[asterisk-bugs] [JIRA] (ASTERISK-28194) chan_sip: Leak using contact ACL

Asterisk Team (JIRA) noreply at issues.asterisk.org
Wed Dec 19 11:07:50 CST 2018


     [ https://issues.asterisk.org/jira/browse/ASTERISK-28194?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Asterisk Team updated ASTERISK-28194:
-------------------------------------

    Target Release Version/s: 13.25.0

> chan_sip: Leak using contact ACL
> --------------------------------
>
>                 Key: ASTERISK-28194
>                 URL: https://issues.asterisk.org/jira/browse/ASTERISK-28194
>             Project: Asterisk
>          Issue Type: Bug
>      Security Level: None
>          Components: Channels/chan_sip/General
>    Affects Versions: 13.12.2, 13.18.4, 13.21.1
>            Reporter: Giuseppe Sucameli
>            Assignee: Giuseppe Sucameli
>      Target Release: 13.25.0
>
>
> There's a leak using peer's contact ACL.
> Every time the {{build_peer()}} method is called (es. during a SIP module reload) the {{peer->contactacl}} that contains the contact ACL is overwritten without destroying the previous list.



--
This message was sent by Atlassian JIRA
(v6.2#6252)



More information about the asterisk-bugs mailing list