[asterisk-bugs] [Asterisk 0019350]: [patch] Crash in chan_sip -- sip_setoption()
Asterisk Bug Tracker
noreply at bugs.digium.com
Mon May 23 20:01:11 CDT 2011
A NOTE has been added to this issue.
======================================================================
https://issues.asterisk.org/view.php?id=19350
======================================================================
Reported By: kobaz
Assigned To:
======================================================================
Project: Asterisk
Issue ID: 19350
Category: Channels/chan_sip/General
Reproducibility: sometimes
Severity: crash
Priority: normal
Status: new
Asterisk Version: 1.8.4
JIRA:
Regression: No
Reviewboard Link:
SVN Branch (only for SVN checkouts, not tarball releases): N/A
SVN Revision (number only!):
Request Review:
======================================================================
Date Submitted: 2011-05-23 17:00 CDT
Last Modified: 2011-05-23 20:01 CDT
======================================================================
Summary: [patch] Crash in chan_sip -- sip_setoption()
Description:
If the sip private structure is null, sip_setoption() will defref the null
pointer and crash.
I don't know what the exact fix would be, but a stopgap would prevent a
crash here.
Possibly all the operations on sip private structures should check their
pointer first?
======================================================================
----------------------------------------------------------------------
(0135317) elguero (reporter) - 2011-05-23 20:01
https://issues.asterisk.org/view.php?id=19350#c135317
----------------------------------------------------------------------
I think this may be a duplicate of
https://issues.asterisk.org/view.php?id=18732. Can you confirm if it is? If
so, then a bug marshal can add a relation to that issue.
Issue History
Date Modified Username Field Change
======================================================================
2011-05-23 20:01 elguero Note Added: 0135317
======================================================================
More information about the asterisk-bugs
mailing list