CVE-2026-34155 in rauc
요약 (영어)
RAUC controls the update process on embedded Linux systems. Prior to version 1.15.2, RAUC bundles using the 'plain' format exceeding a payload size of 2 GiB cause an integer overflow which results in a signature which covers only the first few bytes of the payload. Given such a bundle with a legitimate signature, an attacker can modify the part of the payload which is not covered by the signature. This issue has been patched in version 1.15.2.
책임이 있는
GitHub_M
예약하다
2026. 03. 25.
공개
2026. 03. 31.
엔트리
VulDB provides additional information and datapoints for this CVE:
| 아이디 | 취약성 | CWE | 악용 | 대책 | CVE |
|---|---|---|---|---|---|
| 354385 | rauc 권한 상승 | 196 | 정의되지 않음 | 공식 수정 | CVE-2026-34155 |