Open
Description
Backtrace from some system, running Asterisk 18.13.0, built 2022-07-30:
#1 0x00007fcaaa494537 in __GI_abort () at abort.c:79
save_stage = 1
act = {__sigaction_handler = {sa_handler = 0x7fca81bae118, sa_sigaction = 0x7fca81bae118}, sa_mask = {__val = {13961818710507735296, 140508110961184, 140507736629632, 140508110954439, 139>
sigs = {__val = {32, 0 <repeats 15 times>}}
#2 0x00007fcaaa4ec3a8 in __libc_message (action=action@entry=do_abort, fmt=fmt@entry=0x7fcaaa60a390 "%sn") at ../sysdeps/posix/libc_fatal.c:155
ap = {{gp_offset = 24, fp_offset = 4294967295, overflow_arg_area = 0x7fca81bae2b0, reg_save_area = 0x7fca81bae240}}
fd = <optimized out>
list = <optimized out>
nlist = <optimized out>
cp = <optimized out>
#3 0x00007fcaaa4f369a in malloc_printerr (str=str@entry=0x7fcaaa60c6b0 "free(): double free detected in tcache 2") at malloc.c:5347
#4 0x00007fcaaa4f4c95 in _int_free (av=0x7fca98000020, p=0x7fca980a9da0, have_lock=0) at malloc.c:4201
tmp = <optimized out>
e = 0x7fca980a9db0
tc_idx = 32
size = 544
fb = <optimized out>
nextchunk = <optimized out>
nextsize = <optimized out>
nextinuse = <optimized out>
prevsize = <optimized out>
bck = <optimized out>
fwd = <optimized out>
__PRETTY_FUNCTION__ = "_int_free"
#5 0x00007fca8821ac02 in verify_exec (chan=0x55899e4a28a0, data=<optimized out>) at app_verify.c:1549
v = <optimized out>
vresult = <optimized out>
argstr = <optimized out>
callerid = 0x55899e4ae3a0 "REDACTED"
strbuf = 0x7fca980a9db0
blacklisted = 0
success = <optimized out>
curl = <optimized out>
method = <optimized out>
extendtrust = <optimized out>
allowtoken = <optimized out>
sanitychecks = <optimized out>
threshold = <optimized out>
blacklist_failopen = <optimized out>
name = "pstn-us", '000' <repeats 72 times>
verifyrequest = '000' <repeats 4095 times>
verifycontext = "pstn-us-verify-patterns", '000' <repeats 56 times>
local_var = "__clidverif", '000' <repeats 68 times>
stirshaken_var = "__ssverstat", '000' <repeats 68 times>
remote_stirshaken_var = '000' <repeats 79 times>
remote_var = '000' <repeats 79 times>
via_remote_var = '000' <repeats 79 times>
token_remote_var = '000' <repeats 79 times>
validatetokenrequest = '000' <repeats 4095 times>
code_good = '000' <repeats 4095 times>
code_fail = "32", '000' <repeats 4093 times>
code_spoof = '000' <repeats 4095 times>
exceptioncontext = '000' <repeats 848 times>...
setinvars = '000' <repeats 3504 times>...
failgroup = "spam", '000' <repeats 3500 times>...
failureaction = '000' <repeats 1088 times>...
failurefile = '000' <repeats 3592 times>...
failurelocation = "000000000000000000000000p002t230312177", '000' <repeats 130 times>, "210000000000000000000000윋213312177000000000000000000000000000000370X217213312177000000026000000000>
successregex = "[0-9]0000000203234273201312177000000360000177252312177000000000241273201312177", '000' <repeats 42 times>, " 000000000060000000000Т273201312177000000000242273201312177", '>
blacklist_endpoint = "REDACTED", '000' <repeats 3900 times>...
loglevel = '000' <repeats 79 times>
logmsg = "000ER(0-9,${EXTEN:-10})}&cnam=${cnamencoded})", '000' <repeats 1269 times>...
blacklist_threshold = <optimized out>
args = {argc = 1, {argv = {0x7fca81bae360 "pstn-us", 0x0}, {profile = 0x7fca81bae360 "pstn-us", against = 0x0}}}
__FUNCTION__ = "verify_exec"
__PRETTY_FUNCTION__ = "verify_exec"
#6 0x000055899cf60848 in pbx_exec (c=c@entry=0x55899e4a28a0, app=app@entry=0x55899ddf20d0, data=data@entry=0x7fca81bbec30 "pstn-us") at pbx_app.c:492