[asterisk-bugs] [Asterisk 0019369]: [patch] Invalid read and null pointer deref on asterisk shutdown

Asterisk Bug Tracker noreply at bugs.digium.com
Thu May 26 02:17:09 CDT 2011


A NOTE has been added to this issue. 
====================================================================== 
https://issues.asterisk.org/view.php?id=19369 
====================================================================== 
Reported By:                kobaz
Assigned To:                
====================================================================== 
Project:                    Asterisk
Issue ID:                   19369
Category:                   Core/General
Reproducibility:            sometimes
Severity:                   minor
Priority:                   normal
Status:                     new
Asterisk Version:           1.8.4 
JIRA:                        
Regression:                 No 
Reviewboard Link:            
SVN Branch (only for SVN checkouts, not tarball releases): N/A 
SVN Revision (number only!):  
Request Review:              
====================================================================== 
Date Submitted:             2011-05-26 00:45 CDT
Last Modified:              2011-05-26 02:17 CDT
====================================================================== 
Summary:                    [patch] Invalid read and null pointer deref on
asterisk shutdown
Description: 
==10244== Thread 1:
==10244== Invalid read of size 4
==10244==    at 0x81962B0: el_gets (read.c:254)
==10244==    by 0x80859D1: main (asterisk.c:3861)
==10244==  Address 0x4515d54 is 68 bytes inside a block of size 776
free'd
==10244==    at 0x402421C: free (vg_replace_malloc.c:366)
==10244==    by 0x8194249: el_end (el.c:126)
==10244==    by 0x807EB77: quit_handler (asterisk.c:1659)
==10244==    by 0x80830CF: monitor_sig_flags (asterisk.c:3089)
==10244==    by 0x818B1B3: dummy_start (utils.c:973)
==10244==    by 0x4462C38: start_thread (pthread_create.c:304)
==10244==    by 0x42A28ED: clone (clone.S:130)
==10244==
==10244== Invalid read of size 4
==10244==    at 0x81962C5: el_gets (read.c:258)
==10244==    by 0x80859D1: main (asterisk.c:3861)
==10244==  Address 0x4515fb0 is 672 bytes inside a block of size 776
free'd
==10244==    at 0x402421C: free (vg_replace_malloc.c:366)
==10244==    by 0x8194249: el_end (el.c:126)
==10244==    by 0x807EB77: quit_handler (asterisk.c:1659)
==10244==    by 0x80830CF: monitor_sig_flags (asterisk.c:3089)
==10244==    by 0x818B1B3: dummy_start (utils.c:973)
==10244==    by 0x4462C38: start_thread (pthread_create.c:304)
==10244==    by 0x42A28ED: clone (clone.S:130)
==10244==
==10244== Invalid read of size 1
==10244==    at 0x81962CB: el_gets (read.c:258)
==10244==    by 0x80859D1: main (asterisk.c:3861)
==10244==  Address 0xa is not stack'd, malloc'd or (recently) free'd
==10244==
==10244==
==10244== Process terminating with default action of signal 11 (SIGSEGV):
dumping core
==10244==  Access not within mapped region at address 0xA
==10244==    at 0x81962CB: el_gets (read.c:258)
==10244==    by 0x80859D1: main (asterisk.c:3861)

======================================================================
Relationships       ID      Summary
----------------------------------------------------------------------
related to          0017698 CTRL-C from asterisk -vvvvvvvvc has str...
====================================================================== 

---------------------------------------------------------------------- 
 (0135420) kobaz (developer) - 2011-05-26 02:17
 https://issues.asterisk.org/view.php?id=19369#c135420 
---------------------------------------------------------------------- 
Yeah, I wasn't sure if it was truly fixed because there's no locking
involved.  I'll check out that other patch.  Thanks. 

Issue History 
Date Modified    Username       Field                    Change               
====================================================================== 
2011-05-26 02:17 kobaz          Note Added: 0135420                          
======================================================================




More information about the asterisk-bugs mailing list