Well-crafted inputs reaching ParseAddress, ParseAddressList, and ParseDate were able to trigger excessive CPU exhaustion and memory allocations.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 07 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Go Standard Library
Go Standard Library net/mail |
|
| Weaknesses | CWE-739 | |
| Vendors & Products |
Go Standard Library
Go Standard Library net/mail |
Thu, 07 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Well-crafted inputs reaching ParseAddress, ParseAddressList, and ParseDate were able to trigger excessive CPU exhaustion and memory allocations. | |
| Title | Quadratic string concatentation in consumeComment in net/mail | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2026-05-07T19:41:19.854Z
Reserved: 2026-04-07T18:13:03.526Z
Link: CVE-2026-39820
No data.
Status : Awaiting Analysis
Published: 2026-05-07T20:16:43.187
Modified: 2026-05-07T20:38:04.860
Link: CVE-2026-39820
No data.
OpenCVE Enrichment
Updated: 2026-05-07T21:30:25Z
Weaknesses