CLEANSTART-2026-VS64679

See a problem?
Import Source
https://github.com/cleanstart-dev/cleanstart-security-advisories/blob/main/advisories/2026/CLEANSTART-2026-VS64679.json
JSON Data
https://api.test.osv.dev/v1/vulns/CLEANSTART-2026-VS64679
Upstream
  • CVE-2025-58183
  • CVE-2025-61725
Published
2026-01-30T16:35:25.680295Z
Modified
2026-03-10T03:46:16.249416Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
ParseAddress function constructs domain-literal address components through repeated string concatenation
Details

Multiple security vulnerabilities affect the go-fips-1.24 package. The ParseAddress function constructs domain-literal address components through repeated string concatenation. See references for individual vulnerability details.

References

Affected packages

CleanStart / go-fips-1.24

Package

Name
go-fips-1.24

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.24.9-r0

Database specific

source
"https://github.com/cleanstart-dev/cleanstart-security-advisories/blob/main/advisories/2026/CLEANSTART-2026-VS64679.json"