CVE-2026-34155
EUVD-2026-1741331.03.2026, 14:16
RAUC controls the update process on embedded Linux systems. Prior to version 1.15.2, RAUC bundles using the 'plain' format exceeding a payload size of 2 GiB cause an integer overflow which results in a signature which covers only the first few bytes of the payload. Given such a bundle with a legitimate signature, an attacker can modify the part of the payload which is not covered by the signature. This issue has been patched in version 1.15.2.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| pengutronix | rauc | 𝑥 < 1.15.2 |
𝑥
= Vulnerable software versions
Debian Releases