diff --git a/2021/43xxx/CVE-2021-43178.json b/2021/43xxx/CVE-2021-43178.json index 029e7244b66..79407875e7f 100644 --- a/2021/43xxx/CVE-2021-43178.json +++ b/2021/43xxx/CVE-2021-43178.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2021-43178", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." } ] } diff --git a/2021/43xxx/CVE-2021-43179.json b/2021/43xxx/CVE-2021-43179.json index 20517b502f8..9f7abe2613d 100644 --- a/2021/43xxx/CVE-2021-43179.json +++ b/2021/43xxx/CVE-2021-43179.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2021-43179", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." } ] } diff --git a/2022/35xxx/CVE-2022-35928.json b/2022/35xxx/CVE-2022-35928.json index 753c6ec3252..64d0e2f3d7d 100644 --- a/2022/35xxx/CVE-2022-35928.json +++ b/2022/35xxx/CVE-2022-35928.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "AES Crypt is a file encryption software for multiple platforms. AES Crypt for Linux built using the source on GitHub and having the version number 3.11 has a vulnerability with respect to reading user-provided passwords and confirmations via command-line prompts. Passwords lengths were not checked before being read. This vulnerability may lead to buffer overruns. This does _not_ affect source code found on aescrypt.com, nor is the vulnerability present when providing a password or a key via the `-p` or `-k` command-line options. The problem was fixed via in commit 68761851b and will be included in release 3.16. Users are advised to upgrade. Users unable to upgrade should us the `-p` or `-k` options to provide a password or key.\n" + "value": "AES Crypt is a file encryption software for multiple platforms. AES Crypt for Linux built using the source on GitHub and having the version number 3.11 has a vulnerability with respect to reading user-provided passwords and confirmations via command-line prompts. Passwords lengths were not checked before being read. This vulnerability may lead to buffer overruns. This does _not_ affect source code found on aescrypt.com, nor is the vulnerability present when providing a password or a key via the `-p` or `-k` command-line options. The problem was fixed via in commit 68761851b and will be included in release 3.16. Users are advised to upgrade. Users unable to upgrade should us the `-p` or `-k` options to provide a password or key." } ] },