THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.
The following task has a new comment added:
FS#173 - Double Free -- Crash/Coredump and possible security vulnerability User who did this - Bayan Towfiq (btowfiq)
---------- Yes I'm running the latest 3.2 branch with recompiled kamailio. it includes your commits to the dialog module:
root@guru:/usr/local/etc/kamailio# kamailio -V version: kamailio 3.2.0 (x86_64/linux) baed41-dirty flags: STATS: Off, USE_IPV6, USE_TCP, USE_TLS, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, DBG_QM_MALLOC, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 4MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: baed41 -dirty compiled on 02:47:08 Nov 8 2011 with gcc 4.4.3
I'm not using CDR generation or ACC module in this config.
I am using the dialog module to terminate calls (Inject BYEs) with RPC commands using dialog hashes.
In the script I use dialog variables for h_entry and h_id and for setting dlg_ctx(timeout_bye): $avp(hash_entry) = $dlg(h_entry); $avp(hash_id) = $dlg(h_id); $dlg_ctx(timeout_bye) = 1;
I also use the dlg_manage() function from the config.
For the dlg_match_mode I use modparam("dialog", "dlg_match_mode", 2)
----------
More information can be found at the following URL: http://sip-router.org/tracker/index.php?do=details&task_id=173#comment34...
You are receiving this message because you have requested it from the Flyspray bugtracking system. If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.