CVE-2026-34155 in rauc
要約 (英語)
RAUC controls the update process on embedded Linux systems. Prior to version 1.15.2, RAUC bundles using the 'plain' format exceeding a payload size of 2 GiB cause an integer overflow which results in a signature which covers only the first few bytes of the payload. Given such a bundle with a legitimate signature, an attacker can modify the part of the payload which is not covered by the signature. This issue has been patched in version 1.15.2.
責任者
GitHub_M
予約する
2026年03月25日
公開
2026年03月31日
エントリ
VulDB provides additional information and datapoints for this CVE:
| 識別子 | 脆弱性 | CWE | 悪用可 | 対策 | CVE |
|---|---|---|---|---|---|
| 354385 | rauc 特権昇格 | 196 | 未定義 | 公式な修正 | CVE-2026-34155 |