Affected by GO-2024-3130
and 3 other vulnerabilities
GO-2024-3130: CoreDNS vulnerable to TuDoor Attacks in github.com/coredns/coredns
GO-2025-3743: CoreDNS Vulnerable to DoQ Memory Exhaustion via Stream Amplification in github.com/coredns/coredns
GO-2025-3942: CoreDNS: DNS Cache Pinning via etcd Lease ID Confusion in github.com/coredns/coredns
GO-2026-4289: CoreDNS gRPC/HTTPS/HTTP3 servers lack resource limits, enabling DoS via unbounded connections and oversized messages in github.com/coredns/coredns
SetSupportedOption adds a new supported option the set of EDNS0 options that we support. Plugins typically call
this in their setup code to signal support for a new option.
By default we support:
dns.EDNS0NSID, dns.EDNS0EXPIRE, dns.EDNS0COOKIE, dns.EDNS0TCPKEEPALIVE, dns.EDNS0PADDING. These
values are not in this map and checked directly in the server.
Version checks the EDNS version in the request. If error
is nil everything is OK and we can invoke the plugin. If non-nil, the
returned Msg is valid to be returned to the client (and should). For some
reason this response should not contain a question RR in the question section.