{"id":"AZL-67101","summary":"CVE-2025-58063 affecting package coredns for versions less than 1.11.1-22","details":"CoreDNS is a DNS server that chains plugins. Starting in version 1.2.0 and prior to version 1.12.4, the CoreDNS etcd plugin contains a TTL confusion vulnerability where lease IDs are incorrectly used as TTL values, enabling DNS cache pinning attacks. This effectively creates a DoS condition for DNS resolution of affected services. The `TTL()` function in `plugin/etcd/etcd.go` incorrectly casts etcd lease IDs (64-bit integers) to uint32 and uses them as TTL values. Large lease IDs become very large TTLs when cast to uint32. This enables cache pinning attacks. Version 1.12.4 contains a fix for the issue.","modified":"2026-04-01T05:21:07.701571Z","published":"2025-09-09T20:15:48Z","upstream":["CVE-2025-58063"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-58063"}],"affected":[{"package":{"name":"coredns","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/coredns"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.11.1-22"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-67101.json"}}],"schema_version":"1.7.5"}