{"id":"CVE-2022-32545","details":"A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.","modified":"2026-04-16T04:39:38.120489941Z","published":"2022-06-16T18:15:10.873Z","related":["SUSE-SU-2022:2259-1","SUSE-SU-2022:2263-1","SUSE-SU-2022:2301-1","SUSE-SU-2023:4634-1","openSUSE-SU-2024:13263-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2091811"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512"},{"type":"FIX","url":"https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick","events":[{"introduced":"b4ca2bed6e55417f439155eaa6a406ff71798116"},{"fixed":"b83772f8cdc35f27aa669c9e15eb6b8ad0f98786"},{"fixed":"9c9a84cec4ab28ee0b57c2b9266d6fbe68183512"}],"database_specific":{"versions":[{"introduced":"7.1.0"},{"fixed":"7.1.0-28"}]}},{"type":"GIT","repo":"https://github.com/imagemagick/imagemagick6","events":[{"introduced":"0"},{"fixed":"775c7817f3700514173e0655776e0d9465e93d6c"},{"fixed":"450949ed017f009b399c937cf362f0058eacc5fa"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"6.9.12-43"}]}}],"versions":["6.9.10-0","6.9.10-1","6.9.10-10","6.9.10-11","6.9.10-12","6.9.10-13","6.9.10-14","6.9.10-15","6.9.10-16","6.9.10-17","6.9.10-18","6.9.10-19","6.9.10-2","6.9.10-20","6.9.10-21","6.9.10-22","6.9.10-23","6.9.10-24","6.9.10-25","6.9.10-26","6.9.10-27","6.9.10-28","6.9.10-29","6.9.10-3","6.9.10-30","6.9.10-31","6.9.10-32","6.9.10-33","6.9.10-34","6.9.10-35","6.9.10-36","6.9.10-37","6.9.10-38","6.9.10-39","6.9.10-4","6.9.10-40","6.9.10-41","6.9.10-42","6.9.10-43","6.9.10-44","6.9.10-45","6.9.10-46","6.9.10-47","6.9.10-48","6.9.10-49","6.9.10-5","6.9.10-50","6.9.10-51","6.9.10-52","6.9.10-53","6.9.10-54","6.9.10-55","6.9.10-56","6.9.10-57","6.9.10-58","6.9.10-59","6.9.10-6","6.9.10-60","6.9.10-61","6.9.10-62","6.9.10-63","6.9.10-64","6.9.10-65","6.9.10-66","6.9.10-67","6.9.10-68","6.9.10-69","6.9.10-7","6.9.10-70","6.9.10-71","6.9.10-72","6.9.10-73","6.9.10-74","6.9.10-75","6.9.10-77","6.9.10-78","6.9.10-79","6.9.10-8","6.9.10-80","6.9.10-81","6.9.10-82","6.9.10-83","6.9.10-84","6.9.10-85","6.9.10-86","6.9.10-87","6.9.10-88","6.9.10-89","6.9.10-9","6.9.10-90","6.9.10-91","6.9.10-92","6.9.10-93","6.9.10-94","6.9.10-95","6.9.10-96","6.9.10-97","6.9.11-0","6.9.11-1","6.9.11-10","6.9.11-11","6.9.11-12","6.9.11-13","6.9.11-14","6.9.11-15","6.9.11-16","6.9.11-17","6.9.11-18","6.9.11-19","6.9.11-2","6.9.11-20","6.9.11-21","6.9.11-22","6.9.11-23","6.9.11-24","6.9.11-25","6.9.11-26","6.9.11-27","6.9.11-28","6.9.11-29","6.9.11-3","6.9.11-30","6.9.11-31","6.9.11-32","6.9.11-33","6.9.11-34","6.9.11-35","6.9.11-36","6.9.11-37","6.9.11-38","6.9.11-39","6.9.11-4","6.9.11-40","6.9.11-41","6.9.11-42","6.9.11-43","6.9.11-44","6.9.11-45","6.9.11-46","6.9.11-47","6.9.11-48","6.9.11-49","6.9.11-5","6.9.11-50","6.9.11-51","6.9.11-52","6.9.11-53","6.9.11-54","6.9.11-55","6.9.11-56","6.9.11-57","6.9.11-59","6.9.11-6","6.9.11-60","6.9.11-61","6.9.11-62","6.9.11-7","6.9.11-8","6.9.11-9","6.9.12-0","6.9.12-1","6.9.12-10","6.9.12-11","6.9.12-12","6.9.12-14","6.9.12-15","6.9.12-16","6.9.12-17","6.9.12-18","6.9.12-19","6.9.12-2","6.9.12-20","6.9.12-21","6.9.12-22","6.9.12-23","6.9.12-24","6.9.12-25","6.9.12-26","6.9.12-27","6.9.12-28","6.9.12-29","6.9.12-3","6.9.12-30","6.9.12-31","6.9.12-32","6.9.12-33","6.9.12-34","6.9.12-35","6.9.12-36","6.9.12-37","6.9.12-38","6.9.12-39","6.9.12-4","6.9.12-40","6.9.12-41","6.9.12-42","6.9.12-5","6.9.12-6","6.9.12-7","