Home > Security > Advisories

Advisories

Mandriva Advisories

Package name jasper
Date June 19th, 2007
Advisory ID MDKSA-2007:129
Affected versions 2007.0, CS4.0, 2007.1
Synopsis Updated jasper packages fix vulnerability

Problem Description

A function in the JasPer JPEG-2000 library before 1.900 could allow
a remote user-assisted attack to cause a crash and possibly corrupt
the heap via malformed image files.

Updated packages have been patched to prevent this issue.

Updated Packages

Mandriva Linux 2007

 fc28c38bdaf30d7a0c87a4066bf8bd9f  2007.0/i586/jasper-1.701.0-5.2mdv2007.0.i586.rpm
 11d3d3624a4c0ffa7b946b1b16060b0d  2007.0/i586/libjasper1.701_1-1.701.0-5.2mdv2007.0.i586.rpm
 d77cd77558fa6111cf55e0cafb6e11d1  2007.0/i586/libjasper1.701_1-devel-1.701.0-5.2mdv2007.0.i586.rpm
 4207ac7d0628f908d3d500298949552e  2007.0/i586/libjasper1.701_1-static-devel-1.701.0-5.2mdv2007.0.i586.rpm 
 9403ba210044e473e3e49b73abc3b381  2007.0/SRPMS/jasper-1.701.0-5.2mdv2007.0.src.rpm

Mandriva Linux 2007/X86_64

 3eba6fe2596ffee7435c45815c0575b3  2007.0/x86_64/jasper-1.701.0-5.2mdv2007.0.x86_64.rpm
 536be18741b3a12b2314c95cabd9d122  2007.0/x86_64/lib64jasper1.701_1-1.701.0-5.2mdv2007.0.x86_64.rpm
 da5b643b80457653cd320fcc7c044366  2007.0/x86_64/lib64jasper1.701_1-devel-1.701.0-5.2mdv2007.0.x86_64.rpm
 6968049da9a8bce28b725f259078e29e  2007.0/x86_64/lib64jasper1.701_1-static-devel-1.701.0-5.2mdv2007.0.x86_64.rpm 
 9403ba210044e473e3e49b73abc3b381  2007.0/SRPMS/jasper-1.701.0-5.2mdv2007.0.src.rpm

Corporate Server 4.0

 b7cfcd228def50fdedcb0cd891d0d1ef  corporate/4.0/i586/jasper-1.701.0-3.2.20060mlcs4.i586.rpm
 613e148bd80a649a94847afaebe5f73f  corporate/4.0/i586/libjasper1.701_1-1.701.0-3.2.20060mlcs4.i586.rpm
 d87ce97a019a778648214f629ce25979  corporate/4.0/i586/libjasper1.701_1-devel-1.701.0-3.2.20060mlcs4.i586.rpm
 ba3d7127d42fb47f05956f754b167cb6  corporate/4.0/i586/libjasper1.701_1-static-devel-1.701.0-3.2.20060mlcs4.i586.rpm 
 83f959601bbf25c3cdce83f07009f6a7  corporate/4.0/SRPMS/jasper-1.701.0-3.2.20060mlcs4.src.rpm

Corporate Server 4.0/X86_64

 263b276f283c81693140adcde9be3ea2  corporate/4.0/x86_64/jasper-1.701.0-3.2.20060mlcs4.x86_64.rpm
 7fbac34d3f7631ab7b3b244d49530986  corporate/4.0/x86_64/lib64jasper1.701_1-1.701.0-3.2.20060mlcs4.x86_64.rpm
 ec28b58eb02493bf2d69fbd55fc5b2c2  corporate/4.0/x86_64/lib64jasper1.701_1-devel-1.701.0-3.2.20060mlcs4.x86_64.rpm
 f8007f65086e970b1dd6f1011bb2c508  corporate/4.0/x86_64/lib64jasper1.701_1-static-devel-1.701.0-3.2.20060mlcs4.x86_64.rpm 
 83f959601bbf25c3cdce83f07009f6a7  corporate/4.0/SRPMS/jasper-1.701.0-3.2.20060mlcs4.src.rpm

Mandriva Linux 2007.1

 757db1c621e9a62b0c6ddc09939f9b50  2007.1/i586/jasper-1.701.0-6.2mdv2007.1.i586.rpm
 33534112f73f9a1c3223cac0ad70dcd0  2007.1/i586/libjasper1.701_1-1.701.0-6.2mdv2007.1.i586.rpm
 9cb7006b790bf88bb947409a196d320f  2007.1/i586/libjasper1.701_1-devel-1.701.0-6.2mdv2007.1.i586.rpm
 37e418b847f994c430b4e2d015cde7cf  2007.1/i586/libjasper1.701_1-static-devel-1.701.0-6.2mdv2007.1.i586.rpm 
 5dce393b97e5e51dd2ab73a6e1bfc30a  2007.1/SRPMS/jasper-1.701.0-6.2mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64

 24e01092b065fa180cd0020c1560c481  2007.1/x86_64/jasper-1.701.0-6.2mdv2007.1.x86_64.rpm
 4d7e7a3479782ab99da344e958b06c97  2007.1/x86_64/lib64jasper1.701_1-1.701.0-6.2mdv2007.1.x86_64.rpm
 c05f8a80a9e0be928a148c48ac864299  2007.1/x86_64/lib64jasper1.701_1-devel-1.701.0-6.2mdv2007.1.x86_64.rpm
 7c30e7642ec228a728b4477ed2c3af02  2007.1/x86_64/lib64jasper1.701_1-static-devel-1.701.0-6.2mdv2007.1.x86_64.rpm 
 5dce393b97e5e51dd2ab73a6e1bfc30a  2007.1/SRPMS/jasper-1.701.0-6.2mdv2007.1.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2721

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.