PT-2026-2255 · Unknown · Rustcrypto Signatures

Tob-Scott-A

·

Published

2025-12-12

·

Updated

2026-02-02

·

CVE-2026-22705

CVSS v3.1

6.4

Medium

AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
Name of the Vulnerable Software and Affected Versions RustCrypto versions prior to 0.1.0-rc.2
Description RustCrypto: Signatures provides support for digital signatures using public-key cryptography. A timing side-channel was discovered in the Decompose algorithm, which is used during ML-DSA signing to generate hints for the signature. This issue allows an attacker with precise timing measurements to potentially extract information about the signing key by observing timing variations during the division operation. The decompose function originally used a hardware division instruction which has variable timing based on operand values. The division operation involved secret-derived data, making it susceptible to timing attacks. The issue was addressed by replacing the integer division with a constant-time Barrett reduction.
Recommendations Update to version 0.1.0-rc.2 or later.

Exploit

Fix

Weakness Enumeration

Related Identifiers

CVE-2026-22705
GHSA-HCP2-X6J4-29J7
RUSTSEC-2025-0144

Affected Products

Rustcrypto Signatures