[asterisk-bugs] [JIRA] (ASTERISK-28194) chan_sip: Leak using contact ACL
Asterisk Team (JIRA)
noreply at issues.asterisk.org
Wed Dec 19 11:15:49 CST 2018
[ https://issues.asterisk.org/jira/browse/ASTERISK-28194?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Asterisk Team updated ASTERISK-28194:
-------------------------------------
Target Release Version/s: 16.2.0
> chan_sip: Leak using contact ACL
> --------------------------------
>
> Key: ASTERISK-28194
> URL: https://issues.asterisk.org/jira/browse/ASTERISK-28194
> Project: Asterisk
> Issue Type: Bug
> Security Level: None
> Components: Channels/chan_sip/General
> Affects Versions: 13.12.2, 13.18.4, 13.21.1
> Reporter: Giuseppe Sucameli
> Assignee: Giuseppe Sucameli
> Target Release: 13.25.0, 16.2.0
>
>
> There's a leak using peer's contact ACL.
> Every time the {{build_peer()}} method is called (es. during a SIP module reload) the {{peer->contactacl}} that contains the contact ACL is overwritten without destroying the previous list.
--
This message was sent by Atlassian JIRA
(v6.2#6252)
More information about the asterisk-bugs
mailing list