Affected by GO-2022-0368
and 4 other vulnerabilities
GO-2022-0368: Improper random number generation in github.com/coredns/coredns
GO-2024-3130: CoreDNS vulnerable to TuDoor Attacks in github.com/coredns/coredns
GO-2025-3743: CoreDNS Vulnerable to DoQ Memory Exhaustion via Stream Amplification in github.com/coredns/coredns
GO-2025-3942: CoreDNS: DNS Cache Pinning via etcd Lease ID Confusion in github.com/coredns/coredns
GO-2026-4289: CoreDNS gRPC/HTTPS/HTTP3 servers lack resource limits, enabling DoS via unbounded connections and oversized messages in github.com/coredns/coredns
HostPortOrFile parses the strings in s, each string can either be a
address, [scheme://]address:port or a filename. The address part is checked
and in case of filename a resolv.conf like file is (assumed) and parsed and
the nameservers found are returned.
Transport returns the transport defined in s and a string where the
transport prefix is removed (if there was any). If no transport is defined
we default to TransportDNS