CVE-2024-50064

Source
https://cve.org/CVERecord?id=CVE-2024-50064
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50064.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50064
Downstream
Related
Published
2024-10-21T19:39:52.348Z
Modified
2026-03-20T12:38:12.626788Z
Summary
zram: free secondary algorithms names
Details

In the Linux kernel, the following vulnerability has been resolved:

zram: free secondary algorithms names

We need to kfree() secondary algorithms names when reset zram device that had multi-streams, otherwise we leak memory.

[senozhatsky@chromium.org: kfree(NULL) is legal]

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50064.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
001d9273570115b2eb360d5452bbc46f6cc063a1
Fixed
6272936fd242ca1f784c3e21596dfb3859dff276
Fixed
ef35cc0d15b89dd013e1bb829fe97db7b1ab79eb
Fixed
684826f8271ad97580b138b9ffd462005e470b99

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50064.json"