[asterisk-bugs] [Asterisk 0017255]: [patch] UDP ports not freed/ports leaking

Asterisk Bug Tracker noreply at bugs.digium.com
Mon Feb 7 00:47:23 CST 2011


A NOTE has been added to this issue. 
====================================================================== 
https://issues.asterisk.org/view.php?id=17255 
====================================================================== 
Reported By:                kvveltho
Assigned To:                
====================================================================== 
Project:                    Asterisk
Issue ID:                   17255
Category:                   Core/General
Reproducibility:            always
Severity:                   major
Priority:                   normal
Status:                     acknowledged
Asterisk Version:           1.6.2.7-rc2 
JIRA:                       SWP-1410 
Regression:                 No 
Reviewboard Link:            
SVN Branch (only for SVN checkouts, not tarball releases): N/A 
SVN Revision (number only!):  
Request Review:              
====================================================================== 
Date Submitted:             2010-04-28 06:23 CDT
Last Modified:              2011-02-07 00:47 CST
====================================================================== 
Summary:                    [patch] UDP ports not freed/ports leaking
Description: 
The following is not fixed:

These release candidates resolve an issue with UDP ports not being freed,
per
issue https://issues.asterisk.org/view.php?id=16774
(https://issues.asterisk.org/view.php?id=16774)

======================================================================
Relationships       ID      Summary
----------------------------------------------------------------------
related to          0016774 [patch] [regression] 1.6.1.13 and 1.6.1...
related to          0018121 Early bind of UDPTL ports can create a ...
====================================================================== 

---------------------------------------------------------------------- 
 (0131549) rgagnon (reporter) - 2011-02-07 00:47
 https://issues.asterisk.org/view.php?id=17255#c131549 
---------------------------------------------------------------------- 
Over the past week and a half or so, I have a working patch for this and
maybe other issues.

As the changes in chan_sip are kind of big, or spread out, I've uploaded a
readme file along with the four patch files for this fix.

See the "sip-dos-mem-leak-fix-readme.txt" file for a full explanation of
all the changes made in the patch files.

The patches related to this fix are now:
branch-1.6.1-r306540-sip-dos-mem-leak-fix.diff
branch-1.6.2-r306540-sip-dos-mem-leak-fix.diff
branch-1.8-r306540-sip-dos-mem-leak-fix.diff
trunk-r306540-sip-dos-mem-leak-fix.diff

They apply to the repos as named obviously.  They fix reference leaks
which lead to memory leaks, and denial of service.

I suggest you also apply the patch from
https://issues.asterisk.org/view.php?id=18758 if running 1.8 or newer as
it fixes the ability to get proper output from the refcounter utility which
I used excessively to find the bugs fixed in this patch.

This might allow closing of https://issues.asterisk.org/view.php?id=18704,
https://issues.asterisk.org/view.php?id=18121,
https://issues.asterisk.org/view.php?id=16774,
https://issues.asterisk.org/view.php?id=18014, and
https://issues.asterisk.org/view.php?id=18027,
and maybe others.

Prior this this patch, our production system running 1.6.2.16.1 would run
out of UDP ports within 20 minutes of operation, causing a massive denial
of service.  With this patch, we've been up and running for an unknown
number of hours without leaking ports, or memory, and without a denial of
service. 

Issue History 
Date Modified    Username       Field                    Change               
====================================================================== 
2011-02-07 00:47 rgagnon        Note Added: 0131549                          
======================================================================




More information about the asterisk-bugs mailing list