]> git.ipfire.org Git - thirdparty/Python/cpython.git/commit
[3.11] [CVE-2023-27043] gh-102988: Reject malformed addresses in email.parseaddr...
authorPetr Viktorin <encukou@gmail.com>
Fri, 6 Sep 2024 10:46:23 +0000 (12:46 +0200)
committerGitHub <noreply@github.com>
Fri, 6 Sep 2024 10:46:23 +0000 (12:46 +0200)
commitbc4a703a934a59657ecd018320ef990bc5542803
treeb1fc0534919670d5dd9a7df9c6384a871d7bc5de
parent5752116ed78887233a7723585158435a0a4525ba
[3.11] [CVE-2023-27043] gh-102988: Reject malformed addresses in email.parseaddr() (GH-111116) (#123767)

Detect email address parsing errors and return empty tuple to
indicate the parsing error (old API). Add an optional 'strict'
parameter to getaddresses() and parseaddr() functions. Patch by
Thomas Dwyer.

(cherry picked from commit 4a153a1d3b18803a684cd1bcc2cdf3ede3dbae19)

Co-authored-by: Victor Stinner <vstinner@python.org>
Co-authored-by: Thomas Dwyer <github@tomd.tel>
Doc/library/email.utils.rst
Doc/whatsnew/3.11.rst
Lib/email/utils.py
Lib/test/test_email/test_email.py
Misc/NEWS.d/next/Library/2023-10-20-15-28-08.gh-issue-102988.dStNO7.rst [new file with mode: 0644]