[asterisk-bugs] [Asterisk 0018845]: [patch] TCP TLS session open failure dumps core
Asterisk Bug Tracker
noreply at bugs.digium.com
Mon Feb 28 18:09:55 CST 2011
A NOTE has been added to this issue.
======================================================================
https://issues.asterisk.org/view.php?id=18845
======================================================================
Reported By: cmaj
Assigned To:
======================================================================
Project: Asterisk
Issue ID: 18845
Category: Channels/chan_sip/TCP-TLS
Reproducibility: random
Severity: crash
Priority: normal
Status: ready for review
Asterisk Version: 1.8.3-rc2
JIRA: SWP-3162
Regression: No
Reviewboard Link:
SVN Branch (only for SVN checkouts, not tarball releases): N/A
SVN Revision (number only!):
Request Review:
======================================================================
Date Submitted: 2011-02-19 12:54 CST
Last Modified: 2011-02-28 18:09 CST
======================================================================
Summary: [patch] TCP TLS session open failure dumps core
Description:
I don't have TLS enabled anywhere (seems to be off by default in all
modules) but got a couple dumps lately in the TLS layer!
Attached patch should help fix.
======================================================================
----------------------------------------------------------------------
(0132462) cmaj (reporter) - 2011-02-28 18:09
https://issues.asterisk.org/view.php?id=18845#c132462
----------------------------------------------------------------------
Another corner case corrected in "take3" patch, when setvbuf() returns
non-zero it should be handled properly.
Testers should now apply the last 3 patches, in order. (The first patch
"patch-main-tcptls-1.8.3-rc2-open-session-crash.diff.txt" should be
ignored.)
Issue History
Date Modified Username Field Change
======================================================================
2011-02-28 18:09 cmaj Note Added: 0132462
======================================================================
More information about the asterisk-bugs
mailing list