Issue Mapping Java Libraries: Incorrect Vulnerability Reporting for io.grpc:grpc-netty-shaded and netty-codec-http2 #9580
avula-sudheer
started this conversation in
False Detection
Replies: 1 comment
-
|
GitHub Advisory reports that the issue affects grpc-netty-shaded. If you believe this is incorrect, please report it to GitHub. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
IDs
CVE-2025-55163
Description
Trivy is reporting CVE-2025-55163 (netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability) as affecting io.grpc:grpc-netty-shaded (version 1.69.1), but this is a false positive. The scan output shows:
However, grpc-netty-shaded only shades netty-codec-http2 and does not directly expose the vulnerable code. The vulnerability should only be reported for io.netty:netty-codec-http2 itself, not for libraries that shade it.
Expected behavior:
Trivy should not report CVE-2025-55163 for io.grpc:grpc-netty-shaded unless it is confirmed that the shaded code is actually exploitable in this context.
Example:
We are using quarkus-bom LTS version 3.27.0, which introduces multiple transitive dependencies with similar or partially matching package names.
Below is a partial dependency graph highlighting packages with overlapping or similar names:
The following package names are incorrectly mapped by the vulnerability scanner:
Reproduction Steps
Target
Container Image
Scanner
Vulnerability
Target OS
openSuSE
Debug Output
Version
Checklist
-f jsonthat shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions