| id: GO-2025-3442 |
| modules: |
| - module: github.com/cometbft/cometbft |
| versions: |
| - fixed: 0.38.17 |
| vulnerable_at: 0.38.16 |
| packages: |
| - package: github.com/cometbft/cometbft/blocksync |
| symbols: |
| - BlockPool.SetPeerRange |
| derived_symbols: |
| - Reactor.Receive |
| - module: github.com/cometbft/cometbft |
| versions: |
| - fixed: 1.0.1 |
| vulnerable_at: 1.0.0 |
| packages: |
| - package: github.com/cometbft/cometbft/internal/blocksync |
| symbols: |
| - BlockPool.SetPeerRange |
| derived_symbols: |
| - Reactor.Receive |
| summary: CometBFT allows a malicious peer to make node stuck in blocksync in github.com/cometbft/cometbft |
| cves: |
| - CVE-2025-24371 |
| ghsas: |
| - GHSA-22qq-3xwm-r5x4 |
| references: |
| - advisory: https://github.com/cometbft/cometbft/security/advisories/GHSA-22qq-3xwm-r5x4 |
| - advisory: https://nvd.nist.gov/vuln/detail/CVE-2025-24371 |
| - fix: https://github.com/cometbft/cometbft/commit/0ee80cd609c7ae9fe856bdd1c6d38553fdae90ce |
| - fix: https://github.com/cometbft/cometbft/commit/2cebfde06ae5073c0b296a9d2ca6ab4b95397ea5 |
| - web: https://github.com/cometbft/cometbft/releases/tag/v0.38.17 |
| - web: https://github.com/cometbft/cometbft/releases/tag/v1.0.1 |
| source: |
| id: GHSA-22qq-3xwm-r5x4 |
| created: 2025-02-04T13:46:44.220823-05:00 |
| review_status: NEEDS_REVIEW |