vulnerability

Ubuntu: (Multiple Advisories) (CVE-2022-32547): ImageMagick vulnerabilities

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Jun 16, 2022
Added
Jul 27, 2022
Modified
Apr 16, 2026

Description

In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.

Solutions

ubuntu-pro-upgrade-imagemagickubuntu-pro-upgrade-imagemagick-6-commonubuntu-pro-upgrade-imagemagick-6-q16ubuntu-pro-upgrade-imagemagick-6-q16hdriubuntu-pro-upgrade-imagemagick-commonubuntu-pro-upgrade-libimage-magick-perlubuntu-pro-upgrade-libimage-magick-q16-perlubuntu-pro-upgrade-libmagick-5ubuntu-pro-upgrade-libmagick-6-q16-5v5ubuntu-pro-upgrade-libmagick-6-q16-7ubuntu-pro-upgrade-libmagick-6-q16-8ubuntu-pro-upgrade-libmagick-6-q16-devubuntu-pro-upgrade-libmagick-6-q16hdri-7ubuntu-pro-upgrade-libmagick-6-q16hdri-8ubuntu-pro-upgrade-libmagick-6-q16hdri-devubuntu-pro-upgrade-libmagick-devubuntu-pro-upgrade-libmagickcore-6-headersubuntu-pro-upgrade-libmagickcore-6-q16-2ubuntu-pro-upgrade-libmagickcore-6-q16-2-extraubuntu-pro-upgrade-libmagickcore-6-q16-3ubuntu-pro-upgrade-libmagickcore-6-q16-6ubuntu-pro-upgrade-libmagickcore-6-q16-devubuntu-pro-upgrade-libmagickcore-6-q16hdri-3ubuntu-pro-upgrade-libmagickcore-6-q16hdri-6ubuntu-pro-upgrade-libmagickcore-devubuntu-pro-upgrade-libmagickcore5ubuntu-pro-upgrade-libmagickcore5-extraubuntu-pro-upgrade-libmagickwand-6-q16-2ubuntu-pro-upgrade-libmagickwand-6-q16-3ubuntu-pro-upgrade-libmagickwand-6-q16-6ubuntu-pro-upgrade-libmagickwand-6-q16-devubuntu-pro-upgrade-libmagickwand-devubuntu-pro-upgrade-libmagickwand5ubuntu-pro-upgrade-perlmagickubuntu-upgrade-imagemagickubuntu-upgrade-imagemagick-6-commonubuntu-upgrade-imagemagick-6-q16ubuntu-upgrade-imagemagick-6-q16hdriubuntu-upgrade-imagemagick-commonubuntu-upgrade-libimage-magick-perlubuntu-upgrade-libimage-magick-q16-perlubuntu-upgrade-libmagick-6-q16-7ubuntu-upgrade-libmagick-6-q16-8ubuntu-upgrade-libmagick-6-q16-devubuntu-upgrade-libmagick-6-q16hdri-7ubuntu-upgrade-libmagick-6-q16hdri-8ubuntu-upgrade-libmagick-6-q16hdri-devubuntu-upgrade-libmagick-devubuntu-upgrade-libmagickcore-6-arch-configubuntu-upgrade-libmagickcore-6-headersubuntu-upgrade-libmagickcore-6-q16-3ubuntu-upgrade-libmagickcore-6-q16-3-extraubuntu-upgrade-libmagickcore-6-q16-6ubuntu-upgrade-libmagickcore-6-q16-6-extraubuntu-upgrade-libmagickcore-6-q16-devubuntu-upgrade-libmagickcore-6-q16hdri-3ubuntu-upgrade-libmagickcore-6-q16hdri-6ubuntu-upgrade-libmagickcore-devubuntu-upgrade-libmagickwand-6-q16-3ubuntu-upgrade-libmagickwand-6-q16-6ubuntu-upgrade-libmagickwand-6-q16-devubuntu-upgrade-libmagickwand-devubuntu-upgrade-perlmagick

References

    Title
    Rapid7 Labs

    2026 Global Threat Landscape Report

    The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.