data/reports: review GO-2024-3181

  - data/reports/GO-2024-3181.yaml

Fixes golang/vulndb#3181
Fixes golang/vulndb#3388

Change-Id: I13ed687b23ac3a1cd83076b6d720dc717386628d
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/645255
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
Reviewed-by: Damien Neil <dneil@google.com>
diff --git a/data/osv/GO-2024-3181.json b/data/osv/GO-2024-3181.json
index d36b42c..79dd3a1 100644
--- a/data/osv/GO-2024-3181.json
+++ b/data/osv/GO-2024-3181.json
@@ -8,7 +8,7 @@
     "GHSA-x5q3-c8rm-w787"
   ],
   "summary": "PAM module may allow accessing with the credentials of another user in github.com/ubuntu/authd",
-  "details": "PAM module may allow accessing with the credentials of another user in github.com/ubuntu/authd.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/ubuntu/authd before v0.0.0-20240930103526-63e527496b01.",
+  "details": "PAM module may allow accessing with the credentials of another user in github.com/ubuntu/authd",
   "affected": [
     {
       "package": {
@@ -21,25 +21,14 @@
           "events": [
             {
               "introduced": "0"
+            },
+            {
+              "fixed": "0.3.5"
             }
           ]
         }
       ],
-      "ecosystem_specific": {
-        "custom_ranges": [
-          {
-            "type": "ECOSYSTEM",
-            "events": [
-              {
-                "introduced": "0"
-              },
-              {
-                "fixed": "0.0.0-20240930103526-63e527496b01"
-              }
-            ]
-          }
-        ]
-      }
+      "ecosystem_specific": {}
     }
   ],
   "references": [
@@ -48,20 +37,12 @@
       "url": "https://github.com/ubuntu/authd/security/advisories/GHSA-x5q3-c8rm-w787"
     },
     {
-      "type": "ADVISORY",
-      "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9313"
-    },
-    {
-      "type": "ADVISORY",
-      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9313"
-    },
-    {
       "type": "FIX",
       "url": "https://github.com/ubuntu/authd/commit/63e527496b013bed46904c1c58be593c13ebdce5"
     }
   ],
   "database_specific": {
     "url": "https://pkg.go.dev/vuln/GO-2024-3181",
-    "review_status": "UNREVIEWED"
+    "review_status": "REVIEWED"
   }
 }
\ No newline at end of file
diff --git a/data/reports/GO-2024-3181.yaml b/data/reports/GO-2024-3181.yaml
index 3b2e62f..83f9935 100644
--- a/data/reports/GO-2024-3181.yaml
+++ b/data/reports/GO-2024-3181.yaml
@@ -1,20 +1,19 @@
 id: GO-2024-3181
 modules:
     - module: github.com/ubuntu/authd
-      non_go_versions:
-        - fixed: 0.0.0-20240930103526-63e527496b01
-      vulnerable_at: 0.0.0-20230706090440-d8cb2d561419
-summary: PAM module may allow accessing with the credentials of another user in github.com/ubuntu/authd
+      versions:
+        - fixed: 0.3.5
+      vulnerable_at: 0.3.4
+summary: |
+    PAM module may allow accessing with the credentials of another user in github.com/ubuntu/authd
 cves:
     - CVE-2024-9313
 ghsas:
     - GHSA-x5q3-c8rm-w787
 references:
     - advisory: https://github.com/ubuntu/authd/security/advisories/GHSA-x5q3-c8rm-w787
-    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-9313
-    - advisory: https://www.cve.org/CVERecord?id=CVE-2024-9313
     - fix: https://github.com/ubuntu/authd/commit/63e527496b013bed46904c1c58be593c13ebdce5
 source:
     id: GHSA-x5q3-c8rm-w787
-    created: 2024-10-08T10:54:15.521922-04:00
-review_status: UNREVIEWED
+    created: 2025-01-29T09:42:10.825233-05:00
+review_status: REVIEWED