]> git.ipfire.org Git - thirdparty/Python/cpython.git/commit
[3.8] [CVE-2023-27043] gh-102988: Reject malformed addresses in email.parseaddr(...
authorPetr Viktorin <encukou@gmail.com>
Fri, 6 Sep 2024 11:14:09 +0000 (13:14 +0200)
committerGitHub <noreply@github.com>
Fri, 6 Sep 2024 11:14:09 +0000 (13:14 +0200)
commit4d069d5b1170b9d82013ab824ff5d6cf28964d97
tree33c9d117a483d828686cde24323ce83c55721f4b
parenta50a86db0fd66c7ea53e56e346057be1153d6d47
[3.8] [CVE-2023-27043] gh-102988: Reject malformed addresses in email.parseaddr() (GH-111116) (#123770)

Detect email address parsing errors and return empty tuple to
indicate the parsing error (old API). Add an optional 'strict'
parameter to getaddresses() and parseaddr() functions. Patch by
Thomas Dwyer.

(cherry picked from commit 4a153a1d3b18803a684cd1bcc2cdf3ede3dbae19)

Co-authored-by: Victor Stinner <vstinner@python.org>
Co-Authored-By: Thomas Dwyer <github@tomd.tel>
Doc/library/email.utils.rst
Doc/whatsnew/3.8.rst
Lib/email/utils.py
Lib/test/test_email/test_email.py
Misc/NEWS.d/next/Library/2023-10-20-15-28-08.gh-issue-102988.dStNO7.rst [new file with mode: 0644]