[asterisk-bugs] [Asterisk 0015103]: [patch] At the end of an attended transfered, on hangup, Asterisk crashes.
Asterisk Bug Tracker
noreply at bugs.digium.com
Thu May 14 16:22:03 CDT 2009
The following issue has been ASSIGNED.
======================================================================
https://issues.asterisk.org/view.php?id=15103
======================================================================
Reported By: lmsteffan
Assigned To: russell
======================================================================
Project: Asterisk
Issue ID: 15103
Category: Features/Parking
Reproducibility: always
Severity: crash
Priority: normal
Status: assigned
Asterisk Version: SVN
Regression: No
SVN Branch (only for SVN checkouts, not tarball releases): trunk
SVN Revision (number only!): 194424
Request Review:
======================================================================
Date Submitted: 2009-05-13 22:00 CDT
Last Modified: 2009-05-14 16:22 CDT
======================================================================
Summary: [patch] At the end of an attended transfered, on
hangup, Asterisk crashes.
Description:
The crash occurs after the following sequence of actions :
A calls B, B puts A on hold and calls C, then B transfers the call from A
to C (and hangups). C talks with A. When C hangs up, Asterisk crashes with
a message "ERROR[4596] astobj2.c: user_data is NULL". Debugger shows that
this message is followed by a segmentation error.
The cause of this unseemly behaviour is a pointer first initialized to
NULL, then not modified when it should due to an assignement that has
become an equality. The included patch corrects this.
======================================================================
Issue History
Date Modified Username Field Change
======================================================================
2009-05-14 16:22 russell Status new => assigned
2009-05-14 16:22 russell Assigned To => russell
======================================================================
More information about the asterisk-bugs
mailing list