{"id":"UBUNTU-CVE-2026-40683","details":"In OpenStack Keystone before 28.0.1, the LDAP identity backend does not convert the user enabled attribute to a boolean when the user_enabled_invert configuration option is False (the default). The _ldap_res_to_model method in the UserApi class only performed string-to-boolean conversion when user_enabled_invert was True. When False, the raw string value from LDAP (e.g., \"FALSE\") was used directly. Since non-empty strings are truthy in Python, users marked as disabled in LDAP were treated as enabled by Keystone, allowing them to authenticate and perform actions. All deployments using the LDAP identity backend without user_enabled_invert=True or user_enabled_emulation are affected.","modified":"2026-04-27T20:16:51.152119Z","published":"2026-04-14T20:16:00Z","upstream":["CVE-2026-40683"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-40683"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2026-40683"},{"type":"REPORT","url":"https://bugs.launchpad.net/keystone/+bug/2121152"},{"type":"REPORT","url":"https://bugs.launchpad.net/keystone/+bug/2141713"},{"type":"REPORT","url":"https://review.opendev.org/958205"},{"type":"REPORT","url":"https://www.openwall.com/lists/oss-security/2026/04/14/9"}],"affected":[{"package":{"name":"keystone","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/keystone@2:9.3.0-0ubuntu3.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2:8.0.0-0ubuntu1","2:9.0.0~b1-0ubuntu1","2:9.0.0~b2-0ubuntu1","2:9.0.0~b3-0ubuntu1","2:9.0.0~rc1-0ubuntu1","2:9.0.0-0ubuntu1","2:9.0.2-0ubuntu1","2:9.0.2-0ubuntu2","2:9.1.0-0ubuntu1","2:9.2.0-0ubuntu1","2:9.3.0-0ubuntu1","2:9.3.0-0ubuntu2","2:9.3.0-0ubuntu3","2:9.3.0-0ubuntu3.1","2:9.3.0-0ubuntu3.2"],"ecosystem_specific":{"binaries":[{"binary_name":"keystone","binary_version":"2:9.3.0-0ubuntu3.2"},{"binary_name":"python-keystone","binary_version":"2:9.3.0-0ubuntu3.2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-40683.json"}},{"package":{"name":"keystone","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/keystone@2:13.0.4-0ubuntu1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2:12.0.0-0ubuntu1","2:13.0.0~b1-0ubuntu1","2:13.0.0~b2-0ubuntu1","2:13.0.0~b3-0ubuntu1","2:13.0.0~rc1-0ubuntu1","2:13.0.0~rc2-0ubuntu1","2:13.0.0-0ubuntu1","2:13.0.1-0ubuntu1","2:13.0.2-0ubuntu1","2:13.0.2-0ubuntu3","2:13.0.4-0ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"keystone","binary_version":"2:13.0.4-0ubuntu1"},{"binary_name":"python-keystone","binary_version":"2:13.0.4-0ubuntu1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-40683.json"}},{"package":{"name":"keystone","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/keystone@2:17.0.1-0ubuntu2+esm1?arch=source&distro=esm-infra/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2:16.0.0-0ubuntu1","2:17.0.0~b1~git2019121613.db81fee63-0ubuntu1","2:17.0.0~b2~git2020020513.99733f172-0ubuntu1","2:17.0.0~b3~git2020032415.9f9040257-0ubuntu1","2:17.0.0~b3~git2020032415.9f9040257-0ubuntu2","2:17.0.0~b3~git2020041013.7bb6314e4-0ubuntu1","2:17.0.0-0ubuntu0.20.04.1","2:17.0.1-0ubuntu1","2:17.0.1-0ubuntu2","2:17.0.1-0ubuntu2+esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"keystone","binary_version":"2:17.0.1-0ubuntu2+esm1"},{"binary_name":"keystone-common","binary_version":"2:17.0.1-0ubuntu2+esm1"},{"binary_name":"python3-keystone","binary_version":"2:17.0.1-0ubuntu2+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-40683.json"}},{"package":{"name":"keystone","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/keystone@2:21.0.1-0ubuntu2.2?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2:20.0.0-0ubuntu1","2:20.0.0+git2021120815.2ddf8f321-0ubuntu1","2:20.0.0+git2022011217.771c943ad-0ubuntu1","2:20.0.0+git2022030313.a3fc9e7c3-0ubuntu1","2:21.0.0-0ubuntu1","2:21.0.1-0ubuntu1","2:21.0.1-0ubuntu2","2:21.0.1-0ubuntu2.1","2:21.0.1-0ubuntu2.2"],"ecosystem_specific":{"binaries":[{"binary_name":"keystone","binary_version":"2:21.0.1-0ubuntu2.2"},{"binary_name":"keystone-common","binary_version":"2:21.0.1-0ubuntu2.2"},{"binary_name":"python3-keystone","binary_version":"2:21.0.1-0ubuntu2.2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-40683.json"}},{"package":{"name":"keystone","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/keystone@2:25.0.0-0ubuntu1.2?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2:24.0.0-0ubuntu1","2:24.0.0+git2024011916.adfa92b4-0ubuntu1","2:25.0.0~rc1-0ubuntu1","2:25.0.0-0ubuntu1","2:25.0.0-0ubuntu1.1","2:25.0.0-0ubuntu1.2"],"ecosystem_specific":{"binaries":[{"binary_name":"keystone","binary_version":"2:25.0.0-0ubuntu1.2"},{"binary_name":"keystone-common","binary_version":"2:25.0.0-0ubuntu1.2"},{"binary_name":"python3-keystone","binary_version":"2:25.0.0-0ubuntu1.2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-40683.json"}},{"package":{"name":"keystone","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/keystone@2:28.0.0-0ubuntu1.1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2:27.0.0-0ubuntu1","2:27.0.0+git2025080113.e066e18ab-0ubuntu1","2:28.0.0~rc1-0ubuntu1","2:28.0.0-0ubuntu1","2:28.0.0-0ubuntu1.1"],"ecosystem_specific":{"binaries":[{"binary_name":"keystone","binary_version":"2:28.0.0-0ubuntu1.1"},{"binary_name":"keystone-common","binary_version":"2:28.0.0-0ubuntu1.1"},{"binary_name":"python3-keystone","binary_version":"2:28.0.0-0ubuntu1.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-40683.json"}},{"package":{"name":"keystone","ecosystem":"Ubuntu:26.04","purl":"pkg:deb/ubuntu/keystone@2:29.0.0-0ubuntu1?arch=source&distro=resolute"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2:28.0.0-0ubuntu1","2:28.0.0-0ubuntu2","2:28.0.0+git20260119.61.8a42793e7-0ubuntu1","2:29.0.0~rc1-0ubuntu1","2:29.0.0-0ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"keystone","binary_version":"2:29.0.0-0ubuntu1"},{"binary_name":"keystone-common","binary_version":"2:29.0.0-0ubuntu1"},{"binary_name":"python3-keystone","binary_version":"2:29.0.0-0ubuntu1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-40683.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H"},{"type":"Ubuntu","score":"medium"}]}