๐Ÿ” CVE Alert

CVE-2026-32934

UNKNOWN 0.0

CoreDNS DNS-over-QUIC unbounded goroutine growth leads to denial of service

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

CoreDNS is a DNS server that chains plugins. In versions prior to 1.14.3, the DNS-over-QUIC (DoQ) server can be driven into unbounded goroutine and memory growth by a remote client that opens many QUIC streams and sends only 1 byte per stream. When the worker pool is full, CoreDNS still spawns a goroutine per accepted stream to wait for a worker token. Additionally, active workers block indefinitely in io.ReadFull() with no per-stream read deadline, allowing an attacker to pin all workers by sending a single byte so the read blocks waiting for the second byte of the DoQ length prefix. This enables an unauthenticated remote attacker to cause memory exhaustion and OOM-kill. This issue has been fixed in version 1.14.3. No known workarounds exist.

CWE CWE-770
Vendor coredns
Product coredns
Published May 5, 2026
Stay Ahead of the Next One

Get instant alerts for coredns coredns

Be the first to know when new unknown vulnerabilities affecting coredns coredns are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

coredns / coredns
< 1.14.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/coredns/coredns/security/advisories/GHSA-2wpx-qpw2-g5h5 github.com: https://github.com/coredns/coredns/releases/tag/v1.14.3