Well-crafted inputs reaching ParseAddress, ParseAddressList, and ParseDate were able to trigger excessive CPU exhaustion and memory allocations.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 07 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Go Standard Library
Go Standard Library net/mail
Weaknesses CWE-739
Vendors & Products Go Standard Library
Go Standard Library net/mail

Thu, 07 May 2026 20:00:00 +0000

Type Values Removed Values Added
Description Well-crafted inputs reaching ParseAddress, ParseAddressList, and ParseDate were able to trigger excessive CPU exhaustion and memory allocations.
Title Quadratic string concatentation in consumeComment in net/mail
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-05-07T19:41:19.854Z

Reserved: 2026-04-07T18:13:03.526Z

Link: CVE-2026-39820

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-07T20:16:43.187

Modified: 2026-05-07T20:38:04.860

Link: CVE-2026-39820

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T21:30:25Z

Weaknesses

No weakness.