@@ -32,15 +32,15 @@ This is typically the case for SCS clouds, as S3 compatibility is a requirement.
3232
3333While creating AppCreds with roles with lower privileges is not a very common
3434use case, it is supported by OpenStack clouds and is actually a good practice
35- to limit the privileges of running coponents or the delegated privileges for
35+ to limit the privileges of running components or the delegated privileges for
3636human bearers of the AppCred. The fact that EC2 credentials can be used to
37- work around an regain the privileges of the user who created the original
37+ work around and regain the privileges of the user who created the original
3838AppCred is a serious issue, as it breaks the principle of least privileges
3939and may weaken or break security models for applications or delegated
4040authorizations.
4141
4242Note that this vulnerability does not allow to escalate privileges further
43- than the original AppCred creators privileges and does require the attacker
43+ than the original AppCred creator's privileges and does require the attacker
4444to get access to the limited AppCred in the first place.
4545
4646## Embargo
@@ -73,7 +73,7 @@ The SCS ecosystem software providers provide fixed keystone images and
7373installation instructions here as soon as the updated images are available:
7474
7575- [ OSISM] ( https://osism.tech/docs/appendix/security/ossa-2026-005 )
76- - [ yaook] <!-- (https://yaook.cloud/security-advisories-cve-2026-33551) --> (TBD )
76+ - [ yaook] ( https://yaook.cloud/security-advisories-cve-2026-33551 )
7777
7878## Thanks
7979
@@ -88,4 +88,5 @@ SCS security contact is [security@scs.community](mailto:security@scs.community),
8888
8989## Version history
9090
91+ - Typo fixes and yaook link, v1.0, 2026-04-09, 10:30 CEST
9192- Initial draft, v0,9, 2026-04-08, 13:45 CEST
0 commit comments