IC Users,
As you may be aware, there recently was publicized a serious security vulnerability in ImageMagick, which is used to resize, transform, convert image type, etc. of image files. The vulnerability has been called ImageTragick. Interchange uses ImageMagick under the hood for a number of its functionalities.
While your systems are not necessarily vulnerable, due to the severity of this bug we strongly recommend all users of Interchange follow the mitigation procedures in the included links.
Full details of the vulnerability and remediation notes are here:
https://imagetragick.com/
https://access.redhat.com/security/vulnerabilities/2296071
David Christensen
--
David Christensen
End Point Corporation
david@endpoint.com
785-727-1171
_______________________________________________
interchange-users mailing list
interchange-users@icdevgroup.org
http://www.icdevgroup.org/mailman/listinfo/interchange-users
As you may be aware, there recently was publicized a serious security vulnerability in ImageMagick, which is used to resize, transform, convert image type, etc. of image files. The vulnerability has been called ImageTragick. Interchange uses ImageMagick under the hood for a number of its functionalities.
While your systems are not necessarily vulnerable, due to the severity of this bug we strongly recommend all users of Interchange follow the mitigation procedures in the included links.
Full details of the vulnerability and remediation notes are here:
https://imagetragick.com/
https://access.redhat.com/security/vulnerabilities/2296071
David Christensen
--
David Christensen
End Point Corporation
david@endpoint.com
785-727-1171
_______________________________________________
interchange-users mailing list
interchange-users@icdevgroup.org
http://www.icdevgroup.org/mailman/listinfo/interchange-users