Bump cryptography from 46.0.3 to 46.0.7 in /content/response_integrations/power_ups/tools
Open
Number: #68
Type: Pull Request
State: Open
Type: Pull Request
State: Open
Author:
dependabot[bot]
Association: Unknown
Comments: 1
Association: Unknown
Comments: 1
Created:
April 08, 2026 at 08:57 PM UTC
(13 days ago)
(13 days ago)
Updated:
April 08, 2026 at 08:58 PM UTC
(13 days ago)
(13 days ago)
Labels:
dependencies python:uv
dependencies python:uv
Description:
Bumps cryptography from 46.0.3 to 46.0.7.
Changelog
Sourced from cryptography's changelog.
46.0.7 - 2026-04-07
* **SECURITY ISSUE**: Fixed an issue where non-contiguous buffers could be passed to APIs that accept Python buffers, which could lead to buffer overflow. **CVE-2026-39892** * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.5.6... _v46-0-6:
46.0.6 - 2026-03-25
- SECURITY ISSUE: Fixed a bug where name constraints were not applied to peer names during verification when the leaf certificate contains a wildcard DNS SAN. Ordinary X.509 topologies are not affected by this bug, including those used by the Web PKI. Credit to Oleh Konko (1seal) for reporting the issue. CVE-2026-34073
.. _v46-0-5:
46.0.5 - 2026-02-10
* An attacker could create a malicious public key that reveals portions of your private key when using certain uncommon elliptic curves (binary curves). This version now includes additional security checks to prevent this attack. This issue only affects binary elliptic curves, which are rarely used in real-world applications. Credit to **XlabAI Team of Tencent Xuanwu Lab and Atuin Automated Vulnerability Discovery Engine** for reporting the issue. **CVE-2026-26007** * Support for ``SECT*`` binary elliptic curves is deprecated and will be removed in the next release... v46-0-4:
46.0.4 - 2026-01-27
Dropped support for win_arm64 wheels_.- Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.5.5.
.. _v46-0-3:
Commits
622d67246.0.7 release (#14602)91d7288Cherry-pick #14542 (#14543)06e120ebump version for 46.0.5 release (#14289)0eebb9dEC check key on cofactor > 1 (#14287)bedf6e1fix openssl version on 46 branch (#14220)e6f44fcbump for 46.0.4 and drop win arm64 due to CI issues (#14217)- See full diff in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the Security Alerts page.
Package Dependencies
Package:
cryptography
Ecosystem:
pip
pip
Version Change:
46.0.3 → 46.0.7
Update Type:
Patch
Patch
Path:
/content/response_integrations/power_ups/tools
Security Advisories
cryptography Vulnerable to a Subgroup Attack Due to Missing Subgroup Validation for SECT Curves
GHSA-r6ph-v2qm-q3c2
CVE-2026-26007
HIGH
## Vulnerability Summary
The `public_key_from_numbers` (or `EllipticCurvePublicNumbers.public_key()`), `EllipticCurvePublicNumbers.public_key()`, `load_der_public_key()` and `load_pem_public_key()...
cryptography has incomplete DNS name constraint enforcement on peer names
GHSA-m959-cc7f-wv43
CVE-2026-34073
LOW
## Summary
In versions of cryptography prior to 46.0.5, DNS name constraints were only validated against SANs within child certificates, and not the "peer name" presented during each validation. C...
SGLangs `replay_request_dump.py` contains an insecure pickle.load() without validation and proper deserialization
GHSA-hvwj-8w5g-28rg
CVE-2026-3989
HIGH
SGLangs `replay_request_dump.py` contains an insecure pickle.load() without validation and proper deserialization. An attacker can take advantage of this by providing a malicious .pkl file, which w...
Cryptography vulnerable to buffer overflow if non-contiguous buffers were passed to APIs
GHSA-p423-j2cm-9vmq
CVE-2026-39892
MODERATE
If a non-contiguous buffer was passed to APIs which accepted Python buffers (e.g. `Hash.update()`), this could lead to buffer overflows. For example:
```python
h = Hash(SHA256())
b.update(buf[::-1...
Technical Details
| ID: | 15141689 |
| UUID: | 4227605673 |
| Node ID: | PR_kwDOQmqEms7Q72wM |
| Host: | GitHub |
| Repository: | metron-labs/content-hub |