Re: [SR-Users] Auth_xkeys module - freeing already freed pointer

2018-12-06 Thread Daniel-Constantin Mierla
Hello,

ok, thanks for testing and reporting back. I will backport these days...

Cheers,
Daniel

On 06.12.18 15:26, José Seabra wrote:
> Hello Daniel,
> Thank you for the support.
>
> I confirm that your patch fixes the issue. 
>
> Best regards
> José
>
> Daniel-Constantin Mierla  > escreveu no dia terça, 4/12/2018 à(s) 10:19:
>
> Hello,
>
> can you try with master branch or with the patch from the next commit?
>
>   -
> 
> https://github.com/kamailio/kamailio/commit/01f5ecbc45c236daea62d6638a02c168720c8479
>
> If all is ok, I will backport.
>
> Cheers,
> Daniel
>
> On 04.12.18 10:12, José Seabra wrote:
>> Hello Henning,
>>
>> The function that seems to be causing this is "auth_xkeys_add".
>>
>> Let me know if do you need something else.
>>
>> Thank you for the support
>> José
>>
>> Henning Westerholt mailto:h...@kamailio.org>>
>> escreveu no dia segunda, 3/12/2018 à(s) 21:59:
>>
>> Am Montag, 3. Dezember 2018, 19:03:36 CET schrieb José Seabra:
>> > I'm constantly getting the following message when i'm using
>> module
>> > auth_xkeys.
>> >
>> >  CRITICAL:  [core/mem/q_malloc.c:514]: qm_free():
>> BUG: freeing
>> > already freed pointer (0x7f6310987400), called from core:
>> core/data_lump.c:
>> > free_lump(466), first free core: core/data_lump.c:
>> free_lump(466) - ignoring
>> >
>> >
>> > Apparently kamailio only throw this message but i would
>> like to know if its
>> > a normal protection from kamailio or it should be fixed?
>>
>> Hello Jose,
>>
>> this is not a normal error, it shows a redundant (double)
>> free which is
>> detected from the internal Kamailio memory manager. This
>> should be fixed.
>>
>> Can you investigate at which function call from the
>> auth_xkeys module in the
>> kamailio cfg this error is printed?
>>
>> Best regards,
>>
>> Henning
>>
>> -- 
>> Henning Westerholt - https://skalatan.de/blog/
>> Kamailio services - https://skalatan.de/services
>> Kamailio security assessment - https://skalatan.de/de/assessment
>>
>>
>>
>> -- 
>> Cumprimentos
>> José Seabra
>>
>> ___
>> Kamailio (SER) - Users Mailing List
>> sr-users@lists.kamailio.org 
>> https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users
>
> -- 
> Daniel-Constantin Mierla -- www.asipto.com 
> www.twitter.com/miconda  -- 
> www.linkedin.com/in/miconda 
> Kamailio World Conference -- www.kamailioworld.com 
> 
> Kamailio Advanced Training, Nov 12-14, 2018, in Berlin -- www.asipto.com 
> 
>
>
>
> -- 
> Cumprimentos
> José Seabra

-- 
Daniel-Constantin Mierla -- www.asipto.com
www.twitter.com/miconda -- www.linkedin.com/in/miconda
Kamailio World Conference -- www.kamailioworld.com
Kamailio Advanced Training, Nov 12-14, 2018, in Berlin -- www.asipto.com

___
Kamailio (SER) - Users Mailing List
sr-users@lists.kamailio.org
https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users


Re: [SR-Users] Auth_xkeys module - freeing already freed pointer

2018-12-06 Thread José Seabra
Hello Daniel,
Thank you for the support.

I confirm that your patch fixes the issue.

Best regards
José

Daniel-Constantin Mierla  escreveu no dia terça,
4/12/2018 à(s) 10:19:

> Hello,
>
> can you try with master branch or with the patch from the next commit?
>
>   -
> https://github.com/kamailio/kamailio/commit/01f5ecbc45c236daea62d6638a02c168720c8479
>
> If all is ok, I will backport.
>
> Cheers,
> Daniel
> On 04.12.18 10:12, José Seabra wrote:
>
> Hello Henning,
>
> The function that seems to be causing this is "auth_xkeys_add".
>
> Let me know if do you need something else.
>
> Thank you for the support
> José
>
> Henning Westerholt  escreveu no dia segunda, 3/12/2018
> à(s) 21:59:
>
>> Am Montag, 3. Dezember 2018, 19:03:36 CET schrieb José Seabra:
>> > I'm constantly getting the following message when i'm using module
>> > auth_xkeys.
>> >
>> >  CRITICAL:  [core/mem/q_malloc.c:514]: qm_free(): BUG: freeing
>> > already freed pointer (0x7f6310987400), called from core:
>> core/data_lump.c:
>> > free_lump(466), first free core: core/data_lump.c: free_lump(466) -
>> ignoring
>> >
>> >
>> > Apparently kamailio only throw this message but i would like to know if
>> its
>> > a normal protection from kamailio or it should be fixed?
>>
>> Hello Jose,
>>
>> this is not a normal error, it shows a redundant (double) free which is
>> detected from the internal Kamailio memory manager. This should be fixed.
>>
>> Can you investigate at which function call from the auth_xkeys module in
>> the
>> kamailio cfg this error is printed?
>>
>> Best regards,
>>
>> Henning
>>
>> --
>> Henning Westerholt - https://skalatan.de/blog/
>> Kamailio services - https://skalatan.de/services
>> Kamailio security assessment - https://skalatan.de/de/assessment
>>
>
>
> --
> Cumprimentos
> José Seabra
>
> ___
> Kamailio (SER) - Users Mailing 
> Listsr-users@lists.kamailio.orghttps://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users
>
> --
> Daniel-Constantin Mierla -- www.asipto.comwww.twitter.com/miconda -- 
> www.linkedin.com/in/miconda
> Kamailio World Conference -- www.kamailioworld.com
> Kamailio Advanced Training, Nov 12-14, 2018, in Berlin -- www.asipto.com
>
>

-- 
Cumprimentos
José Seabra
___
Kamailio (SER) - Users Mailing List
sr-users@lists.kamailio.org
https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users


Re: [SR-Users] Auth_xkeys module - freeing already freed pointer

2018-12-04 Thread Daniel-Constantin Mierla
Hello,

can you try with master branch or with the patch from the next commit?

