]> git.ipfire.org Git - thirdparty/Python/cpython.git/commit
[3.10] [CVE-2023-27043] gh-102988: Reject malformed addresses in email.parseaddr...
authorPetr Viktorin <encukou@gmail.com>
Fri, 6 Sep 2024 11:14:22 +0000 (13:14 +0200)
committerGitHub <noreply@github.com>
Fri, 6 Sep 2024 11:14:22 +0000 (13:14 +0200)
commit2a9273a0e4466e2f057f9ce6fe98cd8ce570331b
tree87ec84c899dfcd2fb0f14c7924102b0a74e4ecd5
parent0e006ce3446731533b9f85e54c9b04c36291544c
[3.10] [CVE-2023-27043] gh-102988: Reject malformed addresses in email.parseaddr() (GH-111116) (#123768)

Detect email address parsing errors and return empty tuple to
indicate the parsing error (old API). Add an optional 'strict'
parameter to getaddresses() and parseaddr() functions. Patch by
Thomas Dwyer.

(cherry picked from commit 4a153a1d3b18803a684cd1bcc2cdf3ede3dbae19)

Co-authored-by: Victor Stinner <vstinner@python.org>
Co-Authored-By: Thomas Dwyer <github@tomd.tel>
Doc/library/email.utils.rst
Doc/whatsnew/3.10.rst
Lib/email/utils.py
Lib/test/test_email/test_email.py
Misc/NEWS.d/next/Library/2023-10-20-15-28-08.gh-issue-102988.dStNO7.rst [new file with mode: 0644]