Affected by GO-2024-3130
and 5 other vulnerabilities
GO-2024-3130: CoreDNS vulnerable to TuDoor Attacks in github.com/coredns/coredns
GO-2025-3743: CoreDNS Vulnerable to DoQ Memory Exhaustion via Stream Amplification in github.com/coredns/coredns
GO-2025-3942: CoreDNS: DNS Cache Pinning via etcd Lease ID Confusion in github.com/coredns/coredns
GO-2026-4289: CoreDNS gRPC/HTTPS/HTTP3 servers lack resource limits, enabling DoS via unbounded connections and oversized messages in github.com/coredns/coredns
GO-2026-4630: CoreDNS ACL Bypass in github.com/coredns/coredns
GO-2026-4635: CoreDNS Loop Detection Denial of Service Vulnerability in github.com/coredns/coredns
NewDurationFromArg returns a time.Duration from a configuration argument
(string) which has come from the Corefile. The argument has some basic
validation applied before returning a time.Duration. If the argument has no
time unit specified and is numeric the argument will be treated as seconds
rather than GO's default of nanoseconds.