VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2022-50762

CVE-2022-50762

Description

In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Avoid UBSAN error on true_sectors_per_clst()

syzbot reported UBSAN error as below:

[ 76.901829][ T6677] ================================================================================ [ 76.903908][ T6677] UBSAN: shift-out-of-bounds in fs/ntfs3/super.c:675:13 [ 76.905363][ T6677] shift exponent -247 is negative

This patch avoid this error.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

UBSAN shift-out-of-bounds error in Linux kernel's ntfs3 driver when calculating sectors per cluster can be triggered by a crafted NTFS image.

Vulnerability

In the Linux kernel's ntfs3 filesystem driver, the function true_sectors_per_clst() in fs/ntfs3/super.c performs a shift operation that can result in a negative shift exponent. This triggers an Undefined Behavior Sanitizer (UBSAN) shift-out-of-bounds error, as reported by syzbot [1]. The root cause is a missing or insufficient validation of the sectors-per-cluster value, leading to a shift exponent of -247.

Exploitation

An attacker with the ability to mount a specially crafted NTFS filesystem image can trigger this bug. The vulnerability exists in the kernel's handling of NTFS metadata, so local access is required to mount the malicious image. No additional privileges are needed beyond the ability to mount filesystems.

Impact

When triggered, the UBSAN error causes a kernel log message and potential undefined behavior. While UBSAN does not crash the kernel by default, it indicates a serious bug that could lead to memory corruption or system instability in certain configurations.

Mitigation

The fix is included in Linux kernel stable updates [1][2]. Users should apply the latest kernel patches from their distribution or update to a kernel version that contains the commit.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.