mssql-jdbc - potential false positive on CVE-2025-59250 with mssql-jdbc 12.2.1.jre11 #9745
Replies: 3 comments 4 replies
-
|
The latest version of trivy does not solve the problem either: |
Beta Was this translation helpful? Give feedback.
-
|
Hello @concreted We use GitHub database for java vulnerabilities - https://trivy.dev/latest/docs/scanner/vulnerability/#langpkg-data-sources 12.2.1 < 12.2.1.jre8: That is why Trivy shows this vulnerability for Regards, Dmitriy |
Beta Was this translation helpful? Give feedback.
-
|
Anyone got solution to this? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
IDs
CVE-2025-59250
Description
Trivy reported CVE-2025-59250 on my image containing a jar with the following dependency:
This is what Trivy reported:
According to https://avd.aquasec.com/nvd/2025/cve-2025-59250/, 12.2.1 should not be affected by this CVE. However when I updated to 12.2.1.jre11, Trivy still reports the same CVE:
I see that the
Fixed Versionlist includes.jre8versions for the fixed versions, but not.jre11. I am wondering if this is a false detection due to.jre11not being included in fixed versions (or maybe that theInstalled version12.2.1 doesn't match the fix version12.2.1.jre8).The Github advisory for this CVE GHSA-m494-w24q-6f7w only lists the
.jre8versions, so maybe this is a problem on that side? I am curious how 12.2.0.jre11 is detected as having a CVE though, because.jre11is not listed as affected in the Github advisory.Reproduction Steps
trivy image <tag>on the resulting imageChecklist
-f jsonthat shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions