x/vulndb: add reports/GO-2022-0233.yaml for CVE-2021-23409

Fixes golang/vulndb#0233

Change-Id: I568a716afa8838cf78249b3cb13308a50908dbad
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/415534
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Tatiana Bradley <tatiana@golang.org>
Run-TryBot: Damien Neil <dneil@google.com>
Run-TryBot: Tatiana Bradley <tatiana@golang.org>
diff --git a/reports/GO-2022-0233.yaml b/reports/GO-2022-0233.yaml
new file mode 100644
index 0000000..37b1ab3
--- /dev/null
+++ b/reports/GO-2022-0233.yaml
@@ -0,0 +1,25 @@
+packages:
+  - module: github.com/pires/go-proxyproto
+    symbols:
+      - Listener.Accept
+    versions:
+      - fixed: 0.6.1
+    vulnerable_at: 0.5.0
+description: |
+    The PROXY protocol server does not impose a timeout on reading the header
+    from new connections, allowing a malicious client to cause resource
+    exhaustion and a denial of service by opening many connections and
+    sending no data on them.
+
+    v0.6.0 of the proxyproto package adds support for a user-defined
+    header timeout. v0.6.1 adds a default timeout of 200ms and v0.6.2
+    increases the default timeout to 10s.
+cves:
+  - CVE-2021-23409
+ghsas:
+  - GHSA-xcf7-q56x-78gh
+links:
+    pr: https://github.com/pires/go-proxyproto/pull/74
+    commit: https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346
+    context:
+      - https://github.com/pires/go-proxyproto/issues/65