CVE-2026-34073

Source
https://cve.org/CVERecord?id=CVE-2026-34073
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-34073.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-34073
Aliases
Downstream
Related
Published
2026-03-31T02:04:36.275Z
Modified
2026-04-14T18:44:40.132430463Z
Severity
  • 1.7 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U CVSS Calculator
Summary
cryptography has incomplete DNS name constraint enforcement on peer names
Details

cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Prior to version 46.0.6, DNS name constraints were only validated against SANs within child certificates, and not the "peer name" presented during each validation. Consequently, cryptography would allow a peer named bar.example.com to validate against a wildcard leaf certificate for *.example.com, even if the leaf's parent certificate (or upwards) contained an excluded subtree constraint for bar.example.com. This issue has been patched in version 46.0.6.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/34xxx/CVE-2026-34073.json",
    "cwe_ids": [
        "CWE-295"
    ]
}
References

Affected packages

Git / github.com/pyca/cryptography

Affected ranges

Type
GIT
Repo
https://github.com/pyca/cryptography
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "46.0.6"
        }
    ]
}

Affected versions

0.*
0.1
0.2
0.3
0.4
0.5
0.5.1
0.6
0.7
0.8
0.9
1.*
1.0
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
2.*
2.0
2.1
2.2
2.3
2.4
2.4.1
2.5
2.6
2.6.1
2.7
2.8
2.9
3.*
3.0
3.1
3.2
3.3
3.4
35.*
35.0.0
36.*
36.0.0
37.*
37.0.0
38.*
38.0.0
39.*
39.0.0
40.*
40.0.0
41.*
41.0.0
42.*
42.0.0
43.*
43.0.0
44.*
44.0.0
45.*
45.0.0
46.*
46.0.0
46.0.1
46.0.2
46.0.3
46.0.4
46.0.5

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-34073.json"