x/vulndb: add GO-2022-0435 for CVE-2022-28327

Fixes golang/vulndb#435

Change-Id: I2d8489d0dfc0332358b5457270276b9d7cd55e21
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/407594
Reviewed-by: Tatiana Bradley <tatiana@golang.org>
Run-TryBot: Tatiana Bradley <tatiana@golang.org>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Damien Neil <dneil@google.com>
Auto-Submit: Tatiana Bradley <tatiana@golang.org>
diff --git a/reports/GO-2022-0435.yaml b/reports/GO-2022-0435.yaml
new file mode 100644
index 0000000..82cd629
--- /dev/null
+++ b/reports/GO-2022-0435.yaml
@@ -0,0 +1,23 @@
+packages:
+  - module: std
+    package: crypto/elliptic
+    symbols:
+      - P256.ScalarMult
+      - P256.ScalarBaseMult
+    versions:
+      - fixed: 1.17.9
+      - introduced: 1.18
+        fixed: 1.18.1
+description: |
+    A crafted scalar input longer than 32 bytes can cause P256().ScalarMult
+    or P256().ScalarBaseMult to panic. Indirect uses through crypto/ecdsa and
+    crypto/tls are unaffected. amd64, arm64, ppc64le, and s390x are unaffected.
+cves:
+  - CVE-2022-28327
+credit: Project Wycheproof
+links:
+    pr: https://go.dev/cl/397135
+    commit: https://go.googlesource.com/go/+/37065847d87df92b5eb246c88ba2085efcf0b331
+    context:
+      - https://go.dev/issue/52075
+      - https://groups.google.com/g/golang-announce/c/oecdBNLOml8