From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: zram: free secondary algorithms names - Description: Secondary algorithm names must be freed when resetting a zram device; otherwise, it leads to a memory leak. 2. Fix Details: - Code Change: Added the following code in : 3. Author and Committer: - Author: Sergey Senozhatsky - Committer: Andrew Morton 4. Dates: - Commit Date: September 11, 2024 - Fix Date: September 17, 2024 5. Links and References: - Link: https://lkml.kernel.org/r/20240917013021.868769-1-senozhatsky@chromium.org - Reference: https://lkml.kernel.org/r/20240911025600.3681789-1-senozhatsky@chromium.org 6. Patch and Signatures: - Patch: 684826f8271ad97580b138b9ff462005e470b99 - Signatures: Signed by Sergey Senozhatsky and Andrew Morton. This information indicates that the vulnerability relates to the management of secondary algorithm names in zram devices, and the fix involves freeing these names during device reset to prevent memory leaks.