{"id":"CLEANSTART-2026-HL71566","summary":"excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate","details":"Multiple security vulnerabilities affect the docker-fips package. An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. See references for individual vulnerability details.","modified":"2026-04-02T13:31:30.009527Z","published":"2026-01-30T16:50:56.129322Z","upstream":["CVE-2019-13509","CVE-2019-14271","CVE-2020-13401","CVE-2021-21285","CVE-2021-41089","CVE-2022-29526","CVE-2023-26054","CVE-2024-23650","CVE-2024-23651","CVE-2024-23652","CVE-2024-23653","CVE-2024-24557","CVE-2024-41110","CVE-2025-61727","CVE-2025-61729"],"database_specific":{},"references":[{"type":"ADVISORY","url":"https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-HL71566"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2019-13509"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2019-14271"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2020-13401"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2021-21285"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2021-41089"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2022-29526"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2023-26054"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2024-23650"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2024-23651"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2024-23652"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2024-23653"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2024-24557"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2024-41110"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-61727"},{"type":"WEB","url":"https://osv.dev/vulnerability/CVE-2025-61729"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13509"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14271"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13401"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21285"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41089"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29526"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-26054"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23650"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23651"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23652"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23653"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-24557"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41110"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-61727"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-61729"}],"affected":[{"package":{"name":"docker-fips","ecosystem":"CleanStart"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"28.4.0-r0"}]}],"database_specific":{"source":"https://github.com/cleanstart-dev/cleanstart-security-advisories/blob/main/advisories/2026/CLEANSTART-2026-HL71566.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}