Improper Certificate Validation Affecting nova package, versions <3.11.14-r3


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-NOVA-16026636
  • published14 Apr 2026
  • disclosed8 Apr 2026

Introduced: 8 Apr 2026

NewCVE-2026-33810  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

Upgrade Chainguard nova to version 3.11.14-r3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream nova package and not the nova package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.

CVSS Base Scores

version 3.1