Well-crafted inputs reaching ParseAddress, ParseAddressList, and ParseDate were able to trigger excessive CPU exhaustion and memory allocations.
History

Thu, 07 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Go Standard Library
Go Standard Library net/mail
Weaknesses CWE-739
Vendors & Products Go Standard Library
Go Standard Library net/mail

Thu, 07 May 2026 20:00:00 +0000

Type Values Removed Values Added
Description Well-crafted inputs reaching ParseAddress, ParseAddressList, and ParseDate were able to trigger excessive CPU exhaustion and memory allocations.
Title Quadratic string concatentation in consumeComment in net/mail
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-05-07T19:41:19.854Z

Reserved: 2026-04-07T18:13:03.526Z

Link: CVE-2026-39820

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-07T20:16:43.187

Modified: 2026-05-07T20:38:04.860

Link: CVE-2026-39820

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T21:30:25Z