[SR-Users] Kamailio 5.5 TLS critical log in Debian 11

Matthias Urlichs matthias at urlichs.de
Fri Mar 11 11:34:31 CET 2022


On 11.03.22 11:14, Daniel-Constantin Mierla wrote:
> Double frees are safe for kamailio

until they are not, i.e. when (not if) something else manages to 
allocate the memory in question before the second "free" comes along, 
you have a problem.

How to proceed: replace the

         shm_free(ptr);

at line 323 of tls_init.c with its macro expansion, i.e.

         _shm_root.xfree(_shm_root.mem_block, (p), "shm", fname, fline, 
"tls")

(or something along these lines) so that you get some idea of where 
these "shm_free" calls originate.

This probably should also be done for the calls to malloc and realloc. 
There's no good reason to throw away the debug information.

-- 
-- regards
-- 
-- Matthias Urlichs

-------------- next part --------------
A non-text attachment was scrubbed...
Name: matthias.vcf
Type: text/x-vcard
Size: 4 bytes
Desc: not available
URL: <http://lists.kamailio.org/pipermail/sr-users/attachments/20220311/f3d1f34e/attachment.vcf>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 840 bytes
Desc: OpenPGP digital signature
URL: <http://lists.kamailio.org/pipermail/sr-users/attachments/20220311/f3d1f34e/attachment.sig>


More information about the sr-users mailing list