CVE-2026-34155

EUVD-2026-17413
RAUC controls the update process on embedded Linux systems. Prior to version 1.15.2, RAUC bundles using the 'plain' format exceeding a payload size of 2 GiB cause an integer overflow which results in a signature which covers only the first few bytes of the payload. Given such a bundle with a legitimate signature, an attacker can modify the part of the payload which is not covered by the signature. This issue has been patched in version 1.15.2.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 4%
Affected Products (NVD)
VendorProductVersion
pengutronixrauc
𝑥
< 1.15.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
rauc
bookworm
no-dsa
bullseye
postponed
forky
1.15.2-1
fixed
sid
1.15.2-1
fixed
trixie
no-dsa