Author: jmm
Date: 2017-06-16 14:41:16 +0000 (Fri, 16 Jun 2017)
New Revision: 52617

Modified:
   data/CVE/list
Log:
android NFUs


Modified: data/CVE/list
===================================================================
--- data/CVE/list       2017-06-16 14:38:55 UTC (rev 52616)
+++ data/CVE/list       2017-06-16 14:41:16 UTC (rev 52617)
@@ -4955,23 +4955,23 @@
 CVE-2016-10342 (In all Android releases from CAF using the Linux kernel, a 
buffer ...)
        NOT-FOR-US: Qualcomm component for Android
 CVE-2016-10341 (In all Android releases from CAF using the Linux kernel, 3rd 
party ...)
-       TODO: check
+       NOT-FOR-US: Qualcomm component for Android
 CVE-2016-10340 (In all Android releases from CAF using the Linux kernel, an 
integer ...)
-       TODO: check
+       NOT-FOR-US: Qualcomm component for Android
 CVE-2016-10339 (In all Android releases from CAF using the Linux kernel, HLOS 
can ...)
-       TODO: check
+       NOT-FOR-US: Qualcomm component for Android
 CVE-2016-10338 (In all Android releases from CAF using the Linux kernel, there 
was an ...)
-       TODO: check
+       NOT-FOR-US: Qualcomm component for Android
 CVE-2016-10337 (In all Android releases from CAF using the Linux kernel, some 
...)
        NOT-FOR-US: Qualcomm component for Android
 CVE-2016-10336 (In all Android releases from CAF using the Linux kernel, some 
regions ...)
-       TODO: check
+       NOT-FOR-US: Qualcomm component for Android
 CVE-2016-10335 (In all Android releases from CAF using the Linux kernel, 
libtomcrypt ...)
-       TODO: check
+       NOT-FOR-US: Qualcomm component for Android
 CVE-2016-10334 (In all Android releases from CAF using the Linux kernel, a ...)
-       TODO: check
+       NOT-FOR-US: Qualcomm component for Android
 CVE-2016-10333 (In all Android releases from CAF using the Linux kernel, a 
sensitive ...)
-       TODO: check
+       NOT-FOR-US: Qualcomm component for Android
 CVE-2016-10332 (In all Android releases from CAF using the Linux kernel, stack 
...)
        NOT-FOR-US: Qualcomm component for Android
 CVE-2016-10331 (Directory traversal vulnerability in download.php in Synology 
Photo ...)
@@ -5031,25 +5031,25 @@
 CVE-2015-9030 (In all Android releases from CAF using the Linux kernel, the 
...)
        NOT-FOR-US: Qualcomm component for Android
 CVE-2015-9029 (In all Android releases from CAF using the Linux kernel, a ...)
-       TODO: check
+       NOT-FOR-US: Qualcomm component for Android
 CVE-2015-9028 (In all Android releases from CAF using the Linux kernel, a 
buffer ...)
        NOT-FOR-US: Qualcomm component for Android
 CVE-2015-9027 (In all Android releases from CAF using the Linux kernel, an 
untrusted ...)
-       TODO: check
+       NOT-FOR-US: Qualcomm component for Android
 CVE-2015-9026 (In all Android releases from CAF using the Linux kernel, an 
untrusted ...)
-       TODO: check
+       NOT-FOR-US: Qualcomm component for Android
 CVE-2015-9025 (In all Android releases from CAF using the Linux kernel, a 
buffer ...)
        NOT-FOR-US: Qualcomm component for Android
 CVE-2015-9024 (In all Android releases from CAF using the Linux kernel, some 
...)
-       TODO: check
+       NOT-FOR-US: Qualcomm component for Android
 CVE-2015-9023 (In all Android releases from CAF using the Linux kernel, a 
buffer ...)
        NOT-FOR-US: Qualcomm component for Android
 CVE-2015-9022 (In all Android releases from CAF using the Linux kernel, 
time-of-check ...)
        NOT-FOR-US: Qualcomm component for Android
 CVE-2015-9021 (In all Android releases from CAF using the Linux kernel, access 
...)
-       TODO: check
+       NOT-FOR-US: Qualcomm component for Android
 CVE-2015-9020 (In all Android releases from CAF using the Linux kernel, an 
untrusted ...)
-       TODO: check
+       NOT-FOR-US: Qualcomm component for Android
 CVE-2014-9969
        RESERVED
 CVE-2014-9968


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to