DEBIAN-CVE-2026-33551

Source
https://security-tracker.debian.org/tracker/CVE-2026-33551
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33551.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-33551
Upstream
  • CVE-2026-33551
Published
2026-04-10T03:16:02.723Z
Modified
2026-04-12T04:02:05.245032Z
Severity
  • 3.5 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in OpenStack Keystone 14 through 26 before 26.1.1, 27.0.0, 28.0.0, and 29.0.0. Restricted application credentials can create EC2 credentials. By using a restricted application credential to call the EC2 credential creation API, an authenticated user with only a reader role may obtain an EC2/S3 credential that carries the full set of the parent user's S3 permissions, effectively bypassing the role restrictions imposed on the application credential. Only deployments that use restricted application credentials in combination with the EC2/S3 compatibility API (swift3 / s3api) are affected.

References

Affected packages

Debian:11 / keystone

Package

Name
keystone
Purl
pkg:deb/debian/keystone?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:18.*
2:18.0.0-3
2:18.0.0-3+deb11u1
2:18.1.0-1+deb11u2
2:19.*
2:19.0.0~rc1-1
2:19.0.0-1
2:19.0.0-2
2:19.0.0-3
2:20.*
2:20.0.0~rc1-1
2:20.0.0~rc1-2
2:20.0.0-1
2:20.0.0-2
2:20.0.0-3
2:21.*
2:21.0.0~rc1-1
2:21.0.0~rc1-2
2:21.0.0-1
2:21.0.0-2
2:21.0.0-3
2:22.*
2:22.0.0~rc1-1
2:22.0.0~rc1-2
2:22.0.0-1
2:22.0.0-1.1
2:22.0.0-2
2:23.*
2:23.0.0~rc1-1
2:23.0.0-1
2:23.0.0-2
2:23.0.0-3
2:23.0.0-4
2:23.0.0-5
2:23.0.0-6
2:24.*
2:24.0.0~rc1-1
2:24.0.0-1
2:24.0.0-2
2:24.0.0-3
2:25.*
2:25.0.0-1
2:25.0.0-2
2:25.0.0-3
2:26.*
2:26.0.0~rc1-1
2:26.0.0~rc1-2
2:26.0.0-1
2:26.0.0-2
2:26.0.0-3
2:26.0.0-4
2:27.*
2:27.0.0~rc1-1
2:27.0.0~rc1-2
2:27.0.0-1
2:27.0.0-2
2:27.0.0-3
2:28.*
2:28.0.0~rc1-1
2:28.0.0~rc1-2
2:28.0.0~rc1-4
2:28.0.0-1
2:28.0.0-2
2:28.0.0-3
2:28.0.0-4
2:28.0.0-5
2:28.0.0-6
2:29.*
2:29.0.0~rc1-1
2:29.0.0~rc1-2
2:29.0.0-1
2:29.0.0-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33551.json"

Debian:12 / keystone

Package

Name
keystone
Purl
pkg:deb/debian/keystone?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:22.*
2:22.0.0-2
2:22.0.2-0+deb12u1
2:23.*
2:23.0.0~rc1-1
2:23.0.0-1
2:23.0.0-2
2:23.0.0-3
2:23.0.0-4
2:23.0.0-5
2:23.0.0-6
2:24.*
2:24.0.0~rc1-1
2:24.0.0-1
2:24.0.0-2
2:24.0.0-3
2:25.*
2:25.0.0-1
2:25.0.0-2
2:25.0.0-3
2:26.*
2:26.0.0~rc1-1
2:26.0.0~rc1-2
2:26.0.0-1
2:26.0.0-2
2:26.0.0-3
2:26.0.0-4
2:27.*
2:27.0.0~rc1-1
2:27.0.0~rc1-2
2:27.0.0-1
2:27.0.0-2
2:27.0.0-3
2:28.*
2:28.0.0~rc1-1
2:28.0.0~rc1-2
2:28.0.0~rc1-4
2:28.0.0-1
2:28.0.0-2
2:28.0.0-3
2:28.0.0-4
2:28.0.0-5
2:28.0.0-6
2:29.*
2:29.0.0~rc1-1
2:29.0.0~rc1-2
2:29.0.0-1
2:29.0.0-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33551.json"

Debian:13 / keystone

Package

Name
keystone
Purl
pkg:deb/debian/keystone?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:27.*
2:27.0.0-3
2:27.0.0-3+deb13u1
2:28.*
2:28.0.0~rc1-1
2:28.0.0~rc1-2
2:28.0.0~rc1-4
2:28.0.0-1
2:28.0.0-2
2:28.0.0-3
2:28.0.0-4
2:28.0.0-5
2:28.0.0-6
2:29.*
2:29.0.0~rc1-1
2:29.0.0~rc1-2
2:29.0.0-1
2:29.0.0-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33551.json"

Debian:14 / keystone

Package

Name
keystone
Purl
pkg:deb/debian/keystone?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:29.0.0-2

Affected versions

2:27.*
2:27.0.0-3
2:28.*
2:28.0.0~rc1-1
2:28.0.0~rc1-2
2:28.0.0~rc1-4
2:28.0.0-1
2:28.0.0-2
2:28.0.0-3
2:28.0.0-4
2:28.0.0-5
2:28.0.0-6
2:29.*
2:29.0.0~rc1-1
2:29.0.0~rc1-2
2:29.0.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33551.json"