)]}'
{
  "commit": "10580d67b5d975ca2e2b66acf44bff8e211cbd48",
  "tree": "3301208ed40e712f32ed7d7fdaeee8ba3d510a77",
  "parents": [
    "46f4c25e716a7002453e4b24d5257a0913d77482"
  ],
  "author": {
    "name": "dependabot[bot]",
    "email": "49699333+dependabot[bot]@users.noreply.github.com",
    "time": "Tue Feb 06 15:35:47 2024 +0900"
  },
  "committer": {
    "name": "GitHub",
    "email": "noreply@github.com",
    "time": "Tue Feb 06 06:35:47 2024 +0000"
  },
  "message": "build(deps): bump cryptography from 39.0.0 to 41.0.6 in /tools/publish (#1581)\n\nBumps [cryptography](https://github.com/pyca/cryptography) from 39.0.0\nto 41.0.6.\n\u003cdetails\u003e\n\u003csummary\u003eChangelog\u003c/summary\u003e\n\u003cp\u003e\u003cem\u003eSourced from \u003ca\nhref\u003d\"https://github.com/pyca/cryptography/blob/main/CHANGELOG.rst\"\u003ecryptography\u0027s\nchangelog\u003c/a\u003e.\u003c/em\u003e\u003c/p\u003e\n\u003cblockquote\u003e\n\u003cp\u003e41.0.6 - 2023-11-27\u003c/p\u003e\n\u003cpre\u003e\u003ccode\u003e\n* Fixed a null-pointer-dereference and segfault that could occur when\nloading\ncertificates from a PKCS#7 bundle. Credit to **pkuzco** for reporting\nthe\n  issue. **CVE-2023-49083**\n\u003cp\u003e.. _v41-0-5:\u003c/p\u003e\n\u003cp\u003e41.0.5 - 2023-10-24\n\u003c/code\u003e\u003c/pre\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eUpdated Windows, macOS, and Linux wheels to be compiled with OpenSSL\n3.1.4.\u003c/li\u003e\n\u003cli\u003eAdded a function to support an upcoming \u003ccode\u003epyOpenSSL\u003c/code\u003e\nrelease.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e.. _v41-0-4:\u003c/p\u003e\n\u003cp\u003e41.0.4 - 2023-09-19\u003c/p\u003e\n\u003cpre\u003e\u003ccode\u003e\n* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL\n3.1.3.\n\u003cp\u003e.. _v41-0-3:\u003c/p\u003e\n\u003cp\u003e41.0.3 - 2023-08-01\n\u003c/code\u003e\u003c/pre\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eFixed performance regression loading DH public keys.\u003c/li\u003e\n\u003cli\u003eFixed a memory leak when using\n\n:class:\u003ccode\u003e~cryptography.hazmat.primitives.ciphers.aead.ChaCha20Poly1305\u003c/code\u003e.\u003c/li\u003e\n\u003cli\u003eUpdated Windows, macOS, and Linux wheels to be compiled with OpenSSL\n3.1.2.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e.. _v41-0-2:\u003c/p\u003e\n\u003cp\u003e41.0.2 - 2023-07-10\u003c/p\u003e\n\u003cpre\u003e\u003ccode\u003e\n* Fixed bugs in creating and parsing SSH certificates where critical\noptions\nwith values were handled incorrectly. Certificates are now created\ncorrectly\n  and parsing accepts correct values as well as the previously generated\ninvalid forms with a warning. In the next release, support for parsing\nthese\n  invalid forms will be removed.\n\u003cp\u003e.. _v41-0-1:\u003c/p\u003e\n\u003cp\u003e41.0.1 - 2023-06-01\n\u003c/code\u003e\u003c/pre\u003e\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eTemporarily allow invalid ECDSA signature algorithm parameters in\nX.509\ncertificates, which are generated by older versions of Java.\u003c/li\u003e\n\u003c/ul\u003e\n\u003c!