data/reports: add missing alias to GO-2022-1144.yaml

Aliases: CVE-2022-41717, GHSA-xrjj-mj9h-534m

Updates golang/vulndb#1144
Fixes golang/vulndb#1501

Change-Id: Ib2313bdf9ae45f2f138fcc637392606a60be5759
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/464317
Reviewed-by: Tatiana Bradley <tatianabradley@google.com>
Run-TryBot: Tatiana Bradley <tatianabradley@google.com>
Auto-Submit: Julie Qiu <julieqiu@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Run-TryBot: Julie Qiu <julieqiu@google.com>
Reviewed-by: Julie Qiu <julieqiu@google.com>
diff --git a/data/osv/GO-2022-1144.json b/data/osv/GO-2022-1144.json
index 34f5faf..9ad4c69 100644
--- a/data/osv/GO-2022-1144.json
+++ b/data/osv/GO-2022-1144.json
@@ -1,10 +1,10 @@
 {
-  "schema_version": "1.3.1",
   "id": "GO-2022-1144",
   "published": "0001-01-01T00:00:00Z",
   "modified": "0001-01-01T00:00:00Z",
   "aliases": [
-    "CVE-2022-41717"
+    "CVE-2022-41717",
+    "GHSA-xrjj-mj9h-534m"
   ],
   "details": "An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests.\n\nHTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.",
   "affected": [
@@ -111,5 +111,6 @@
     {
       "name": "Josselin Costanzi"
     }
-  ]
+  ],
+  "schema_version": "1.3.1"
 }
\ No newline at end of file
diff --git a/data/reports/GO-2022-1144.yaml b/data/reports/GO-2022-1144.yaml
index 63eed0c..2906626 100644
--- a/data/reports/GO-2022-1144.yaml
+++ b/data/reports/GO-2022-1144.yaml
@@ -37,6 +37,8 @@
     client. While the total number of entries in this cache is capped, an
     attacker sending very large keys can cause the server to allocate
     approximately 64 MiB per open connection.
+ghsas:
+  - GHSA-xrjj-mj9h-534m
 credit: Josselin Costanzi
 references:
   - report: https://go.dev/issue/56350