Medium severity5.3NVD Advisory· Published Mar 31, 2026· Updated Apr 3, 2026
CVE-2026-34155
CVE-2026-34155
Description
RAUC controls the update process on embedded Linux systems. Prior to version 1.15.2, RAUC bundles using the 'plain' format exceeding a payload size of 2 GiB cause an integer overflow which results in a signature which covers only the first few bytes of the payload. Given such a bundle with a legitimate signature, an attacker can modify the part of the payload which is not covered by the signature. This issue has been patched in version 1.15.2.
Affected products
1Patches
14fb7c798d6aehttps://github.com/rauc/raucvia nvd-ref
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3- github.com/rauc/rauc/commit/4fb7c798d6ae412344fb8f8d310d773046af3441nvdPatch
- github.com/rauc/rauc/security/advisories/GHSA-6hj7-q844-m2hxnvdMitigationPatchVendor Advisory
- github.com/rauc/rauc/releases/tag/v1.15.2nvdRelease Notes
News mentions
0No linked articles in our index yet.