USTA Dependency Update Patches Critical Cryptography Bug in X.509 Wildcard Verification (CVE-2026-34073)
A routine dependency update within the USTA project has exposed a critical security vulnerability in a core Python cryptography library. The update patches a flaw where X.509 certificate name constraints were not being correctly applied during verification when a leaf certificate contained a wildcard DNS SAN. This bug could allow an attacker to bypass intended domain restrictions under specific, non-standard certificate topologies.
The vulnerability, tracked as CVE-2026-34073, was discovered and reported by researcher Oleh Konko (1seal). It was fixed in version 46.0.6 of the `pyca/cryptography` library. The changelog explicitly notes that ordinary X.509 topologies, including those used by the standard Web PKI, are not affected. The issue is specific to scenarios involving wildcard DNS Subject Alternative Names (SANs) and non-standard certificate chain verification logic.
This patch highlights the persistent, hidden risks in software supply chains. While the primary Web PKI remains secure, any internal or specialized PKI implementations using the affected library version and specific wildcard configurations could have been vulnerable to impersonation or authorization bypass. The update also included a separate fix from version 46.0.5, which added security checks to prevent private key leakage from malicious public keys when using uncommon binary elliptic curves. The swift patching by the cryptography maintainers, prompted by external disclosure, underscores the critical importance of monitoring and updating foundational security dependencies, even for seemingly mundane `chore(deps)` commits.