should lead to\nsignature rejection.\n\n## Impact\nAn attacker could make the ML-DSA verifier accept a crafted invalid\nsignature under a maliciously generated verification key, if the AVX2\nimplementation is used.\n\n## Mitigation\nFrom version `0.0.9` the edge case is handled correctly and invalid\nsignatures are rejected.","modified":"2026-05-13T10:15:36.132499Z","published":"2026-05-05T12:00:00Z","database_specific":{"license":"CC0-1.0"},"references":[{"type":"PACKAGE","url":"https://crates.io/crates/libcrux-ml-dsa"},{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2026-0125.html"},{"type":"WEB","url":"https://github.com/cryspen/libcrux/pull/1398"},{"type":"WEB","url":"https://github.com/C2SP/wycheproof/pull/234"},{"type":"WEB","url":"https://github.com/tink-crypto/tink-go/pull/48"}],"affected":[{"package":{"name":"libcrux-ml-dsa","ecosystem":"crates.io","purl":"pkg:cargo/libcrux-ml-dsa"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.0.0-0"},{"fixed":"0.0.9"}]}],"ecosystem_specific":{"affects":{"os":[],"functions":[],"arch":["x86_64"]},"affected_functions":null},"database_specific":{"source":"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2026-0125.json","categories":[],"cvss":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N","informational":null}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"}]}