Hi, Dave!

Can you please open a pull request in github[1] with this fix?

[1] https://github.com/OpenSIPS/opensips

Thanks!

Răzvan Crainea
OpenSIPS Solutions
www.opensips-solutions.com

On 12/11/2014 05:40 PM, Sidwell, David wrote:

I have discovered a bug in the 1.11 RTPProxy Module when using IPv6 addressing.

When the command to RTPProxy is discovered to contain an IPv6 address in “rtpproxy.c” function:

“int force_rtp_proxy_body(struct sip_msg* msg, struct force_rtpp_args *args, pv_spec_p var)”

The option “6” is appended to the options being passed to RTP Proxy, however the length component within the I/O vector is not increased.

Therefore the option is not detected by the RTPProxy process and the IPv6 is not preloaded which can result in an RTP Proxy deadlock.

@Line 3725 (rtpproxy.c)

            /* XXX must compare address families in all addresses */

            if (pf == AF_INET6) {

                if (append_opts(&opts, '6') == -1) {

                    LM_ERR("out of pkg memory\n");

                    goto error;

                }

è //DAVES - Accommodate new opts length

è v[1].iov_len++;

            }

I have currently added the above change to my opensips source code in order to work past this problem.

Regards.

Dave



_______________________________________________
Users mailing list
[email protected]
http://lists.opensips.org/cgi-bin/mailman/listinfo/users

_______________________________________________
Users mailing list
[email protected]
http://lists.opensips.org/cgi-bin/mailman/listinfo/users

Reply via email to