CVE-2026-34155
HIGH
7,2
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: passive
Confidentiality: N/A
Integrity: N/A
Availability: N/A
Description
AI Translation Available
RAUC controls the update process on embedded Linux systems. Prior to version 1.15.2, RAUC bundles using the 'plain' format exceeding a payload size of 2 GiB cause an integer overflow which results in a signature which covers only the first few bytes of the payload. Given such a bundle with a legitimate signature, an attacker can modify the part of the payload which is not covered by the signature. This issue has been patched in version 1.15.2.
196
Unsigned to Signed Conversion Error
DraftCommon Consequences
Security Scopes Affected:
Availability
Integrity
Confidentiality
Access Control
Potential Impacts:
Dos: Crash, Exit, Or Restart
Modify Memory
Execute Unauthorized Code Or Commands
Bypass Protection Mechanism
Applicable Platforms
Languages:
C, C++
347
Improper Verification of Cryptographic Signature
DraftCommon Consequences
Security Scopes Affected:
Access Control
Integrity
Confidentiality
Potential Impacts:
Gain Privileges Or Assume Identity
Modify Application Data
Execute Unauthorized Code Or Commands
Applicable Platforms
All platforms may be affected
https://github.com/rauc/rauc/commit/4fb7c798d6ae412344fb8f8d310d773046af3441
https://github.com/rauc/rauc/releases/tag/v1.15.2
https://github.com/rauc/rauc/security/advisories/GHSA-6hj7-q844-m2hx