CLEANSTART-2026-FB07695

See a problem?
Import Source
https://github.com/cleanstart-dev/cleanstart-security-advisories/blob/main/advisories/2026/CLEANSTART-2026-FB07695.json
JSON Data
https://api.osv.dev/v1/vulns/CLEANSTART-2026-FB07695
Upstream
  • CVE-2026-25679
  • CVE-2026-27139
  • CVE-2026-27142
  • CVE-2026-32280
  • CVE-2026-32281
  • CVE-2026-32282
  • CVE-2026-32283
  • CVE-2026-32289
  • CVE-2026-33810
  • CVE-2026-34986
  • CVE-2026-39883
  • ghsa-f6x5-jh6r-wrfv
  • ghsa-j5w8-q4qc-rx2x
  • ghsa-xmrv-pmrh-hhx2
Published
2026-04-15T00:45:38.848496Z
Modified
2026-04-15T05:45:23.498193Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint
Details

Multiple security vulnerabilities affect the velero-fips package. When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. See references for individual vulnerability details.

References

Affected packages

CleanStart / velero-fips

Package

Name
velero-fips

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.17.2-r5

Database specific

source
"https://github.com/cleanstart-dev/cleanstart-security-advisories/blob/main/advisories/2026/CLEANSTART-2026-FB07695.json"