Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2wpx-qpw2-g5h5 | CoreDNS' DoQ worker pool does not bound stream backlog |
Fri, 08 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:coredns.io:coredns:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 06 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Coredns.io
Coredns.io coredns |
|
| Vendors & Products |
Coredns.io
Coredns.io coredns |
Tue, 05 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CoreDNS is a DNS server that chains plugins. In versions prior to 1.14.3, the DNS-over-QUIC (DoQ) server can be driven into unbounded goroutine and memory growth by a remote client that opens many QUIC streams and sends only 1 byte per stream. When the worker pool is full, CoreDNS still spawns a goroutine per accepted stream to wait for a worker token. Additionally, active workers block indefinitely in io.ReadFull() with no per-stream read deadline, allowing an attacker to pin all workers by sending a single byte so the read blocks waiting for the second byte of the DoQ length prefix. This enables an unauthenticated remote attacker to cause memory exhaustion and OOM-kill. This issue has been fixed in version 1.14.3. No known workarounds exist. | |
| Title | CoreDNS DNS-over-QUIC unbounded goroutine growth leads to denial of service | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-06T15:14:54.790Z
Reserved: 2026-03-17T00:05:53.282Z
Link: CVE-2026-32934
Updated: 2026-05-06T15:13:45.193Z
Status : Analyzed
Published: 2026-05-05T20:16:35.853
Modified: 2026-05-08T16:03:02.920
Link: CVE-2026-32934
No data.
OpenCVE Enrichment
Updated: 2026-05-05T21:30:05Z
Github GHSA