6.9.12-8","6.9.12-9","6.9.4-0","6.9.4-1","6.9.4-10","6.9.4-2","6.9.4-3","6.9.4-4","6.9.4-5","6.9.4-6","6.9.4-7","6.9.4-8","6.9.4-9","6.9.5-0","6.9.5-1","6.9.5-10","6.9.5-2","6.9.5-3","6.9.5-4","6.9.5-5","6.9.5-6","6.9.5-7","6.9.5-8","6.9.5-9","6.9.6-0","6.9.6-1","6.9.6-2","6.9.6-3","6.9.6-4","6.9.6-5","6.9.6-6","6.9.6-7","6.9.6-8","6.9.7-0","6.9.7-1","6.9.7-10","6.9.7-2","6.9.7-3","6.9.7-4","6.9.7-5","6.9.7-6","6.9.7-7","6.9.7-8","6.9.7-9","6.9.8-0","6.9.8-1","6.9.8-10","6.9.8-2","6.9.8-3","6.9.8-4","6.9.8-5","6.9.8-6","6.9.8-7","6.9.8-8","6.9.8-9","6.9.9-0","6.9.9-1","6.9.9-10","6.9.9-11","6.9.9-12","6.9.9-13","6.9.9-14","6.9.9-15","6.9.9-17","6.9.9-18","6.9.9-19","6.9.9-2","6.9.9-20","6.9.9-21","6.9.9-22","6.9.9-23","6.9.9-24","6.9.9-25","6.9.9-26","6.9.9-27","6.9.9-28","6.9.9-29","6.9.9-3","6.9.9-30","6.9.9-31","6.9.9-32","6.9.9-33","6.9.9-34","6.9.9-35","6.9.9-36","6.9.9-37","6.9.9-38","6.9.9-39","6.9.9-4","6.9.9-40","6.9.9-41","6.9.9-42","6.9.9-43","6.9.9-44","6.9.9-45","6.9.9-46","6.9.9-47","6.9.9-48","6.9.9-49","6.9.9-5","6.9.9-50","6.9.9-51","6.9.9-6","6.9.9-7","6.9.9-8","6.9.9-9","7.1.0-0","7.1.0-1","7.1.0-10","7.1.0-11","7.1.0-12","7.1.0-13","7.1.0-14","7.1.0-15","7.1.0-16","7.1.0-17","7.1.0-18","7.1.0-19","7.1.0-2","7.1.0-20","7.1.0-21","7.1.0-22","7.1.0-23","7.1.0-24","7.1.0-25","7.1.0-26","7.1.0-27","7.1.0-3","7.1.0-4","7.1.0-5","7.1.0-6","7.1.0-7","7.1.0-8","7.1.0-9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-32545.json","vanir_signatures_modified":"2026-04-12T02:56:59Z","vanir_signatures":[{"source":"https://github.com/imagemagick/imagemagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa","signature_version":"v1","signature_type":"Function","target":{"file":"coders/emf.c","function":"ReadEnhMetaFile"},"deprecated":false,"digest":{"length":2862,"function_hash":"107669540964191049318054769458742985876"},"id":"CVE-2022-32545-043f1e31"},{"source":"https://github.com/imagemagick/imagemagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa","signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["2922394835905883355772728692553695281","223039962330453478009510223370879754647","270953705571333945920841471669258826931","144992192195766507598424705290186435897"]},"signature_type":"Line","deprecated":false,"target":{"file":"wand/display.c"},"id":"CVE-2022-32545-30593bfd"},{"source":"https://github.com/imagemagick/imagemagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa","signature_version":"v1","signature_type":"Function","target":{"file":"wand/display.c","function":"DisplayImageCommand"},"deprecated":false,"digest":{"length":35954,"function_hash":"219950690252569418923819055083825237113"},"id":"CVE-2022-32545-347c7c00"},{"signature_type":"Function","signature_version":"v1","digest":{"length":1245,"function_hash":"66894560288726127864308260843510210687"},"target":{"file":"coders/psd.c","function":"ReadPSDChannelPixels"},"deprecated":false,"source":"https://github.com/imagemagick/imagemagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512","id":"CVE-2022-32545-399c0044"},{"signature_type":"Line","signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["182715889705389914160888830333148723288","321595425898117933709832691207650435354","270953705571333945920841471669258826931","144992192195766507598424705290186435897"]},"target":{"file":"wand/animate.c"},"deprecated":false,"source":"https://github.com/imagemagick/imagemagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa","id":"CVE-2022-32545-3f7620eb"},{"signature_type":"Line","signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["70027981160788788955451833063013943800","303069948395123572092993557853419364182","313651405758085215534699956378443584545","334584171321803250128114614414666633874","226865905141239245420550842229083038544"]},"target":{"file":"coders/psd.c"},"deprecated":false,"source":"https://github.com/imagemagick/imagemagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa","id":"CVE-2022-32545-663bc659"},{"signature_type":"Function","signature_version":"v1","digest":{"length":27230,"function_hash":"271948734031670130091548691078686195782"},"target":{"file":"wand/animate.c","function":"AnimateImageCommand"},"deprecated":false,"source":"https://github.com/imagemagick/imagemagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa","id":"CVE-2022-32545-8fe9343b"},{"signature_type":"Line","target":{"file":"magick/widget.c"},"digest":{"threshold":0.9,"line_hashes":["142702933640908872871858465956786526825","258950224609363800781997269646095546260","81301893000684523565913591491962675098","331420701643053837345479808938208773066","135649629448270926619698828014029039754","1048847680699984870278257303481013614","194055246563048313328084476313371364488","218775500367713571795792617745745659173","249876803622110702942182140817548570261","179863536916408879677787073814469740612","73768590461258157517401177159860068486","282039619422835978112728006860218975133"]},"source":"https://github.com/imagemagick/imagemagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa","deprecated":false,"signature_version":"v1","id":"CVE-2022-32545-d012c627"},{"target":{"file":"coders/psd.c","function":"ReadPSDChannelPixels"},"source":"https://github.com/imagemagick/imagemagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa","digest":{"length":1266,"function_hash":"231943089371552274282982599257606168585"},"signature_version":"v1","deprecated":false,"signature_type":"Function","id":"CVE-2022-32545-dd2dc5f6"},{"source":"https://github.com/imagemagick/imagemagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa","signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["173889494262143048399999924597526917362","21476381559636780857159045754370954855","245639279279057097841301228334756040117","160955920060157375575882214932637134534"]},"signature_type":"Line","deprecated":false,"target":{"file":"coders/emf.c"},"id":"CVE-2022-32545-ebb97c34"},{"source":"https://github.com/imagemagick/imagemagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa","signature_version":"v1","signature_type":"Function","digest":{"length":9966,"function_hash":"306275757067919088477772076289262094961"},"deprecated":false,"target":{"file":"magick/widget.c","function":"XMenuWidget"},"id":"CVE-2022-32545-f02cc8b0"},{"signature_type":"Line","target":{"file":"coders/psd.c"},"digest":{"threshold":0.9,"line_hashes":["38253728657387467419027296839828887914","281890737587927170333880915462408367288","295018082533809359802700248615624328496","165097017984464447209759120721609619181"]},"source":"https://github.com/imagemagick/imagemagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512","deprecated":false,"signature_version":"v1","id":"CVE-2022-32545-ff503703"}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}