CVE-2026-34155 in rauc情報

要約 (英語)

RAUC controls the update process on embedded Linux systems. Prior to version 1.15.2, RAUC bundles using the 'plain' format exceeding a payload size of 2 GiB cause an integer overflow which results in a signature which covers only the first few bytes of the payload. Given such a bundle with a legitimate signature, an attacker can modify the part of the payload which is not covered by the signature. This issue has been patched in version 1.15.2.

責任者

GitHub_M

予約する

2026年03月25日

公開

2026年03月31日

エントリ

VulDB provides additional information and datapoints for this CVE:

識別子脆弱性CWE悪用可対策CVE
354385rauc 特権昇格196未定義公式な修正CVE-2026-34155

Might our Artificial Intelligence support you?

Check our Alexa App!