Incorrect Conversion between Numeric Types Affecting kubernetes-dns-node-cache-fips package, versions <1.26.5-r1


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-KUBERNETESDNSNODECACHEFIPS-12623046
  • published11 Sept 2025
  • disclosed9 Sept 2025

Introduced: 9 Sep 2025

NewCVE-2025-58063  (opens in a new tab)
CWE-681  (opens in a new tab)

How to fix?

Upgrade Chainguard kubernetes-dns-node-cache-fips to version 1.26.5-r1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kubernetes-dns-node-cache-fips package and not the kubernetes-dns-node-cache-fips package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

CoreDNS is a DNS server that chains plugins. Starting in version 1.2.0 and prior to version 1.12.4, the CoreDNS etcd plugin contains a TTL confusion vulnerability where lease IDs are incorrectly used as TTL values, enabling DNS cache pinning attacks. This effectively creates a DoS condition for DNS resolution of affected services. The TTL() function in plugin/etcd/etcd.go incorrectly casts etcd lease IDs (64-bit integers) to uint32 and uses them as TTL values. Large lease IDs become very large TTLs when cast to uint32. This enables cache pinning attacks. Version 1.12.4 contains a fix for the issue.

CVSS Base Scores

version 3.1