Bump cryptography from 46.0.5 to 46.0.6 in the uv group across 1 directory#58
Bump cryptography from 46.0.5 to 46.0.6 in the uv group across 1 directory#58
Conversation
Bumps the uv group with 1 update in the / directory: [cryptography](https://github.com/pyca/cryptography). Updates `cryptography` from 46.0.5 to 46.0.6 - [Changelog](https://github.com/pyca/cryptography/blob/main/CHANGELOG.rst) - [Commits](pyca/cryptography@46.0.5...46.0.6) --- updated-dependencies: - dependency-name: cryptography dependency-version: 46.0.6 dependency-type: direct:production dependency-group: uv ... Signed-off-by: dependabot[bot] <support@github.com>
|
Tip For best results, initiate chat on the files or code changes.
If you'd like me to review the changes, I can do that. Or if you'd like me to approve this security patch (bumping |
|
CVE-2026-34073 — Prior to version 46.0.6, DNS name constraints were only validated against SANs within child certificates, and not the "peer name" presented during each validation. Consequently, To close this gap, In practice, exploitation of this bypass requires an uncommon X.509 topology — one that the Web PKI avoids — and is consequently considered medium-to-low impact severity. The CVSS 4.0 base score is 1.7 (LOW). Triggering a full review now. ✅ Actions performedReview triggered.
|
|
No actionable comments were generated in the recent review. 🎉 ℹ️ Recent review info⚙️ Run configurationConfiguration used: Organization UI Review profile: ASSERTIVE Plan: Pro Run ID: ⛔ Files ignored due to path filters (1)
📒 Files selected for processing (1)
📝 WalkthroughWalkthroughUpdated the Changes
Estimated code review effort🎯 1 (Trivial) | ⏱️ ~2 minutes Suggested labels
🚥 Pre-merge checks | ✅ 3✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
|
Tip For best results, initiate chat on the files or code changes.
Could you let me know what you'd like help with? For example:
|
@coderabbitai check if bumping this version can have any unintended consequences on the application itself please |
|
Tip For best results, initiate chat on the files or code changes. 🧩 Analysis chainI'll look at how the application uses the 🏁 Script executed: Length of output: 1042 🌐 Web query: 💡 Result:
|
| Import | Purpose |
|---|---|
cryptography.hazmat.primitives.ciphers.aead.AESGCM |
AES-GCM symmetric encryption/decryption |
cryptography.hazmat.primitives.kdf.pbkdf2.PBKDF2HMAC |
Password-based key derivation |
cryptography.hazmat.primitives.hashes |
Hash primitives (e.g. SHA-256) |
These are all symmetric cryptography primitives — completely independent of X.509, TLS, or certificate verification code.
What 46.0.6 actually changes
The only change in 46.0.6 is the security fix for CVE-2026-34073: X.509 name constraints were not applied to peer names during verification when the leaf certificate contains a wildcard DNS SAN. No breaking changes are called out in the 46.0.6 changelog — it is a targeted security/bugfix release.
Conclusion
The CVE fix is scoped exclusively to X.509 certificate peer name validation, which this application never invokes. The APIs in use (AESGCM, PBKDF2HMAC, hashes) are entirely unaffected. You can safely merge this PR.
Bumps the uv group with 1 update in the / directory: cryptography.
Updates
cryptographyfrom 46.0.5 to 46.0.6Changelog
Sourced from cryptography's changelog.
Commits
91d7288Cherry-pick #14542 (#14543)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore <dependency name> major versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)@dependabot ignore <dependency name> minor versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)@dependabot ignore <dependency name>will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)@dependabot unignore <dependency name>will remove all of the ignore conditions of the specified dependency@dependabot unignore <dependency name> <ignore condition>will remove the ignore condition of the specified dependency and ignore conditionsYou can disable automated security fix PRs for this repo from the Security Alerts page.
Greptile Summary
This PR is a security-driven dependency bump for the
cryptographypackage from46.0.5to46.0.6, generated by Dependabot.requirements.txtis updated to pincryptography==46.0.6.uv.lockis updated with new checksums and download URLs for thecryptography46.0.6 distribution across all supported platforms (macOS universal2, manylinux, musllinux, Windows — for cp38-abi3, cp311-abi3, and cp314-cp314t ABIs).Confidence Score: 5/5
Safe to merge — this is a targeted security patch with no breaking changes and no application logic modifications.
The change is a pure patch-level dependency bump (46.0.5 → 46.0.6) that addresses a CVE. Both changed files (requirements.txt and uv.lock) are correctly updated and consistent with each other. All wheel hashes in the lock file correspond to the official PyPI release. There are no code changes, no API surface changes, and the cryptography changelog notes that ordinary X.509 / Web PKI topologies are unaffected by the bug being fixed.
No files require special attention.
Important Files Changed
cryptographyfrom 46.0.5 to 46.0.6 to address CVE-2026-34073 (wildcard DNS SAN name constraint bypass).cryptography46.0.6 across all supported platforms and Python ABI targets.Flowchart
%%{init: {'theme': 'neutral'}}%% flowchart TD A["CVE-2026-34073 Reported\n(Wildcard DNS SAN + Name Constraints bypass)"] --> B["cryptography 46.0.6 Released\n2026-03-25"] B --> C["Dependabot detects new version"] C --> D["PR #58 opened"] D --> E["requirements.txt\ncryptography==46.0.5 → 46.0.6"] D --> F["uv.lock\nAll wheel hashes updated\n(cp38-abi3, cp311-abi3, cp314-cp314t)"] E --> G["Security patch applied ✅"] F --> GReviews (1): Last reviewed commit: "Bump cryptography in the uv group across..." | Re-trigger Greptile
Release Notes
requirements.txtto pincryptography==46.0.6uv.lockwith updated checksums and URLs for cryptography 46.0.6Contribution Summary