Asterisk 1.6.1.25 Segmentation Fault (Core Dump)

Our server keeps on crashing and when I checked it is due to a core dump. I already enabled the back trace and here is the output… Can somebody help how to fix?

We are running CentOS 5.6
Asterisk 1.6.1.25

gdb output:

warning: no loadable sections found in added symbol-file system-supplied DSO at 0x7ffff99ea000
Core was generated by `/usr/sbin/asterisk -f -vvvg -c’.
Program terminated with signal 11, Segmentation fault.
#0 0x00000000004b30ab in process_events (s=0x43524e40) at manager.c:2682
2682 while ( (eqe = NEW_EVENT(s)) ) {

(gdb) bt
#0 0x00000000004b30ab in process_events (s=0x43524e40) at manager.c:2682
#1 0x00000000004b4808 in do_message (s=0x43524e40) at manager.c:3175
#2 0x00000000004b4d0d in session_do (data=0x2aaad80b55d8) at manager.c:3267
#3 0x000000000050e329 in handle_tcptls_connection (data=0x2aaad80b55d8) at tcptls.c:233
#4 0x000000000051b987 in dummy_start (data=0x2aaad803c9a0) at utils.c:967
#5 0x0000003168e0673d in start_thread () from /lib64/libpthread.so.0
#6 0x00000031686d40cd in clone () from /lib64/libc.so.6

(gdb) bt full
#0 0x00000000004b30ab in process_events (s=0x43524e40) at manager.c:2682
eqe = 0x2aaad40f1120
ret = 0
#1 0x00000000004b4808 in do_message (s=0x43524e40) at manager.c:3175
m = {hdrcount = 0, headers = {0x0 <repeats 128 times>}}
header_buf = ‘\000’ <repeats 1024 times>
res = 0
now = 1310503081
PRETTY_FUNCTION = “do_message”
#2 0x00000000004b4d0d in session_do (data=0x2aaad80b55d8) at manager.c:3267
ser = 0x2aaad80b55d8
session = 0x1d23f7a0
s = {session = 0x1d23f7a0, f = 0x0, fd = 0, write_error = 0}
flags = 2050
res = 0
PRETTY_FUNCTION = “session_do”
#3 0x000000000050e329 in handle_tcptls_connection (data=0x2aaad80b55d8) at tcptls.c:233
tcptls_session = 0x2aaad80b55d8
ssl_setup = 0x419338 SSL_accept@plt
ret = 0
err = “\000\000\000\000\000\000\000\000\370ORC”, ‘\000’ <repeats 16 times>, “\004\000\000\000 PRC”, ‘\000’ <repeats 16 times>, “\001”, ‘\000’ <repeats 19 times>"\340, \071\225h1", ‘\000’ <repeats 11 times>, “P\272@\035\000\000\000\000\260\345\001\000\000\000\000\000\340\071\225h1\000\000\000\030\000\000\000\000\000\000\000\255Jgh1\000\000\000\060PRC”, ‘\000’ <repeats 13 times>, “PRC”, ‘\000’ <repeats 12 times>, “\003\000\000\000\000\000\000\000\000\240\365A\000\000\000\000\000\020\000\000\000\000\000\000{\247Q”, ‘\000’ <repeats 13 times>"\352, “C”, ‘\000’ <repeats 13 times>"\240, \213T\000\000\000\000\000\000QRC]\001\000\000t\213T\000\000\000\000\000\030\000\000\000\000\000\000\000\352""…
PRETTY_FUNCTION = "handle_tcptls_connection"
cookie_funcs = {read = 0x50db8d <ssl_read>, write = 0x50dbc0 <ssl_write>, seek = 0, close = 0x50dbeb <ssl_close>}
#4 0x000000000051b987 in dummy_start (data=0x2aaad803c9a0) at utils.c:967
__cancel_buf = {__cancel_jmp_buf = {{__cancel_jmp_buf = {0, -4244134696651158704, 0, 3, 1106616320, 4096, -4244134696651159024, -4244134697775308002}, __mask_was_saved = 0}}, __pad = {0x435251a0,
0x0, 0x1cd25120, 0x0}}
__cancel_routine = 0x432599 <ast_unregister_thread>
__cancel_arg = 0x43525940
not_first_call = 0
ret = 0x316894e898
a = {start_routine = 0x50dd98 <handle_tcptls_connection>, data = 0x2aaad80b55d8, name = 0x2aaad80b4a40 “handle_tcptls_connection started at [ 280] tcptls.c ast_tcptls_server_root()”}
#5 0x0000003168e0673d in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#6 0x00000031686d40cd in clone () from /lib64/libc.so.6
No symbol table info available.