[asterisk-bugs] [Asterisk 0014286]: Crash on failure to execute SQL
Asterisk Bug Tracker
noreply at bugs.digium.com
Tue Jan 20 12:58:39 CST 2009
The following issue has been SUBMITTED.
======================================================================
http://bugs.digium.com/view.php?id=14286
======================================================================
Reported By: darren1713
Assigned To: Corydon76
======================================================================
Project: Asterisk
Issue ID: 14286
Category: Resources/res_odbc
Reproducibility: have not tried
Severity: minor
Priority: normal
Status: assigned
Asterisk Version: 1.4.22
Regression: No
SVN Branch (only for SVN checkouts, not tarball releases): N/A
SVN Revision (number only!):
Request Review:
======================================================================
Date Submitted: 2009-01-20 12:58 CST
Last Modified: 2009-01-20 12:58 CST
======================================================================
Summary: Crash on failure to execute SQL
Description:
* crashes when there is a SQL execute error.
I have attached a valgrind stack of the error. It is impossible to
reproduce in gdb because this error causes corrupted memory, which destroys
the stack in gdb.
In any case, the unixODBC code is very difficult to get a heads up on, but
I *think* that you cannot free the stmt if there was an error. I cannot
find any sample code to confirm this though...
Version is actually 1.4.22.1
======================================================================
Issue History
Date Modified Username Field Change
======================================================================
2009-01-20 12:58 darren1713 New Issue
2009-01-20 12:58 darren1713 Status new => assigned
2009-01-20 12:58 darren1713 Assigned To => Corydon76
2009-01-20 12:58 darren1713 Asterisk Version => 1.4.22
2009-01-20 12:58 darren1713 Regression => No
2009-01-20 12:58 darren1713 SVN Branch (only for SVN checkouts, not tarball
releases) => N/A
======================================================================
More information about the asterisk-bugs
mailing list