"value":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: ccree - Fix use after free in cc_cipher_exit()\n\nkfree_sensitive(ctx_p->user.key) will free the ctx_p->user.key. But\nctx_p->user.key is still used in the next line, which will lead to a\nuse after free.\n\nWe can call kfree_sensitive() after dev_dbg() to avoid the uaf."
"value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: ccree - Fix use after free en cc_cipher_exit() kfree_sensitive(ctx_p->user.key) liberar\u00e1 ctx_p->user.key. Pero ctx_p->user.key a\u00fan se usa en la siguiente l\u00ednea, lo que provocar\u00e1 un use-after-free. Podemos llamar a kfree_sensitive() despu\u00e9s de dev_dbg() para evitar el uaf."