]> git.ipfire.org Git - thirdparty/Python/cpython.git/commit
[3.12] [CVE-2023-27043] gh-102988: Reject malformed addresses in email.parseaddr...
authorPetr Viktorin <encukou@gmail.com>
Fri, 6 Sep 2024 10:46:16 +0000 (12:46 +0200)
committerGitHub <noreply@github.com>
Fri, 6 Sep 2024 10:46:16 +0000 (12:46 +0200)
commit15068242bd4405475f70a81805a8895ca309a310
tree0583661caf161dc615fe78c014794c569a282489
parent919a3e8028de61a57c672c2de1a47c82b75b2e39
[3.12] [CVE-2023-27043] gh-102988: Reject malformed addresses in email.parseaddr() (GH-111116) (#123766)

Detect email address parsing errors and return empty tuple to
indicate the parsing error (old API). Add an optional 'strict'
parameter to getaddresses() and parseaddr() functions. Patch by
Thomas Dwyer.

Co-Authored-By: Thomas Dwyer <github@tomd.tel>
(cherry picked from commit 4a153a1d3b18803a684cd1bcc2cdf3ede3dbae19)

Co-authored-by: Victor Stinner <vstinner@python.org>
Doc/library/email.utils.rst
Doc/whatsnew/3.12.rst
Lib/email/utils.py
Lib/test/test_email/test_email.py
Misc/NEWS.d/next/Library/2023-10-20-15-28-08.gh-issue-102988.dStNO7.rst [new file with mode: 0644]