[asterisk-bugs] [Asterisk 0015788]: Hard crash in send_packet (Asterisk 1.2.33-BRIstuffed-0.3.0-PRE-1y-u)

Asterisk Bug Tracker noreply at bugs.digium.com
Fri Aug 28 11:00:42 CDT 2009


The following issue has been RESOLVED. 
====================================================================== 
https://issues.asterisk.org/view.php?id=15788 
====================================================================== 
Reported By:                tomsullivan
Assigned To:                qwell
====================================================================== 
Project:                    Asterisk
Issue ID:                   15788
Category:                   Channels/chan_iax2
Reproducibility:            random
Severity:                   crash
Priority:                   normal
Status:                     resolved
Asterisk Version:           1.2.X 
Regression:                 No 
SVN Branch (only for SVN checkouts, not tarball releases): N/A 
SVN Revision (number only!):  
Request Review:              
Resolution:                 won't fix
Fixed in Version:           
====================================================================== 
Date Submitted:             2009-08-27 23:42 CDT
Last Modified:              2009-08-28 11:00 CDT
====================================================================== 
Summary:                    Hard crash in send_packet (Asterisk
1.2.33-BRIstuffed-0.3.0-PRE-1y-u)
Description: 
Asterisk has hard crashed. The pertinent stack trace line is:
https://issues.asterisk.org/view.php?id=0  0x00007fbe772fb48b in send_packet
(f=0x7fbe6dd7e960) at
chan_iax2.c:1760
poking around in the source from gdb:

(gdb) p f->callno
$1 = 12554
(gdb) p iaxs[f->callno]
$2 = (struct chan_iax2_pvt *) 0x0

Which is the obvious culprit.

This seems odd given that only 9 lines earlier (chan_iax2.c:1751):

if (!iaxs[f->callno])

So the iaxs array seems to have been modified in the intervening time.

As noted in the title, the version we are running is:

Asterisk 1.2.33-BRIstuffed-0.3.0-PRE-1y-u
====================================================================== 

---------------------------------------------------------------------- 
 (0109790) qwell (administrator) - 2009-08-28 11:00
 https://issues.asterisk.org/view.php?id=15788#c109790 
---------------------------------------------------------------------- 
1.2 is in security release maintenance mode.  It will only receive security
fixes.

Additionally, BRIstuffed patches are unsupported here. 

Issue History 
Date Modified    Username       Field                    Change               
====================================================================== 
2009-08-28 11:00 qwell          Note Added: 0109790                          
2009-08-28 11:00 qwell          Status                   new => resolved     
2009-08-28 11:00 qwell          Resolution               open => won't fix   
2009-08-28 11:00 qwell          Assigned To               => qwell           
======================================================================




More information about the asterisk-bugs mailing list