]> git.ipfire.org Git - thirdparty/Python/cpython.git/commit
[3.9] [CVE-2023-27043] gh-102988: Reject malformed addresses in email.parseaddr(...
authorPetr Viktorin <encukou@gmail.com>
Fri, 6 Sep 2024 11:13:54 +0000 (13:13 +0200)
committerGitHub <noreply@github.com>
Fri, 6 Sep 2024 11:13:54 +0000 (13:13 +0200)
commitee953f2b8fc12ee9b8209ab60a2f06c603e5a624
tree485859624f0f4405b528bc5b0e3d7963cf746563
parentc57c4a966742dc4d0f28d6457c025e93b8b63fd4
[3.9] [CVE-2023-27043] gh-102988: Reject malformed addresses in email.parseaddr() (GH-111116) (#123769)

Detect email address parsing errors and return empty tuple to
indicate the parsing error (old API). Add an optional 'strict'
parameter to getaddresses() and parseaddr() functions. Patch by
Thomas Dwyer.

(cherry picked from commit 4a153a1d3b18803a684cd1bcc2cdf3ede3dbae19)

Co-authored-by: Victor Stinner <vstinner@python.org>
Co-Authored-By: Thomas Dwyer <github@tomd.tel>
Doc/library/email.utils.rst
Doc/whatsnew/3.9.rst
Lib/email/utils.py
Lib/test/test_email/test_email.py
Misc/NEWS.d/next/Library/2023-10-20-15-28-08.gh-issue-102988.dStNO7.rst [new file with mode: 0644]