Untriaged
RAUC: Improper Signing of Plain Bundles Exceeding 2 GiB
RAUC controls the update process on embedded Linux systems. Prior to version 1.15.2, RAUC bundles using the 'plain' format exceeding a payload size of 2 GiB cause an integer overflow which results in a signature which covers only the first few bytes of the payload. Given such a bundle with a legitimate signature, an attacker can modify the part of the payload which is not covered by the signature. This issue has been patched in version 1.15.2.
References
-
https://github.com/rauc/rauc/security/advisories/GHSA-6hj7-q844-m2hx x_refsource_CONFIRM
-
https://github.com/rauc/rauc/releases/tag/v1.15.2 x_refsource_MISC
Affected products
rauc
- ==< 1.15.2
Package maintainers
-
@Emantor Rouven Czerwinski <rouven+nixos@czerwinskis.de>