<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Libcrux-Ml-Dsa (&lt; 0.0.9) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/libcrux-ml-dsa--0.0.9/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 16:21:24 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/libcrux-ml-dsa--0.0.9/feed.xml" rel="self" type="application/rss+xml"/><item><title>libcrux-ml-dsa Signature Verification Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-libcrux-ml-dsa-sig-bypass/</link><pubDate>Tue, 19 May 2026 16:21:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-libcrux-ml-dsa-sig-bypass/</guid><description>The AVX2 implementation of ML-DSA verification in libcrux-ml-dsa mishandles an edge case in the `use_hint` function, potentially allowing an attacker to craft an invalid signature that is accepted by the verifier if the AVX2 implementation is used.</description><content:encoded><![CDATA[<p>The <code>libcrux-ml-dsa</code> library, a Rust implementation of ML-DSA (a post-quantum signature scheme), contains a vulnerability in its AVX2 implementation of signature verification. Specifically, the <code>use_hint</code> function incorrectly handles an edge case. This flaw allows an attacker to potentially bypass signature verification and forge valid signatures under a maliciously generated verification key when the AVX2 implementation is utilized. This vulnerability affects versions prior to 0.0.9. Defenders should ensure the library is updated to version 0.0.9 or later to mitigate the risk of signature forgery.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker analyzes the vulnerable <code>use_hint</code> function within the AVX2 implementation of <code>libcrux-ml-dsa</code> versions prior to 0.0.9.</li>
<li>The attacker identifies the specific edge case in the <code>use_hint</code> function that is mishandled.</li>
<li>Attacker crafts a malicious ML-DSA signature that exploits the identified edge case.</li>
<li>The attacker generates a malicious verification key designed to amplify the vulnerability.</li>
<li>Attacker targets a system or application that relies on <code>libcrux-ml-dsa</code> for signature verification using the AVX2 implementation.</li>
<li>The vulnerable <code>libcrux-ml-dsa</code> library attempts to verify the crafted signature using the malicious verification key.</li>
<li>Due to the mishandled edge case, the <code>use_hint</code> function incorrectly accepts the invalid signature as valid.</li>
<li>The targeted system or application trusts the forged signature, leading to unauthorized access or execution of malicious code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to bypass signature verification mechanisms in applications using <code>libcrux-ml-dsa</code> library prior to version 0.0.9. This could lead to complete system compromise, unauthorized code execution, or data manipulation. While the exact number of affected systems is unknown, any application utilizing the vulnerable library for signature verification is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>rust/libcrux-ml-dsa</code> to version <code>0.0.9</code> or later to patch the vulnerability (reference: Mitigation section).</li>
<li>Monitor applications using <code>libcrux-ml-dsa</code> for unexpected behavior related to signature verification, such as unauthorized access attempts (reference: Overview).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>signature-bypass</category><category>vulnerability</category></item></channel></rss>