data/reports: update GO-2023-2409.yaml

Aliases: GHSA-mhpq-9638-x6pw

Updates golang/vulndb#2409
Fixes golang/vulndb#2416

Change-Id: I69f59403db2320cb9242c3e5c1295168edcd9b5d
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/551995
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Run-TryBot: Tim King <taking@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Tatiana Bradley <tatianabradley@google.com>
diff --git a/data/osv/GO-2023-2409.json b/data/osv/GO-2023-2409.json
index 00f136a..27a6ec9 100644
--- a/data/osv/GO-2023-2409.json
+++ b/data/osv/GO-2023-2409.json
@@ -3,6 +3,9 @@
   "id": "GO-2023-2409",
   "modified": "0001-01-01T00:00:00Z",
   "published": "0001-01-01T00:00:00Z",
+  "aliases": [
+    "GHSA-mhpq-9638-x6pw"
+  ],
   "summary": "Denial of service when decrypting attack controlled input in github.com/dvsekhvalnov/jose2go",
   "details": "An attacker controlled input of a PBES2 encrypted JWE blob can have a very large p2c value that, when decrypted, produces a denial-of-service.",
   "affected": [
diff --git a/data/reports/GO-2023-2409.yaml b/data/reports/GO-2023-2409.yaml
index 6b54628..fa5b21a 100644
--- a/data/reports/GO-2023-2409.yaml
+++ b/data/reports/GO-2023-2409.yaml
@@ -21,6 +21,8 @@
 description: |-
     An attacker controlled input of a PBES2 encrypted JWE blob can have a very
     large p2c value that, when decrypted, produces a denial-of-service.
+ghsas:
+    - GHSA-mhpq-9638-x6pw
 credits:
     - '@mschwager'
 references: