reports: add GO-2021-0319 for CVE-2022-23806

Fixes golang/vulndb#319

Change-Id: I2ab6324070f619dce2e24cbe74faefcde9269b7b
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/389414
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Julie Qiu <julieqiu@google.com>
Reviewed-by: Tatiana Bradley <tatiana@golang.org>
Run-TryBot: Julie Qiu <julie@golang.org>
Reviewed-by: kokoro <noreply+kokoro@google.com>
diff --git a/reports/GO-2021-0319.yaml b/reports/GO-2021-0319.yaml
new file mode 100644
index 0000000..26e774a
--- /dev/null
+++ b/reports/GO-2021-0319.yaml
@@ -0,0 +1,25 @@
+packages:
+  - module: std
+    package: crypto/elliptic
+    symbols:
+      - CurveParams.IsOnCurve
+      - p384PointFromAffine
+      - p521PointFromAffine
+    versions:
+      - fixed: 1.16.14
+      - introduced: 1.17.0
+        fixed: 1.17.7
+description: |
+  Some big.Int values that are not valid field elements (negative or overflowing)
+  might cause Curve.IsOnCurve to incorrectly return true. Operating on those values
+  may cause a panic or an invalid curve operation. Note that Unmarshal will never
+  return such values.
+cves:
+  - CVE-2022-23806
+credit: Guido Vranken
+links:
+  pr: https://go.dev/cl/382455
+  commit: https://go.googlesource.com/go/+/7f9494c277a471f6f47f4af3036285c0b1419816
+  context:
+    - https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ
+    - https://go.dev/issue/50974