CVE-2022-50559
Description
In the Linux kernel, the following vulnerability has been resolved:
clk: imx: scu: fix memleak on platform_device_add() fails
No error handling is performed when platform_device_add() fails. Add error processing before return, and modified the return value.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in the Linux kernel's i.MX SCU clock driver occurs when platform_device_add() fails, due to missing error handling.
Vulnerability
In the Linux kernel's i.MX System Controller Unit (SCU) clock driver, a memory leak vulnerability exists when the platform_device_add() function fails. The driver does not perform any error handling or cleanup after a failure of platform_device_add(), leading to unreleased memory resources [1].
Exploitation
This vulnerability is triggered during the driver initialization process when adding a platform device. An attacker would need to cause the platform_device_add() call to fail, which could occur due to resource constraints or other system conditions. No special privileges or user interaction are required beyond the ability to trigger the device addition failure [1].
Impact
If exploited, the memory leak can gradually deplete system memory, potentially leading to denial of service (DoS) conditions. The vulnerability does not allow for code execution or privilege escalation, but it can degrade system stability and availability over time [1].
Mitigation
The fix adds proper error handling before returning from the function when platform_device_add() fails, ensuring that allocated resources are freed. The patch has been applied to the stable kernel tree and is available in the referenced commit [1]. Users should update their kernel to include this fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
49209e6bab75d43c589b7a18705fe0b3d69b8855ae87a2073Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.