chore(deps): update dependency pyopenssl to v26 [security]#13914
chore(deps): update dependency pyopenssl to v26 [security]#13914renovate-bot wants to merge 1 commit intoGoogleCloudPlatform:mainfrom
Conversation
Summary of ChangesHello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request updates the Highlights
Changelog
Activity
Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for GitHub and other Google products, sign up here. You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension. Footnotes
|
There was a problem hiding this comment.
Code Review
This pull request updates the pyopenssl dependency to v26.0.0 to address a security vulnerability. While the update for cloud-media-livestream/keypublisher/requirements.txt appears to be safe, the update for cloud-sql/sql-server/sqlalchemy/requirements.txt introduces a critical dependency conflict. The cloud-sql-python-connector package has a requirement for an older version of the cryptography library that is incompatible with pyopenssl==26.0.0. Please see the specific comment for details on how to resolve this.
| gunicorn==23.0.0 | ||
| python-tds==1.16.0 | ||
| pyopenssl==25.0.0 | ||
| pyopenssl==26.0.0 |
There was a problem hiding this comment.
This update introduces an incompatible dependency. According to the release notes, pyopenssl==26.0.0 requires cryptography>=46.0.0. However, cloud-sql-python-connector==1.20.0 in this requirements.txt file requires cryptography<43.0.0. These conflicting requirements will cause installation to fail.
To fix this, you should revert this change until a compatible version of cloud-sql-python-connector is available.
pyopenssl==25.0.0
This PR contains the following updates:
==25.0.0→==26.0.0==25.0.0→==26.0.0Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
GitHub Vulnerability Alerts
CVE-2026-27448
If a user provided callback to
set_tlsext_servername_callbackraised an unhandled exception, this would result in a connection being accepted. If a user was relying on this callback for any security-sensitive behavior, this could allow bypassing it.Unhandled exceptions now result in rejecting the connection.
Credit to Leury Castillo for reporting this issue.
Release Notes
pyca/pyopenssl (pyOpenSSL)
v26.0.0Compare Source
Backward-incompatible changes:
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
cryptographyversion is now 46.0.0.Deprecations:
^^^^^^^^^^^^^
Changes:
^^^^^^^^
DTLS1_COOKIE_LENGTHbytes. Previously this would result in a buffer-overflow. Credit to dark_haxor for reporting the issue. CVE-2026-27459OpenSSL.SSL.Connection.get_group_nameto determine which group name was negotiated.Context.set_tlsext_servername_callbacknow handles exceptions raised in the callback by callingsys.excepthookand returning a fatal TLS alert. Previously, exceptions were silently swallowed and the handshake would proceed as if the callback had succeeded. Credit to Leury Castillo for reporting this issue. CVE-2026-27448v25.3.0Compare Source
Backward-incompatible changes:
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Deprecations:
^^^^^^^^^^^^^
Changes:
^^^^^^^^
cryptographyversion is now 46.x.v25.2.0Compare Source
Backward-incompatible changes:
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
cryptographyversion is now 45.0.7.Deprecations:
^^^^^^^^^^^^^
Changes:
^^^^^^^^
SSL_MODE_ACCEPT_MOVING_WRITE_BUFFERon connections by default, matching CPython's behavior.OpenSSL.SSL.Context.clear_mode.OpenSSL.SSL.Context.set_tls13_ciphersuitesto set the allowed TLS 1.3 ciphers.OpenSSL.SSL.Connection.set_info_callbackv25.1.0Compare Source
Backward-incompatible changes:
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Deprecations:
^^^^^^^^^^^^^
OpenSSL.SSL.Contextafter ithas been used to create an
OpenSSL.SSL.Connectionwill emit a warning. Ina future release, this will raise an exception.
Changes:
^^^^^^^^
cryptographymaximum version has been increased to 45.0.x.Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Never, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about these updates again.
This PR was generated by Mend Renovate. View the repository job log.