Debian Package Tracker
Register | Log in
Subscribe

rauc

Robust Auto-Update Controller - binary

Choose email to subscribe with

general
  • source: rauc (main)
  • version: 1.15.2-1
  • maintainer: Uwe Kleine-König (DMD) (LowNMU)
  • arch: all
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.5.1-1
  • oldstable: 1.8-2
  • stable: 1.13-3
  • testing: 1.15.2-1
  • unstable: 1.15.2-1
versioned links
  • 1.5.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.8-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.13-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.15.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • rauc
  • rauc-service
action needed
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2026-03-28 Last update: 2026-04-12 10:31
1 low-priority security issue in trixie low

There is 1 open security issue in trixie.

1 issue left for the package maintainer to handle:
  • CVE-2026-34155: (needs triaging) RAUC controls the update process on embedded Linux systems. Prior to version 1.15.2, RAUC bundles using the 'plain' format exceeding a payload size of 2 GiB cause an integer overflow which results in a signature which covers only the first few bytes of the payload. Given such a bundle with a legitimate signature, an attacker can modify the part of the payload which is not covered by the signature. This issue has been patched in version 1.15.2.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-04-01 Last update: 2026-04-05 18:03
1 low-priority security issue in bookworm low

There is 1 open security issue in bookworm.

1 issue left for the package maintainer to handle:
  • CVE-2026-34155: (needs triaging) RAUC controls the update process on embedded Linux systems. Prior to version 1.15.2, RAUC bundles using the 'plain' format exceeding a payload size of 2 GiB cause an integer overflow which results in a signature which covers only the first few bytes of the payload. Given such a bundle with a legitimate signature, an attacker can modify the part of the payload which is not covered by the signature. This issue has been patched in version 1.15.2.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-04-01 Last update: 2026-04-05 18:03
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.3).
Created: 2026-03-31 Last update: 2026-03-31 15:01
testing migrations
  • This package will soon be part of the auto-openssl transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2026-04-03] rauc 1.15.2-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-28] Accepted rauc 1.15.2-1 (source) into unstable (Uwe Kleine-König)
  • [2026-01-25] rauc 1.15.1-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-19] Accepted rauc 1.15.1-1 (source) into unstable (Uwe Kleine-König)
  • [2025-12-30] rauc REMOVED from testing (Debian testing watch)
  • [2025-11-15] rauc 1.15-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-10] Accepted rauc 1.15-1 (source) into unstable (Uwe Kleine-König)
  • [2025-10-04] rauc 1.14-1 MIGRATED to testing (Debian testing watch)
  • [2025-09-29] Accepted rauc 1.14-1 (source) into unstable (Uwe Kleine-König)
  • [2025-04-26] rauc 1.13-3 MIGRATED to testing (Debian testing watch)
  • [2025-04-16] Accepted rauc 1.13-3 (source) into unstable (Uwe Kleine-König)
  • [2025-03-30] rauc 1.13-2 MIGRATED to testing (Debian testing watch)
  • [2025-03-25] Accepted rauc 1.13-2 (source) into unstable (Uwe Kleine-König)
  • [2025-02-08] rauc 1.13-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-03] Accepted rauc 1.13-1 (source) into unstable (Uwe Kleine-König)
  • [2024-11-05] rauc 1.12-1 MIGRATED to testing (Debian testing watch)
  • [2024-10-31] Accepted rauc 1.12-1 (source) into unstable (Uwe Kleine-König)
  • [2024-05-03] rauc 1.11.3-2 MIGRATED to testing (Debian testing watch)
  • [2024-04-05] Accepted rauc 1.11.3-2 (source) into unstable (Uwe Kleine-König)
  • [2024-03-18] Accepted rauc 1.11.3-1 (source) into unstable (Uwe Kleine-König)
  • [2023-12-28] rauc 1.11-1 MIGRATED to testing (Debian testing watch)
  • [2023-12-22] Accepted rauc 1.11-1 (source) into unstable (Uwe Kleine-König)
  • [2023-10-08] rauc 1.10.1-2 MIGRATED to testing (Debian testing watch)
  • [2023-10-03] Accepted rauc 1.10.1-2 (source) into unstable (Uwe Kleine-König)
  • [2023-08-13] rauc 1.10.1-1 MIGRATED to testing (Debian testing watch)
  • [2023-08-07] Accepted rauc 1.10.1-1 (source) into unstable (Uwe Kleine-König)
  • [2023-04-04] Accepted rauc 1.9-1 (source) into experimental (Uwe Kleine-König)
  • [2022-10-28] rauc 1.8-2 MIGRATED to testing (Debian testing watch)
  • [2022-10-26] Accepted rauc 1.8-2 (source) into unstable (Uwe Kleine-König)
  • [2022-10-05] Accepted rauc 1.8-1 (source) into unstable (Uwe Kleine-König)
  • 1
  • 2
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.15.1-1
  • 1 bug

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing