In the Linux kernel, the following vulnerability has been resolved:
zram: free secondary algorithms names
We need to kfree() secondary algorithms names when reset zram device that had multi-streams, otherwise we leak memory.
[senozhatsky@chromium.org: kfree(NULL) is legal]
[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"234428675433061679682650958013299112875",
"314861669982962734774592488492333115214",
"1728847938358570622038608420708442836"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@684826f8271ad97580b138b9ffd462005e470b99",
"deprecated": false,
"id": "CVE-2024-50064-03bb505b",
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "drivers/block/zram/zram_drv.c"
}
},
{
"digest": {
"function_hash": "288817897131104957378760038986306544790",
"length": 273.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@684826f8271ad97580b138b9ffd462005e470b99",
"deprecated": false,
"id": "CVE-2024-50064-fbd41a51",
"signature_type": "Function",
"signature_version": "v1",
"target": {
"function": "zram_destroy_comps",
"file": "drivers/block/zram/zram_drv.c"
}
}
]