[asterisk-bugs] [Asterisk 0013715]: [patch] Using SIP_HEADER in AMI with NULL channel causes crash
Asterisk Bug Tracker
noreply at bugs.digium.com
Thu Oct 16 18:39:50 CDT 2008
A NOTE has been added to this issue.
======================================================================
http://bugs.digium.com/view.php?id=13715
======================================================================
Reported By: makoto
Assigned To:
======================================================================
Project: Asterisk
Issue ID: 13715
Category: Channels/chan_sip/General
Reproducibility: always
Severity: minor
Priority: normal
Status: new
Asterisk Version: 1.4.22
SVN Branch (only for SVN checkouts, not tarball releases): N/A
SVN Revision (number only!):
Disclaimer on File?: N/A
Request Review:
======================================================================
Date Submitted: 2008-10-16 03:58 CDT
Last Modified: 2008-10-16 18:39 CDT
======================================================================
Summary: [patch] Using SIP_HEADER in AMI with NULL channel
causes crash
Description:
Connect to AMI, then send the following lines.
So asterisk will crash.
Action: GetVar
Channel:
Variable: SIP_HEADER(P-Called-Party-ID)
I have tested only on 1.2, but I believe that it happens on 1.4 or later.
Attached patch will fix the problem.
======================================================================
----------------------------------------------------------------------
(0093866) putnopvut (administrator) - 2008-10-16 18:39
http://bugs.digium.com/view.php?id=13715#c93866
----------------------------------------------------------------------
Updated the bug to indicate that this is a problem in 1.4.
Issue History
Date Modified Username Field Change
======================================================================
2008-10-16 18:39 putnopvut Asterisk Version 1.2.X => 1.4.22
2008-10-16 18:39 putnopvut Note Added: 0093866
======================================================================
More information about the asterisk-bugs
mailing list