data/reports: review 1 report

Fixes golang/vulndb#3676

Change-Id: I3f3a9dfda445bac4ac053abe58ee776b6d58f4a5
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/672255
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Reviewed-by: Zvonimir Pavlinovic <zpavlinovic@google.com>
Auto-Submit: Neal Patel <nealpatel@google.com>
diff --git a/data/osv/GO-2025-3561.json b/data/osv/GO-2025-3561.json
index 1065adb..dff58c6 100644
--- a/data/osv/GO-2025-3561.json
+++ b/data/osv/GO-2025-3561.json
@@ -8,7 +8,7 @@
     "GHSA-c6pf-2v8j-96mc"
   ],
   "summary": "Cilium node based network policies may incorrectly allow workload traffic in github.com/cilium/cilium",
-  "details": "Cilium node based network policies may incorrectly allow workload traffic in github.com/cilium/cilium.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/cilium/cilium from v1.17.0 before v1.17.2.",
+  "details": "Cilium node based network policies may incorrectly allow workload traffic in github.com/cilium/cilium",
   "affected": [
     {
       "package": {
@@ -20,41 +20,16 @@
           "type": "SEMVER",
           "events": [
             {
-              "introduced": "0"
-            }
-          ]
-        }
-      ],
-      "ecosystem_specific": {
-        "custom_ranges": [
-          {
-            "type": "ECOSYSTEM",
-            "events": [
-              {
-                "introduced": "1.17.0"
-              },
-              {
-                "fixed": "1.17.2"
-              }
-            ]
-          }
-        ]
-      }
-    },
-    {
-      "package": {
-        "name": "github.com/cilium/cilium",
-        "ecosystem": "Go"
-      },
-      "ranges": [
-        {
-          "type": "SEMVER",
-          "events": [
-            {
               "introduced": "1.16.0"
             },
             {
               "fixed": "1.16.8"
+            },
+            {
+              "introduced": "1.17.0"
+            },
+            {
+              "fixed": "1.17.2"
             }
           ]
         }
@@ -68,10 +43,6 @@
       "url": "https://github.com/cilium/cilium/security/advisories/GHSA-c6pf-2v8j-96mc"
     },
     {
-      "type": "ADVISORY",
-      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30163"
-    },
-    {
       "type": "FIX",
       "url": "https://github.com/cilium/cilium/pull/36657"
     },
@@ -82,6 +53,6 @@
   ],
   "database_specific": {
     "url": "https://pkg.go.dev/vuln/GO-2025-3561",
-    "review_status": "UNREVIEWED"
+    "review_status": "REVIEWED"
   }
 }
\ No newline at end of file
diff --git a/data/reports/GO-2025-3561.yaml b/data/reports/GO-2025-3561.yaml
index 0d3ba42..e86b3a9 100644
--- a/data/reports/GO-2025-3561.yaml
+++ b/data/reports/GO-2025-3561.yaml
@@ -1,14 +1,12 @@
 id: GO-2025-3561
 modules:
     - module: github.com/cilium/cilium
-      non_go_versions:
-        - introduced: 1.17.0
-        - fixed: 1.17.2
-    - module: github.com/cilium/cilium
       versions:
         - introduced: 1.16.0
         - fixed: 1.16.8
-      vulnerable_at: 1.16.7
+        - introduced: 1.17.0
+        - fixed: 1.17.2
+      vulnerable_at: 1.17.1
 summary: |-
     Cilium node based network policies may incorrectly allow workload traffic in
     github.com/cilium/cilium
@@ -18,10 +16,9 @@
     - GHSA-c6pf-2v8j-96mc
 references:
     - advisory: https://github.com/cilium/cilium/security/advisories/GHSA-c6pf-2v8j-96mc
-    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2025-30163
     - fix: https://github.com/cilium/cilium/pull/36657
     - web: https://docs.cilium.io/en/stable/security/policy/language/#node-based
 source:
     id: GHSA-c6pf-2v8j-96mc
     created: 2025-03-25T12:05:12.880469-04:00
-review_status: UNREVIEWED
+review_status: REVIEWED