x/vulndb: add reports/GO-2022-0209.yaml for CVE-2019-11840

Fixes golang/vulndb#0209

Change-Id: Ibc234c315f8f553edf9eb687fc468bba7bb3984c
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/415276
Run-TryBot: Damien Neil <dneil@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Tatiana Bradley <tatiana@golang.org>
diff --git a/reports/GO-2022-0209.yaml b/reports/GO-2022-0209.yaml
new file mode 100644
index 0000000..c328357
--- /dev/null
+++ b/reports/GO-2022-0209.yaml
@@ -0,0 +1,35 @@
+packages:
+  - module: golang.org/x/crypto
+    package: golang.org/x/crypto/salsa20/salsa
+    symbols:
+      - XORKeyStream
+    versions:
+      - fixed: 0.0.0-20190320223903-b7391e95e576
+    vulnerable_at: 0.0.0-20190313024323-a1f597ede03a
+description: |
+    XORKeyStream generates incorrect and insecure output for very
+    large inputs.
+
+    If more than 256 GiB of keystream is generated, or if the counter
+    otherwise grows greater than 32 bits, the amd64 implementation will
+    first generate incorrect output, and then cycle back to previously
+    generated keystream. Repeated keystream bytes can lead to loss of
+    confidentiality in encryption applications, or to predictability
+    in CSPRNG applications.
+
+    The issue might affect uses of golang.org/x/crypto/nacl with extremely
+    large messages.
+
+    Architectures other than amd64 and uses that generate less than 256 GiB
+    of keystream for a single salsa20.XORKeyStream invocation are unaffected.
+arch:
+  - amd64
+cves:
+  - CVE-2019-11840
+credit: Michael McLoughlin
+links:
+    pr: https://go.dev/cl/168406
+    commit: https://go.googlesource.com/crypto/+/b7391e95e576cacdcdd422573063bc057239113d
+    context:
+      - https://go.dev/issue/30965
+      - https://groups.google.com/g/golang-announce/c/tjyNcJxb2vQ/m/n0NRBziSCAAJ