-- raw HTML omitted --\u003e\n\u003c/blockquote\u003e\n\u003cp\u003e... (truncated)\u003c/p\u003e\n\u003c/details\u003e\n\u003cdetails\u003e\n\u003csummary\u003eCommits\u003c/summary\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca\nhref\u003d\"https://github.com/pyca/cryptography/commit/f09c261ca10a31fe41b1262306db7f8f1da0e48a\"\u003e\u003ccode\u003ef09c261\u003c/code\u003e\u003c/a\u003e\n41.0.6 release (\u003ca\nhref\u003d\"https://redirect.github.com/pyca/cryptography/issues/9927\"\u003e#9927\u003c/a\u003e)\u003c/li\u003e\n\u003cli\u003e\u003ca\nhref\u003d\"https://github.com/pyca/cryptography/commit/5012bedaef2dc60af3955306774b77ef379116e3\"\u003e\u003ccode\u003e5012bed\u003c/code\u003e\u003c/a\u003e\nbump for 41.0.5 release (\u003ca\nhref\u003d\"https://redirect.github.com/pyca/cryptography/issues/9766\"\u003e#9766\u003c/a\u003e)\u003c/li\u003e\n\u003cli\u003e\u003ca\nhref\u003d\"https://github.com/pyca/cryptography/commit/563b1193997512836603777d31e2ea281b3dc79a\"\u003e\u003ccode\u003e563b119\u003c/code\u003e\u003c/a\u003e\nAdded binding needed for pyOpenSSL (\u003ca\nhref\u003d\"https://redirect.github.com/pyca/cryptography/issues/9739\"\u003e#9739\u003c/a\u003e)\n(\u003ca\nhref\u003d\"https://redirect.github.com/pyca/cryptography/issues/9740\"\u003e#9740\u003c/a\u003e)\u003c/li\u003e\n\u003cli\u003e\u003ca\nhref\u003d\"https://github.com/pyca/cryptography/commit/fc11bce6930e591ce26a2317b31b9ce2b3e25512\"\u003e\u003ccode\u003efc11bce\u003c/code\u003e\u003c/a\u003e\nbump for 41.0.4 (\u003ca\nhref\u003d\"https://redirect.github.com/pyca/cryptography/issues/9629\"\u003e#9629\u003c/a\u003e)\u003c/li\u003e\n\u003cli\u003e\u003ca\nhref\u003d\"https://github.com/pyca/cryptography/commit/b22271cf3c3dd8dc8978f8f4b00b5c7060b6538d\"\u003e\u003ccode\u003eb22271c\u003c/code\u003e\u003c/a\u003e\nbump for 41.0.3 (\u003ca\nhref\u003d\"https://redirect.github.com/pyca/cryptography/issues/9330\"\u003e#9330\u003c/a\u003e)\u003c/li\u003e\n\u003cli\u003e\u003ca\nhref\u003d\"https://github.com/pyca/cryptography/commit/774a4a16cbd22a89fdb4195ade9e4fcee27a7afa\"\u003e\u003ccode\u003e774a4a1\u003c/code\u003e\u003c/a\u003e\nOnly check DH key validity when loading a private key. (\u003ca\nhref\u003d\"https://redirect.github.com/pyca/cryptography/issues/9071\"\u003e#9071\u003c/a\u003e)\n(\u003ca\nhref\u003d\"https://redirect.github.com/pyca/cryptography/issues/9319\"\u003e#9319\u003c/a\u003e)\u003c/li\u003e\n\u003cli\u003e\u003ca\nhref\u003d\"https://github.com/pyca/cryptography/commit/bfa4d95f0f356f2d535efd5c775e0fb3efe90ef2\"\u003e\u003ccode\u003ebfa4d95\u003c/code\u003e\u003c/a\u003e\nchangelog for 41.0.3 (\u003ca\nhref\u003d\"https://redirect.github.com/pyca/cryptography/issues/9320\"\u003e#9320\u003c/a\u003e)\u003c/li\u003e\n\u003cli\u003e\u003ca\nhref\u003d\"https://github.com/pyca/cryptography/commit/0da7165aa73c0a4865b0a4d9e019db3c16eea55a\"\u003e\u003ccode\u003e0da7165\u003c/code\u003e\u003c/a\u003e\nbackport fix the memory leak in fixedpool (\u003ca\nhref\u003d\"https://redirect.github.com/pyca/cryptography/issues/9272\"\u003e#9272\u003c/a\u003e)\n(\u003ca\nhref\u003d\"https://redirect.github.com/pyca/cryptography/issues/9309\"\u003e#9309\u003c/a\u003e)\u003c/li\u003e\n\u003cli\u003e\u003ca\nhref\u003d\"https://github.com/pyca/cryptography/commit/7431db737cf0407560fac689d24f1d2e5efc349d\"\u003e\u003ccode\u003e7431db7\u003c/code\u003e\u003c/a\u003e\nbump for 41.0.2 (\u003ca\nhref\u003d\"https://redirect.github.com/pyca/cryptography/issues/9215\"\u003e#9215\u003c/a\u003e)\u003c/li\u003e\n\u003cli\u003e\u003ca\nhref\u003d\"https://github.com/pyca/cryptography/commit/e190ef190525999d1f599cf8c3aef5cb7f3a8bc4\"\u003e\u003ccode\u003ee190ef1\u003c/code\u003e\u003c/a\u003e\nBackport ssh cert fix (\u003ca\nhref\u003d\"https://redirect.github.com/pyca/cryptography/issues/9211\"\u003e#9211\u003c/a\u003e)\u003c/li\u003e\n\u003cli\u003eAdditional commits viewable in \u003ca\nhref\u003d\"https://github.com/pyca/cryptography/compare/39.0.0...41.0.6\"\u003ecompare\nview\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/details\u003e\n\u003cbr /\u003e\n\n\n[![Dependabot compatibility\nscore](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name\u003dcryptography\u0026package-manager\u003dpip\u0026previous-version\u003d39.0.0\u0026new-version\u003d41.0.6)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)\n\nDependabot will resolve any conflicts with this PR as long as you don\u0027t\nalter it yourself. You can also trigger a rebase manually by commenting\n`@dependabot rebase`.\n\n[//]: # (dependabot-automerge-start)\n[//]: # (dependabot-automerge-end)\n\n---\n\n\u003cdetails\u003e\n\u003csummary\u003eDependabot commands and options\u003c/summary\u003e\n\u003cbr /\u003e\n\nYou can trigger Dependabot actions by commenting on this PR:\n- `@dependabot rebase` will rebase this PR\n- `@dependabot recreate` will recreate this PR, overwriting any edits\nthat have been made to it\n- `@dependabot merge` will merge this PR after your CI passes on it\n- `@dependabot squash and merge` will squash and merge this PR after\nyour CI passes on it\n- `@dependabot cancel merge` will cancel a previously requested merge\nand block automerging\n- `@dependabot reopen` will reopen this PR if it is closed\n- `@dependabot close` will close this PR and stop Dependabot recreating\nit. You can achieve the same result by closing it manually\n- `@dependabot show \u003cdependency name\u003e ignore conditions` will show all\nof the ignore conditions of the specified dependency\n- `@dependabot ignore this major version` will close this PR and stop\nDependabot creating any more for this major version (unless you reopen\nthe PR or upgrade to it yourself)\n- `@dependabot ignore this minor version` will close this PR and stop\nDependabot creating any more for this minor version (unless you reopen\nthe PR or upgrade to it yourself)\n- `@dependabot ignore this dependency` will close this PR and stop\nDependabot creating any more for this dependency (unless you reopen the\nPR or upgrade to it yourself)\nYou can disable automated security fix PRs for this repo from the\n[Security Alerts\npage](https://github.com/bazelbuild/rules_python/network/alerts).\n\n\u003c/details\u003e\n\n---------\n\nSigned-off-by: dependabot[bot] \u003csupport@github.com\u003e\nCo-authored-by: dependabot[bot] \u003c49699333+dependabot[bot]@users.noreply.github.com\u003e\nCo-authored-by: Richard Levasseur \u003crlevasseur@google.com\u003e",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "858fc51e4c789d48620f2ebd116a479e718bd42b",
      "old_mode": 33188,
      "old_path": "tools/publish/requirements.txt",
      "new_id": "0fda1bbb4e8f2eaaf05d4dc711d818bcca729efa",
      "new_mode": 33188,
      "new_path": "tools/publish/requirements.txt"
    }
  ]
}
