Incorrect Conversion between Numeric Types Affecting coredns-1.11-compat package, versions *


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.07% (20th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-MINIMOSLATEST-COREDNS111COMPAT-15090205
  • published25 Jan 2026
  • disclosed9 Sept 2025

Introduced: 9 Sep 2025

CVE-2025-58063  (opens in a new tab)
CWE-681  (opens in a new tab)

How to fix?

There is no fixed version for Minimos:latest coredns-1.11-compat.

NVD Description

Note: Versions mentioned in the description apply only to the upstream coredns-1.11-compat package and not the coredns-1.11-compat package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

CoreDNS is a DNS server that chains plugins. Starting in version 1.2.0 and prior to version 1.12.4, the CoreDNS etcd plugin contains a TTL confusion vulnerability where lease IDs are incorrectly used as TTL values, enabling DNS cache pinning attacks. This effectively creates a DoS condition for DNS resolution of affected services. The TTL() function in plugin/etcd/etcd.go incorrectly casts etcd lease IDs (64-bit integers) to uint32 and uses them as TTL values. Large lease IDs become very large TTLs when cast to uint32. This enables cache pinning attacks. Version 1.12.4 contains a fix for the issue.

CVSS Base Scores

version 3.1