  -
https://github.com/kamailio/kamailio/commit/01f5ecbc45c236daea62d6638a02c168720c8479

If all is ok, I will backport.

Cheers,
Daniel

On 04.12.18 10:12, José Seabra wrote:
> Hello Henning,
>
> The function that seems to be causing this is "auth_xkeys_add".
>
> Let me know if do you need something else.
>
> Thank you for the support
> José
>
> Henning Westerholt mailto:h...@kamailio.org>> escreveu
> no dia segunda, 3/12/2018 à(s) 21:59:
>
> Am Montag, 3. Dezember 2018, 19:03:36 CET schrieb José Seabra:
> > I'm constantly getting the following message when i'm using module
> > auth_xkeys.
> >
> >  CRITICAL:  [core/mem/q_malloc.c:514]: qm_free(): BUG: freeing
> > already freed pointer (0x7f6310987400), called from core:
> core/data_lump.c:
> > free_lump(466), first free core: core/data_lump.c:
> free_lump(466) - ignoring
> >
> >
> > Apparently kamailio only throw this message but i would like to
> know if its
> > a normal protection from kamailio or it should be fixed?
>
> Hello Jose,
>
> this is not a normal error, it shows a redundant (double) free
> which is
> detected from the internal Kamailio memory manager. This should be
> fixed.
>
> Can you investigate at which function call from the auth_xkeys
> module in the
> kamailio cfg this error is printed?
>
> Best regards,
>
> Henning
>
> -- 
> Henning Westerholt - https://skalatan.de/blog/
> Kamailio services - https://skalatan.de/services
> Kamailio security assessment - https://skalatan.de/de/assessment
>
>
>
> -- 
> Cumprimentos
> José Seabra
>
> ___
> Kamailio (SER) - Users Mailing List
> sr-users@lists.kamailio.org
> https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users

-- 
Daniel-Constantin Mierla -- www.asipto.com
www.twitter.com/miconda -- www.linkedin.com/in/miconda
Kamailio World Conference -- www.kamailioworld.com
Kamailio Advanced Training, Nov 12-14, 2018, in Berlin -- www.asipto.com

___
Kamailio (SER) - Users Mailing List
sr-users@lists.kamailio.org
https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users


Re: [SR-Users] Auth_xkeys module - freeing already freed pointer

2018-12-04 Thread José Seabra
Hello Henning,

The function that seems to be causing this is "auth_xkeys_add".

Let me know if do you need something else.

Thank you for the support
José

Henning Westerholt  escreveu no dia segunda, 3/12/2018
à(s) 21:59:

> Am Montag, 3. Dezember 2018, 19:03:36 CET schrieb José Seabra:
> > I'm constantly getting the following message when i'm using module
> > auth_xkeys.
> >
> >  CRITICAL:  [core/mem/q_malloc.c:514]: qm_free(): BUG: freeing
> > already freed pointer (0x7f6310987400), called from core:
> core/data_lump.c:
> > free_lump(466), first free core: core/data_lump.c: free_lump(466) -
> ignoring
> >
> >
> > Apparently kamailio only throw this message but i would like to know if
> its
> > a normal protection from kamailio or it should be fixed?
>
> Hello Jose,
>
> this is not a normal error, it shows a redundant (double) free which is
> detected from the internal Kamailio memory manager. This should be fixed.
>
> Can you investigate at which function call from the auth_xkeys module in
> the
> kamailio cfg this error is printed?
>
> Best regards,
>
> Henning
>
> --
> Henning Westerholt - https://skalatan.de/blog/
> Kamailio services - https://skalatan.de/services
> Kamailio security assessment - https://skalatan.de/de/assessment
>


-- 
Cumprimentos
José Seabra
___
Kamailio (SER) - Users Mailing List
sr-users@lists.kamailio.org
https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users


Re: [SR-Users] Auth_xkeys module - freeing already freed pointer

2018-12-03 Thread Henning Westerholt
Am Montag, 3. Dezember 2018, 19:03:36 CET schrieb José Seabra:
> I'm constantly getting the following message when i'm using module
> auth_xkeys.
> 
>  CRITICAL:  [core/mem/q_malloc.c:514]: qm_free(): BUG: freeing
> already freed pointer (0x7f6310987400), called from core: core/data_lump.c:
> free_lump(466), first free core: core/data_lump.c: free_lump(466) - ignoring
> 
> 
> Apparently kamailio only throw this message but i would like to know if its
> a normal protection from kamailio or it should be fixed?

Hello Jose,

this is not a normal error, it shows a redundant (double) free which is 
detected from the internal Kamailio memory manager. This should be fixed.

Can you investigate at which function call from the auth_xkeys module in the 
kamailio cfg this error is printed?

Best regards,

Henning

-- 
Henning Westerholt - https://skalatan.de/blog/
Kamailio services - https://skalatan.de/services
Kamailio security assessment - https://skalatan.de/de/assessment

___
Kamailio (SER) - Users Mailing List
sr-users@lists.kamailio.org
https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users