Anonymous Intelligence Signal

Cryptography Library v46.0.6 Patches Critical DNS Validation Flaw (CVE-2026-34073)

human The Lab unverified 2026-03-29 04:26:57 Source: GitHub Issues

A critical security vulnerability in the widely-used Python cryptography library has been patched, forcing a mandatory update for any system using versions prior to 46.0.5. The flaw, tracked as CVE-2026-34073, resides in the library's handling of DNS name constraints during certificate validation. Specifically, the vulnerability allowed a peer certificate with a name like `bar.example.com` to be incorrectly validated against a wildcard leaf certificate, bypassing intended security constraints. This failure occurred because validation checks were only applied to Subject Alternative Names (SANs) within child certificates and not to the "peer name" presented during each validation step.

The issue was addressed in version 46.0.6 of the `cryptography` package, released by the PyCA (Python Cryptographic Authority) project. The update is marked as a security fix, and the associated GitHub security advisory (GHSA-m959-cc7f-wv43) provides the technical details. The patch corrects the validation logic to ensure the peer name is properly checked against all relevant constraints, closing the loophole that could have allowed unauthorized certificate validation.

This vulnerability poses a significant risk to any application or service that relies on the `cryptography` library for TLS/SSL certificate validation, a foundational component of secure network communications. Systems that have not updated from `cryptography==46.0.5` or earlier remain exposed. The flaw underscores the critical importance of dependency management and the rapid deployment of security patches for core cryptographic components, as such bugs can undermine the entire chain of trust in encrypted communications.