data/reports: add 2 needs review reports
- data/reports/GO-2025-3442.yaml
- data/reports/GO-2025-3443.yaml
Updates golang/vulndb#3442
Updates golang/vulndb#3443
Change-Id: Ibe6157196ab26ebf3c22e512eb4cde28f9338546
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/646596
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
Reviewed-by: Damien Neil <dneil@google.com>
Reviewed-by: Neal Patel <nealpatel@google.com>
diff --git a/data/osv/GO-2025-3442.json b/data/osv/GO-2025-3442.json
new file mode 100644
index 0000000..14ff676
--- /dev/null
+++ b/data/osv/GO-2025-3442.json
@@ -0,0 +1,70 @@
+{
+ "schema_version": "1.3.1",
+ "id": "GO-2025-3442",
+ "modified": "0001-01-01T00:00:00Z",
+ "published": "0001-01-01T00:00:00Z",
+ "aliases": [
+ "CVE-2025-24371",
+ "GHSA-22qq-3xwm-r5x4"
+ ],
+ "summary": "CometBFT allows a malicious peer to make node stuck in blocksync in github.com/cometbft/cometbft",
+ "details": "CometBFT allows a malicious peer to make node stuck in blocksync in github.com/cometbft/cometbft",
+ "affected": [
+ {
+ "package": {
+ "name": "github.com/cometbft/cometbft",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ },
+ {
+ "fixed": "0.38.17"
+ },
+ {
+ "introduced": "1.0.0-alpha.1"
+ },
+ {
+ "fixed": "1.0.1"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ }
+ ],
+ "references": [
+ {
+ "type": "ADVISORY",
+ "url": "https://github.com/cometbft/cometbft/security/advisories/GHSA-22qq-3xwm-r5x4"
+ },
+ {
+ "type": "ADVISORY",
+ "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24371"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/cometbft/cometbft/commit/0ee80cd609c7ae9fe856bdd1c6d38553fdae90ce"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/cometbft/cometbft/commit/2cebfde06ae5073c0b296a9d2ca6ab4b95397ea5"
+ },
+ {
+ "type": "WEB",
+ "url": "https://github.com/cometbft/cometbft/releases/tag/v0.38.17"
+ },
+ {
+ "type": "WEB",
+ "url": "https://github.com/cometbft/cometbft/releases/tag/v1.0.1"
+ }
+ ],
+ "database_specific": {
+ "url": "https://pkg.go.dev/vuln/GO-2025-3442",
+ "review_status": "UNREVIEWED"
+ }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2025-3443.json b/data/osv/GO-2025-3443.json
new file mode 100644
index 0000000..d14abb6
--- /dev/null
+++ b/data/osv/GO-2025-3443.json
@@ -0,0 +1,57 @@
+{
+ "schema_version": "1.3.1",
+ "id": "GO-2025-3443",
+ "modified": "0001-01-01T00:00:00Z",
+ "published": "0001-01-01T00:00:00Z",
+ "aliases": [
+ "GHSA-r3r4-g7hq-pq4f"
+ ],
+ "summary": "CometBFT allows a malicious peer to stall the network by disseminating seemingly valid block parts in github.com/cometbft/cometbft",
+ "details": "CometBFT allows a malicious peer to stall the network by disseminating seemingly valid block parts in github.com/cometbft/cometbft",
+ "affected": [
+ {
+ "package": {
+ "name": "github.com/cometbft/cometbft",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ },
+ {
+ "fixed": "0.38.17"
+ },
+ {
+ "introduced": "1.0.0-alpha.1"
+ },
+ {
+ "fixed": "1.0.1"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ }
+ ],
+ "references": [
+ {
+ "type": "ADVISORY",
+ "url": "https://github.com/cometbft/cometbft/security/advisories/GHSA-r3r4-g7hq-pq4f"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/cometbft/cometbft/commit/415c0da223bb7694608913f725fa45bd7a7a46bf"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/cometbft/cometbft/commit/f943aabc7b9201ea1089ff3381479929435ce424"
+ }
+ ],
+ "database_specific": {
+ "url": "https://pkg.go.dev/vuln/GO-2025-3443",
+ "review_status": "UNREVIEWED"
+ }
+}
\ No newline at end of file
diff --git a/data/reports/GO-2025-3442.yaml b/data/reports/GO-2025-3442.yaml
new file mode 100644
index 0000000..af1d764
--- /dev/null
+++ b/data/reports/GO-2025-3442.yaml
@@ -0,0 +1,24 @@
+id: GO-2025-3442
+modules:
+ - module: github.com/cometbft/cometbft
+ versions:
+ - fixed: 0.38.17
+ - introduced: 1.0.0-alpha.1
+ - fixed: 1.0.1
+ vulnerable_at: 1.0.0
+summary: CometBFT allows a malicious peer to make node stuck in blocksync in github.com/cometbft/cometbft
+cves:
+ - CVE-2025-24371
+ghsas:
+ - GHSA-22qq-3xwm-r5x4
+references:
+ - advisory: https://github.com/cometbft/cometbft/security/advisories/GHSA-22qq-3xwm-r5x4
+ - advisory: https://nvd.nist.gov/vuln/detail/CVE-2025-24371
+ - fix: https://github.com/cometbft/cometbft/commit/0ee80cd609c7ae9fe856bdd1c6d38553fdae90ce
+ - fix: https://github.com/cometbft/cometbft/commit/2cebfde06ae5073c0b296a9d2ca6ab4b95397ea5
+ - web: https://github.com/cometbft/cometbft/releases/tag/v0.38.17
+ - web: https://github.com/cometbft/cometbft/releases/tag/v1.0.1
+source:
+ id: GHSA-22qq-3xwm-r5x4
+ created: 2025-02-04T13:46:44.220823-05:00
+review_status: NEEDS_REVIEW
diff --git a/data/reports/GO-2025-3443.yaml b/data/reports/GO-2025-3443.yaml
new file mode 100644
index 0000000..d7f45fb
--- /dev/null
+++ b/data/reports/GO-2025-3443.yaml
@@ -0,0 +1,21 @@
+id: GO-2025-3443
+modules:
+ - module: github.com/cometbft/cometbft
+ versions:
+ - fixed: 0.38.17
+ - introduced: 1.0.0-alpha.1
+ - fixed: 1.0.1
+ vulnerable_at: 1.0.0
+summary: |-
+ CometBFT allows a malicious peer to stall the network by disseminating seemingly
+ valid block parts in github.com/cometbft/cometbft
+ghsas:
+ - GHSA-r3r4-g7hq-pq4f
+references:
+ - advisory: https://github.com/cometbft/cometbft/security/advisories/GHSA-r3r4-g7hq-pq4f
+ - fix: https://github.com/cometbft/cometbft/commit/415c0da223bb7694608913f725fa45bd7a7a46bf
+ - fix: https://github.com/cometbft/cometbft/commit/f943aabc7b9201ea1089ff3381479929435ce424
+source:
+ id: GHSA-r3r4-g7hq-pq4f
+ created: 2025-02-04T13:46:41.019336-05:00
+review_status: NEEDS_REVIEW