RAUC controls the update process on embedded Linux systems. Prior to version 1.15.2, RAUC bundles using the 'plain' format exceeding a payload size of 2 GiB cause an integer overflow which results in a signature which covers only the first few bytes of the payload. Given such a bundle with a legitimate signature, an attacker can modify the part of the payload which is not covered by the signature. This issue has been patched in version 1.15.2.
1.1-21.2-11.5.1-11.5.1-1build11.6-11.10.1-11.10.1-21.11-11.11-1build31.11.3-21.13-11.13-3Exploitability
AV:NAC:LAT:PPR:LUI:PVulnerable System
VC:LVI:HVA:NSubsequent System
SC:HSI:HSA:HCVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:N/SC:H/SI:H/SA:H