Well-crafted inputs reaching ParseAddress, ParseAddressList, and ParseDate were able to trigger excessive CPU exhaustion and memory allocations.

Project Subscriptions

Vendors Products
Go Standard Library Subscribe
Net/mail Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 08 May 2026 21:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-739

Fri, 08 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 07 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Go Standard Library
Go Standard Library net/mail
Weaknesses CWE-739
Vendors & Products Go Standard Library
Go Standard Library net/mail

Thu, 07 May 2026 20:00:00 +0000

Type Values Removed Values Added
Description Well-crafted inputs reaching ParseAddress, ParseAddressList, and ParseDate were able to trigger excessive CPU exhaustion and memory allocations.
Title Quadratic string concatentation in consumeComment in net/mail
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-05-08T14:27:54.923Z

Reserved: 2026-04-07T18:13:03.526Z

Link: CVE-2026-39820

cve-icon Vulnrichment

Updated: 2026-05-08T14:27:47.966Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-07T20:16:43.187

Modified: 2026-05-08T15:16:37.323

Link: CVE-2026-39820

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T22:45:05Z

Weaknesses

No weakness.