GHSA-xrf2-5r3p-5wgj: libcrux: Panic in Signature Hint Decoding During Verification
highvulnerability
security
Source: GitHub Advisory DatabaseMarch 26, 2026
Summary
libcrux, a library implementing ML-DSA (a post-quantum digital signature algorithm), had a bug in hint decoding during signature verification where it failed to validate that cumulative hint counters stayed within bounds for the last row of data. An attacker could craft a malicious signature that causes the decoder to read outside its memory bounds, triggering a runtime panic (sudden crash).
Solution / Mitigation
Starting from version 0.0.8, hint decoding will check the cumulative hint counter of the last row as well.
Classification
Attack SophisticationModerate
Affected Packages
libcrux-ml-dsa@< 0.0.8 (fixed: 0.0.8)
Monthly digest — independent AI security research
Original source: https://github.com/advisories/GHSA-xrf2-5r3p-5wgj
First tracked: March 26, 2026 at 02:00 PM
Classified by LLM (prompt v3) · confidence: 95%