In the Linux kernel, the following vulnerability has been resolved: raid10: cleanup memleak at raid10makerequest If raid10readrequest or raid10writerequest registers a new request and the REQNOWAIT flag is set, the code does not free the malloc from the mempool. unreferenced object 0xffff8884802c3200 (size 192): comm "fio", pid 9197, jiffies 4298078271 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 88 41 02 00 00 00 00 00 .........A...... 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc c1a049a2): _kmalloc+0x2bb/0x450 mempoolalloc+0x11b/0x320 raid10makerequest+0x19e/0x650 [raid10] mdhandlerequest+0x3b3/0x9e0 _submitbio+0x394/0x560 _submitbionoacct+0x145/0x530 submitbionoacctnocheck+0x682/0x830 _blkdevdirectIOasync+0x4dc/0x6b0 blkdevreaditer+0x1e5/0x3b0 _ioread+0x230/0x1110 ioread+0x13/0x30 ioissuesqe+0x134/0x1180 iosubmitsqes+0x48c/0xe90 _dosysiouringenter+0x574/0x8b0 dosyscall64+0x5c/0xe0 entrySYSCALL64after_hwframe+0x76/0x7e V4: changing backing tree to see if CKI tests will pass. The patch code has not changed between any versions.