[asterisk-bugs] [Asterisk 0017774]: SIP peers memory leak

Asterisk Bug Tracker noreply at bugs.digium.com
Sat Jul 31 22:55:40 CDT 2010


The following issue has been SUBMITTED. 
====================================================================== 
https://issues.asterisk.org/view.php?id=17774 
====================================================================== 
Reported By:                kkm
Assigned To:                
====================================================================== 
Project:                    Asterisk
Issue ID:                   17774
Category:                   Channels/chan_sip/General
Reproducibility:            have not tried
Severity:                   major
Priority:                   normal
Status:                     new
Asterisk Version:           1.6.2.10 
JIRA:                        
Regression:                 No 
Reviewboard Link:            
SVN Branch (only for SVN checkouts, not tarball releases): N/A 
SVN Revision (number only!):  
Request Review:              
====================================================================== 
Date Submitted:             2010-07-31 22:55 CDT
Last Modified:              2010-07-31 22:55 CDT
====================================================================== 
Summary:                    SIP peers memory leak
Description: 
There is a memory leak associated with sip peer creation and destruction,
because of a bug in reference counting. Patch attached.
====================================================================== 

Issue History 
Date Modified    Username       Field                    Change               
====================================================================== 
2010-07-31 22:55 kkm            New Issue                                    
2010-07-31 22:55 kkm            Asterisk Version          => 1.6.2.10        
2010-07-31 22:55 kkm            Regression                => No              
2010-07-31 22:55 kkm            SVN Branch (only for SVN checkouts, not tarball
releases) => N/A             
======================================================================




More information about the asterisk-bugs mailing list