From 1948fbe4392abe303c55fded97fbdf73367722cd Mon Sep 17 00:00:00 2001 From: George Joseph Date: Fri, 21 Sep 2018 14:23:34 -0600 Subject: [PATCH] channel.c: Address stack overflow in does_id_conflict() does_id_conflict() was passing a pointer to an int to a callback that expected a pointer to a size_t. Found by the Address Sanitizer. Change-Id: I0ff542067eef63a14a60301654d65d34fe2ad503 --- main/channel.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/main/channel.c b/main/channel.c index ca50d4651c..5fc9cd83a3 100644 --- a/main/channel.c +++ b/main/channel.c @@ -771,7 +771,7 @@ static int ast_channel_by_uniqueid_cb(void *obj, void *arg, void *data, int flag static int does_id_conflict(const char *uniqueid) { struct ast_channel *conflict; - int length = 0; + size_t length = 0; if (ast_strlen_zero(uniqueid)) { return 0; -- 2.47.2