Report: Breaking: CVE-2026-34155 - RAUC: Improper Signing of Plain Bundles Exceeding 2 GiB

Report: Breaking: CVE-2026-34155 - RAUC: Improper Signing of Plain Bundles Exceeding 2 GiB

CVE ID :CVE-2026-34155 Published : March 31, 2026, 1:28 p.m. | 34 minutes ago Description :RAUC controls the update process on embedded Linux systems. Prior to version 1.15.2, RAUC bundles using the 'plain' format exceeding a payload size of 2 GiB cause an integer overflow which results in a signature which covers only the first few bytes of the payload. Given such a bundle with a legitimate signature, an attacker can modify the part of the payload which is not covered by the signature. This issue has been patched in version 1.15.2. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Published
March 31, 2026
Affected Product: Linux