In the Linux kernel, the following vulnerability has been resolved: io_uring/poll: add hash if ready poll request can't complete inline If we don't, then we may lose access to it completely, leading to a request leak. This will eventually stall the ring exit process as well.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.