Memory Exhaustion Vulnerability in CoreDNS DNS-over-QUIC Server by CoreDNS
CVE-2026-32934
What is CVE-2026-32934?
CoreDNS, a DNS server utilizing a plugin architecture, has a vulnerability in its DNS-over-QUIC server present in versions before 1.14.3. This flaw allows a remote attacker to open multiple QUIC streams and send minimal data, leading to unbounded growth of goroutines and memory usage. In scenarios where the worker pool is at capacity, new goroutines continue to spawn for each accepted stream, creating a backlog. Active worker processes can hang indefinitely due to a lack of read deadlines, leading to a potential denial of service. This allows an attacker to exhaust memory resources systematically, resulting in potential out-of-memory (OOM) conditions. The vulnerability has been addressed in version 1.14.3, and no workarounds are available.
Affected Version(s)
coredns < 1.14.3
