CVE-2024-50064

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-50064
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50064.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50064
Downstream
Related
Published
2024-10-21T19:39:52.348Z
Modified
2025-11-16T03:13:54.536510Z
Summary
zram: free secondary algorithms names
Details

In the Linux kernel, the following vulnerability has been resolved:

zram: free secondary algorithms names

We need to kfree() secondary algorithms names when reset zram device that had multi-streams, otherwise we leak memory.

[senozhatsky@chromium.org: kfree(NULL) is legal]

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
001d9273570115b2eb360d5452bbc46f6cc063a1
Fixed
6272936fd242ca1f784c3e21596dfb3859dff276
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
001d9273570115b2eb360d5452bbc46f6cc063a1
Fixed
ef35cc0d15b89dd013e1bb829fe97db7b1ab79eb
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
001d9273570115b2eb360d5452bbc46f6cc063a1
Fixed
684826f8271ad97580b138b9ffd462005e470b99

Affected versions

v6.*

v6.1
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.11.1
v6.11.2
v6.11.3
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.3
v6.3-rc1
v6.3-rc2
v6.3-rc3
v6.3-rc4
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.4
v6.4-rc1
v6.4-rc2
v6.4-rc3
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.5
v6.5-rc1
v6.5-rc2
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.10
v6.6.11
v6.6.12
v6.6.13
v6.6.14
v6.6.15
v6.6.16
v6.6.17
v6.6.18
v6.6.19
v6.6.2
v6.6.20
v6.6.21
v6.6.22
v6.6.23
v6.6.24
v6.6.25
v6.6.26
v6.6.27
v6.6.28
v6.6.29
v6.6.3
v6.6.30
v6.6.31
v6.6.32
v6.6.33
v6.6.34
v6.6.35
v6.6.36
v6.6.37
v6.6.38
v6.6.39
v6.6.4
v6.6.40
v6.6.41
v6.6.42
v6.6.43
v6.6.44
v6.6.45
v6.6.46
v6.6.47
v6.6.48
v6.6.49
v6.6.5
v6.6.50
v6.6.51
v6.6.52
v6.6.53
v6.6.54
v6.6.55
v6.6.56
v6.6.6
v6.6.7
v6.6.8
v6.6.9
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

vanir_signatures

[
    {
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "234428675433061679682650958013299112875",
                "314861669982962734774592488492333115214",
                "1728847938358570622038608420708442836"
            ]
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@684826f8271ad97580b138b9ffd462005e470b99",
        "deprecated": false,
        "id": "CVE-2024-50064-03bb505b",
        "signature_type": "Line",
        "signature_version": "v1",
        "target": {
            "file": "drivers/block/zram/zram_drv.c"
        }
    },
    {
        "digest": {
            "function_hash": "288817897131104957378760038986306544790",
            "length": 273.0
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@684826f8271ad97580b138b9ffd462005e470b99",
        "deprecated": false,
        "id": "CVE-2024-50064-fbd41a51",
        "signature_type": "Function",
        "signature_version": "v1",
        "target": {
            "function": "zram_destroy_comps",
            "file": "drivers/block/zram/zram_drv.c"
        }
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.57
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.11.4