VYPR
Unrated severityNVD Advisory· Published Oct 22, 2025· Updated Apr 15, 2026

CVE-2022-50559

CVE-2022-50559

Description

In the Linux kernel, the following vulnerability has been resolved:

clk: imx: scu: fix memleak on platform_device_add() fails

No error handling is performed when platform_device_add() fails. Add error processing before return, and modified the return value.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in the Linux kernel's i.MX SCU clock driver occurs when platform_device_add() fails, due to missing error handling.

Vulnerability

In the Linux kernel's i.MX System Controller Unit (SCU) clock driver, a memory leak vulnerability exists when the platform_device_add() function fails. The driver does not perform any error handling or cleanup after a failure of platform_device_add(), leading to unreleased memory resources [1].

Exploitation

This vulnerability is triggered during the driver initialization process when adding a platform device. An attacker would need to cause the platform_device_add() call to fail, which could occur due to resource constraints or other system conditions. No special privileges or user interaction are required beyond the ability to trigger the device addition failure [1].

Impact

If exploited, the memory leak can gradually deplete system memory, potentially leading to denial of service (DoS) conditions. The vulnerability does not allow for code execution or privilege escalation, but it can degrade system stability and availability over time [1].

Mitigation

The fix adds proper error handling before returning from the function when platform_device_add() fails, ensuring that allocated resources are freed. The patch has been applied to the stable kernel tree and is available in the referenced commit [1]. Users should update their kernel to include this fix.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.