DEBIAN-CVE-2026-41176

Source
https://security-tracker.debian.org/tracker/CVE-2026-41176
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-41176.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-41176
Upstream
Published
2026-04-23T00:16:45.800Z
Modified
2026-04-28T20:32:55.842556Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Rclone is a command-line program to sync files and directories to and from different cloud storage providers. The RC endpoint options/set is exposed without AuthRequired: true, but it can mutate global runtime configuration, including the RC option block itself. Starting in version 1.45.0 and prior to version 1.73.5, an unauthenticated attacker can set rc.NoAuth=true, which disables the authorization gate for many RC methods registered with AuthRequired: true on reachable RC servers that are started without global HTTP authentication. This can lead to unauthorized access to sensitive administrative functionality, including configuration and operational RC methods. Version 1.73.5 patches the issue.

References

Affected packages

Debian:11 / rclone

Package

Name
rclone
Purl
pkg:deb/debian/rclone?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.53.3-1
1.53.3-2
1.53.3-3
1.53.3-4
1.60.1+dfsg-1
1.60.1+dfsg-2
1.60.1+dfsg-3
1.60.1+dfsg-4
1.65.0+dfsg-1
1.65.0+dfsg-2
1.69.3+dfsg-1
1.69.3+dfsg-2
1.69.3+dfsg-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-41176.json"

Debian:12 / rclone

Package

Name
rclone
Purl
pkg:deb/debian/rclone?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.60.1+dfsg-2
1.60.1+dfsg-3
1.60.1+dfsg-4
1.65.0+dfsg-1
1.65.0+dfsg-2
1.69.3+dfsg-1
1.69.3+dfsg-2
1.69.3+dfsg-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-41176.json"

Debian:13 / rclone

Package

Name
rclone
Purl
pkg:deb/debian/rclone?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.60.1+dfsg-4
1.65.0+dfsg-1
1.65.0+dfsg-2
1.69.3+dfsg-1
1.69.3+dfsg-2
1.69.3+dfsg-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-41176.json"

Debian:14 / rclone

Package

Name
rclone
Purl
pkg:deb/debian/rclone?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.60.1+dfsg-4
1.65.0+dfsg-1
1.65.0+dfsg-2
1.69.3+dfsg-1
1.69.3+dfsg-2
1.69.3+dfsg-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-41176.json"