From this webpage screenshot, the following key information about the vulnerability can be obtained: Vulnerability Type: Use-after-free Affected Function: Fix Description: - The operation frees the , so the length of is saved before calling to prevent accessing already-freed memory. Related Commits: - Upstream commit: - Fix commit: File Modifications: - Modified file: - 1 file changed, 2 insertions, 1 deletion. Key Code Changes: This information indicates that the vulnerability was caused by improper use of in the function. The fix involves saving the length before calling , and then using the saved length for subsequent statistics.