Affected by GO-2022-0368
and 4 other vulnerabilities
GO-2022-0368: Improper random number generation in github.com/coredns/coredns
GO-2024-3130: CoreDNS vulnerable to TuDoor Attacks in github.com/coredns/coredns
GO-2025-3743: CoreDNS Vulnerable to DoQ Memory Exhaustion via Stream Amplification in github.com/coredns/coredns
GO-2025-3942: CoreDNS: DNS Cache Pinning via etcd Lease ID Confusion in github.com/coredns/coredns
GO-2026-4289: CoreDNS gRPC/HTTPS/HTTP3 servers lack resource limits, enabling DoS via unbounded connections and oversized messages in github.com/coredns/coredns
Version checks the EDNS version in the request. If error
is nil everything is OK and we can invoke the plugin. If non-nil, the
returned Msg is valid to be returned to the client (and should). For some
reason this response should not contain a question RR in the question section.