High severityNVD Advisory· Published Mar 6, 2026· Updated Mar 6, 2026
CoreDNS Loop Detection Denial of Service Vulnerability
CVE-2026-26018
Description
CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a denial of service vulnerability exists in CoreDNS's loop detection plugin that allows an attacker to crash the DNS server by sending specially crafted DNS queries. The vulnerability stems from the use of a predictable pseudo-random number generator (PRNG) for generating a secret query name, combined with a fatal error handler that terminates the entire process. This issue has been patched in version 1.14.2.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/coredns/corednsGo | < 1.14.2 | 1.14.2 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-h75p-j8xm-m278ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-26018ghsaADVISORY
- github.com/coredns/coredns/releases/tag/v1.14.2ghsax_refsource_MISCWEB
- github.com/coredns/coredns/security/advisories/GHSA-h75p-j8xm-m278ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.