** Changed in: linux (Ubuntu Yakkety)
Status: Incomplete => New
** Description changed:
- Description needed
+ double-free/use-after-free in eBPF
Break-Fix: 1be7f75d1668d6296b80bf35dcf6762393530afc
8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7
** Summary changed:
- CVE-2016-NNN1: use-a
** Summary changed:
- CVE-2016-NNN1
+ CVE-2016-NNN1: use-after-free flaw via double-fdput in bpf
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1578705
Title:
CVE-2016-NNN1: use-after-free flaw via
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1578705
Title:
CVE-2016-NNN1
To manage notifications about this bug go to:
https:/