[asterisk-bugs] [Asterisk 0017677]: [patch] Core dump when loading sip peers
Asterisk Bug Tracker
noreply at bugs.digium.com
Fri Jul 23 20:42:41 CDT 2010
A NOTE has been added to this issue.
======================================================================
https://issues.asterisk.org/view.php?id=17677
======================================================================
Reported By: outcast
Assigned To:
======================================================================
Project: Asterisk
Issue ID: 17677
Category: Channels/chan_sip/General
Reproducibility: have not tried
Severity: crash
Priority: normal
Status: new
Asterisk Version: SVN
JIRA:
Regression: No
Reviewboard Link:
SVN Branch (only for SVN checkouts, not tarball releases): trunk
SVN Revision (number only!): 278131
Request Review:
======================================================================
Date Submitted: 2010-07-20 14:20 CDT
Last Modified: 2010-07-23 20:42 CDT
======================================================================
Summary: [patch] Core dump when loading sip peers
Description:
When I load the following peer asterisk core dumps
[sip.broadvoice.com]
type=peer
user=phone
host=sip.broadvoice.com
fromdomain=sip.broadvoice.com
fromuser=4137711403
secret=xxxxxx
username=4137711403
insecure=port,invite
context=from-broadvoice
authname=4137711403
fromsipuri=sip:4137711403 at sip.broadvoice.com
dtmfmode=inband
dtmf=inband
;Disable canreinvite if you are behind a NAT
canreinvite=no
nat=no
======================================================================
----------------------------------------------------------------------
(0124932) pabelanger (manager) - 2010-07-23 20:42
https://issues.asterisk.org/view.php?id=17677#c124932
----------------------------------------------------------------------
Thanks for the feedback, we should be able to continue the triage.
Issue History
Date Modified Username Field Change
======================================================================
2010-07-23 20:42 pabelanger Note Added: 0124932
======================================================================
More information about the asterisk-bugs
mailing list