RAUC controls the update process on embedded Linux systems. Prior to version 1.15.2, RAUC bundles using the 'plain' format exceeding a payload size of 2 GiB cause an integer overflow which results in a signature which covers only the first few bytes of the payload. Given such a bundle with a legitimate signature, an attacker can modify the part of the payload which is not covered by the signature. This issue has been patched in version 1.15.2.
References
| Link | Resource |
|---|---|
| https://github.com/rauc/rauc/commit/4fb7c798d6ae412344fb8f8d310d773046af3441 | Patch |
| https://github.com/rauc/rauc/releases/tag/v1.15.2 | Release Notes |
| https://github.com/rauc/rauc/security/advisories/GHSA-6hj7-q844-m2hx | Mitigation Patch Vendor Advisory |
Configurations
History
03 Apr 2026, 15:53
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:pengutronix:rauc:*:*:*:*:*:*:*:* | |
| First Time |
Pengutronix
Pengutronix rauc |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| References | () https://github.com/rauc/rauc/commit/4fb7c798d6ae412344fb8f8d310d773046af3441 - Patch | |
| References | () https://github.com/rauc/rauc/releases/tag/v1.15.2 - Release Notes | |
| References | () https://github.com/rauc/rauc/security/advisories/GHSA-6hj7-q844-m2hx - Mitigation, Patch, Vendor Advisory |
31 Mar 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-31 14:16
Updated : 2026-04-03 15:53
NVD link : CVE-2026-34155
Mitre link : CVE-2026-34155
CVE.ORG link : CVE-2026-34155
JSON object : View
Products Affected
pengutronix
- rauc
