We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-50064

zram: free secondary algorithms names



Description

In the Linux kernel, the following vulnerability has been resolved: zram: free secondary algorithms names We need to kfree() secondary algorithms names when reset zram device that had multi-streams, otherwise we leak memory. [senozhatsky@chromium.org: kfree(NULL) is legal]

Reserved 2024-10-21 | Published 2024-10-21 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

001d9273570115b2eb360d5452bbc46f6cc063a1 before 6272936fd242ca1f784c3e21596dfb3859dff276
affected

001d9273570115b2eb360d5452bbc46f6cc063a1 before ef35cc0d15b89dd013e1bb829fe97db7b1ab79eb
affected

001d9273570115b2eb360d5452bbc46f6cc063a1 before 684826f8271ad97580b138b9ffd462005e470b99
affected

Default status
affected

6.2
affected

Any version before 6.2
unaffected

6.6.57
unaffected

6.11.4
unaffected

6.12
unaffected

References

git.kernel.org/...c/6272936fd242ca1f784c3e21596dfb3859dff276

git.kernel.org/...c/ef35cc0d15b89dd013e1bb829fe97db7b1ab79eb

git.kernel.org/...c/684826f8271ad97580b138b9ffd462005e470b99

cve.org (CVE-2024-50064)

nvd.nist.gov (CVE-2024-50064)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-50064

Support options

Helpdesk Chat, Email, Knowledgebase