From 670fbbd702da58dbfb89708a36e1901172481b9f Mon Sep 17 00:00:00 2001 From: George Joseph Date: Fri, 21 Sep 2018 14:23:34 -0600 Subject: [PATCH] channel.c: Address stack overflow in does_id_conflict() does_id_conflict() was passing a pointer to an int to a callback that expected a pointer to a size_t. Found by the Address Sanitizer. Change-Id: I0ff542067eef63a14a60301654d65d34fe2ad503 --- main/channel.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/main/channel.c b/main/channel.c index 8e552876a0..645bf3943f 100644 --- a/main/channel.c +++ b/main/channel.c @@ -763,7 +763,7 @@ static int ast_channel_by_uniqueid_cb(void *obj, void *arg, void *data, int flag static int does_id_conflict(const char *uniqueid) { struct ast_channel *conflict; - int length = 0; + size_t length = 0; if (ast_strlen_zero(uniqueid)) { return 0; -- 2.47.2