data/reports: add alias for GO-2022-0391.yaml

Aliases: CVE-2022-2582, GHSA-76wf-9vgp-pj7w, GHSA-6jvc-q2x7-pchv

Updates golang/vulndb#391
Fixes golang/vulndb#1223

Change-Id: I1b7eaf8a3559d3a95fec83083a66d6d67018c25b
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/461440
Run-TryBot: Tatiana Bradley <tatiana@golang.org>
Reviewed-by: Damien Neil <dneil@google.com>
Reviewed-by: Tatiana Bradley <tatiana@golang.org>
TryBot-Result: Gopher Robot <gobot@golang.org>
diff --git a/data/osv/GO-2022-0391.json b/data/osv/GO-2022-0391.json
index 2ae2a4a..5feaae7 100644
--- a/data/osv/GO-2022-0391.json
+++ b/data/osv/GO-2022-0391.json
@@ -4,7 +4,8 @@
   "modified": "0001-01-01T00:00:00Z",
   "aliases": [
     "CVE-2022-2582",
-    "GHSA-76wf-9vgp-pj7w"
+    "GHSA-76wf-9vgp-pj7w",
+    "GHSA-6jvc-q2x7-pchv"
   ],
   "details": "The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker.\n\nAWS now blocks this metadata field, but older SDK versions still send it.",
   "affected": [
diff --git a/data/reports/GO-2022-0391.yaml b/data/reports/GO-2022-0391.yaml
index a22dbb8..f402375 100644
--- a/data/reports/GO-2022-0391.yaml
+++ b/data/reports/GO-2022-0391.yaml
@@ -28,6 +28,7 @@
 published: 2022-07-01T20:10:56Z
 ghsas:
   - GHSA-76wf-9vgp-pj7w
+  - GHSA-6jvc-q2x7-pchv
 references:
   - fix: https://github.com/aws/aws-sdk-go/commit/35fa6ddf45c061e0f08d3a3b5119f8f4da38f6d1
 cve_metadata: