CVE-2026-34155

RAUC controls the update process on embedded Linux systems. Prior to version 1.15.2, RAUC bundles using the 'plain' format exceeding a payload size of 2 GiB cause an integer overflow which results in a signature which covers only the first few bytes of the payload. Given such a bundle with a legitimate signature, an attacker can modify the part of the payload which is not covered by the signature. This issue has been patched in version 1.15.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pengutronix:rauc:*:*:*:*:*:*:*:*

History

03 Apr 2026, 15:53

Type Values Removed Values Added
CPE cpe:2.3:a:pengutronix:rauc:*:*:*:*:*:*:*:*
First Time Pengutronix
Pengutronix rauc
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
References () https://github.com/rauc/rauc/commit/4fb7c798d6ae412344fb8f8d310d773046af3441 - () https://github.com/rauc/rauc/commit/4fb7c798d6ae412344fb8f8d310d773046af3441 - Patch
References () https://github.com/rauc/rauc/releases/tag/v1.15.2 - () https://github.com/rauc/rauc/releases/tag/v1.15.2 - Release Notes
References () https://github.com/rauc/rauc/security/advisories/GHSA-6hj7-q844-m2hx - () https://github.com/rauc/rauc/security/advisories/GHSA-6hj7-q844-m2hx - Mitigation, Patch, Vendor Advisory

31 Mar 2026, 14:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 14:16

Updated : 2026-04-03 15:53


NVD link : CVE-2026-34155

Mitre link : CVE-2026-34155

CVE.ORG link : CVE-2026-34155


JSON object : View

Products Affected

pengutronix

  • rauc
CWE
CWE-196

Unsigned to Signed Conversion Error

CWE-347

Improper Verification of Cryptographic Signature