From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: zram: free secondary algorithms names - Description: Secondary algorithm names must be freed when resetting a zram device; otherwise, it leads to a memory leak. 2. Fix Details: - Upstream Commit: 684826f8271ad97580b138b9fffd462005e470b99 - Fix Code: Added call in to free secondary algorithm names. 3. Author and Committer: - Author: Sergey Senozhatsky - Committer: Greg Kroah-Hartman 4. Code Changes: - File: drivers/block/zram/zram_drv.c - Changes: - Added call to free secondary algorithm names. - Modified function to include call. 5. Sign-offs: - Sergey Senozhatsky - Andrew Morton - Sasha Levin 6. Diffstat: - File: drivers/block/zram/zram_drv.c - Changes: 5 insertions, 0 deletions 7. Context: - Context: 3 lines - Whitespace: Included - Format: Unified This information indicates that the vulnerability was fixed by addressing the memory leak caused by not freeing secondary algorithm names during zram device reset, resolved by adding a call in the relevant code.