Skip to content

bpo-33529: Fix infinite loop in email header encoding #12020

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
May 14, 2019

Conversation

wojcikk2903
Copy link
Contributor

@wojcikk2903 wojcikk2903 commented Feb 24, 2019

Prevents the fold function from entering infinite loop when there are enough non-ASCII characters in the word to encode.
The issue was caused by strings being treated as in Python 2. This PR is related to the previous attempt in #7763 by @corona10 .

https://bugs.python.org/issue33529

@the-knights-who-say-ni
Copy link

Hello, and thanks for your contribution!

I'm a bot set up to make sure that the project can legally accept your contribution by verifying you have signed the PSF contributor agreement (CLA).

Unfortunately we couldn't find an account corresponding to your GitHub username on bugs.python.org (b.p.o) to verify you have signed the CLA (this might be simply due to a missing "GitHub Name" entry in your b.p.o account settings). This is necessary for legal reasons before we can look at your contribution. Please follow the steps outlined in the CPython devguide to rectify this issue.

You can check yourself to see if the CLA has been received.

Thanks again for your contribution, we look forward to reviewing it!

' =?utf-8?q?abuse=2Ephp=3Fmid=3Dxxx-xxx-xxxx'
'xxxxxxxxxxxxxxxxxxxx=3D=3D-xxx-?=\n'
' =?utf-8?q?xx-xx=3E?=\n')
'com/report=5Fabuse?=\n'
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Expected result was modified because the previous algorithms tended not to use all available space in the initial encoded words.

@vstinner
Copy link
Member

@bitdancer, @warsaw: Would you mind to have a look at this fix for a security issue in the email module?

@@ -237,6 +237,12 @@ def test_adding_default_policies_preserves_default_factory(self):
email.policy.EmailPolicy.header_factory)
self.assertEqual(newpolicy.__dict__, {'raise_on_defect': True})

def test_non_ascii_chars_do_not_cause_inf_loop(self):
policy = email.policy.default + email.policy.strict
msg = email.message.EmailMessage()
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this doesn't need to be an EmailMessage, you can trigger this with just:

policy = email.policy.default
policy.fold('Subject', 'ą' * 100)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the suggestion. Indeed, it's engough to just define the policy.

policy = email.policy.default + email.policy.strict
msg = email.message.EmailMessage()
msg['Subject'] = 'ą'*100
policy.fold('Subject', msg['Subject'])
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

While you are writing the test, you may want to make an assertion about the output of this.

Perhaps it will be easier to write an assertion if you set the max_line_length to be shorter, so something like:

policy = email.policy.default.clone(max_line_length=20)
actual = policy.fold("Subject", "ą" * 21)                                                                         
self.assertEqual(actual,
                 'Subject: \n ' +
                 '=?utf-8?q?ąąąąąąą?=\n ' +
                 '=?utf-8?q?ąąąąąąą?=\n ' +
                 '=?utf-8?q?ąąąąąąą?=\n')

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I tested the equality following your suggestion.

@@ -0,0 +1,2 @@
Prevent fold function used in email header encoding from entering infinite
loop when there are enough non-ASCII characters in a header.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
loop when there are enough non-ASCII characters in a header.
loop when there are too many non-ASCII characters in a header.

Copy link
Contributor

@msapiro msapiro left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

At the request of @pganssle I have reviewed the changes in this PR and I agree that they are an appropriate fix.

@vstinner
Copy link
Member

cc @bitdancer @warsaw

@corona10
Copy link
Member

Great!

@miss-islington
Copy link
Contributor

Thanks @wojcikk2903 for the PR, and @vstinner for merging it 🌮🎉.. I'm working now to backport this PR to: 3.7.
🐍🍒⛏🤖

miss-islington pushed a commit to miss-islington/cpython that referenced this pull request May 14, 2019
…H-12020)

(cherry picked from commit c1f5667)

Co-authored-by: Krzysztof Wojcik <wojcikk2903@users.noreply.github.com>
@bedevere-bot
Copy link

GH-13321 is a backport of this pull request to the 3.7 branch.

@vstinner
Copy link
Member

I merged your PR, thanks @wojcikk2903. Thanks @msapiro and @pganssle for your reviews.

vstinner pushed a commit that referenced this pull request May 14, 2019
… (GH-13321)

(cherry picked from commit c1f5667)

Co-authored-by: Krzysztof Wojcik <wojcikk2903@users.noreply.github.com>
ned-deily pushed a commit that referenced this pull request Jun 18, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

8 participants