Bug 666854 - libical - buffer overflow
libical - buffer overflow
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: libical (Show other bugs)
Unspecified Unspecified
low Severity medium
: rc
: ---
Assigned To: Matthew Barnes
Desktop QE
: Patch
Depends On:
Blocks: 645519
  Show dependency treegraph
Reported: 2011-01-03 07:54 EST by ritz
Modified: 2017-12-06 07:18 EST (History)
0 users

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2017-12-06 07:18:36 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
patch based on upstream code (2.94 KB, patch)
2011-01-03 07:54 EST, ritz
no flags Details | Diff

  None (edit)
Description ritz 2011-01-03 07:54:36 EST
Created attachment 471478 [details]
patch based on upstream code

Description of problem:
buffer overflow

Additional info:
commit 64ca7f17bb63f2785997df4f440e24636c5cf9c1
Author: kecsup <kecsup@b29e25b1-4845-0410-9c6e-9608a45a5811>
Date:   Wed Feb 18 09:12:24 2009 +0000

    Ugly fix to avoid to write over the buffer
    git-svn-id: https://freeassociation.svn.sourceforge.net/svnroot/freeassociation/trunk@920 b29e25b1-4845-0410-9c6e-9608a45a5811

commit b2d45930d008361301a5447a6190900ffa54bf5d
Author: kecsup <kecsup@b29e25b1-4845-0410-9c6e-9608a45a5811>
Date:   Wed Feb 18 09:15:06 2009 +0000

    Other fixes to avoid overrun the buffer

commit 68eb70fff1c1bcd4bc7c6b8ec81d14f4adda9922
Author: kecsup <kecsup@b29e25b1-4845-0410-9c6e-9608a45a5811>
Date:   Wed Feb 18 09:19:27 2009 +0000

    On other fix to avoid buffer overflow attack
    git-svn-id: https://freeassociation.svn.sourceforge.net/svnroot/freeassociation/trunk@922 b29e25b1-4845-0410-9c6e-9608a45a5811

commit 9f3b4f26d2835607cfcbe442b03b499137119011
Author: kecsup <kecsup@b29e25b1-4845-0410-9c6e-9608a45a5811>
Date:   Wed Feb 18 09:23:37 2009 +0000

    Fix to avoid overrun the buffer
    git-svn-id: https://freeassociation.svn.sourceforge.net/svnroot/freeassociation/trunk@923 b29e25b1-4845-0410-9c6e-9608a45a5811
Comment 1 RHEL Product and Program Management 2011-01-07 10:48:29 EST
This request was evaluated by Red Hat Product Management for
inclusion in the current release of Red Hat Enterprise Linux.
Because the affected component is not scheduled to be updated
in the current release, Red Hat is unfortunately unable to
address this request at this time. Red Hat invites you to
ask your support representative to propose this request, if
appropriate and relevant, in the next release of Red Hat
Enterprise Linux. If you would like it considered as an
exception in the current release, please ask your support
Comment 2 Jan Kurik 2017-12-06 07:18:36 EST
Red Hat Enterprise Linux 6 is in the Production 3 Phase. During the Production 3 Phase, Critical impact Security Advisories (RHSAs) and selected Urgent Priority Bug Fix Advisories (RHBAs) may be released as they become available.

The official life cycle policy can be reviewed here:


This issue does not meet the inclusion criteria for the Production 3 Phase and will be marked as CLOSED/WONTFIX. If this remains a critical requirement, please contact Red Hat Customer Support to request a re-evaluation of the issue, citing a clear business justification. Note that a strong business justification will be required for re-evaluation. Red Hat Customer Support can be contacted via the Red Hat Customer Portal at the following URL:


Note You need to log in before you can comment on or make changes to this bug.