Module: kamailio
Branch: 5.2
Commit: edbe99332af576b8c860c9d887e3eb1c51c9b6db
URL:
https://github.com/kamailio/kamailio/commit/edbe99332af576b8c860c9d887e3eb1…
Author: Victor Seva <linuxmaniac(a)torreviejawireless.org>
Committer: Henning Westerholt <hw(a)skalatan.de>
Date: 2020-01-23T15:53:22+01:00
smsops: fix spelling error
(cherry picked from commit 4a657005a5c4eff88e48dc2b8847d5800a90bead)
---
Modified: src/modules/smsops/smsops_impl.c
---
Diff:
https://github.com/kamailio/kamailio/commit/edbe99332af576b8c860c9d887e3eb1…
Patch:
https://github.com/kamailio/kamailio/commit/edbe99332af576b8c860c9d887e3eb1…
---
diff --git a/src/modules/smsops/smsops_impl.c b/src/modules/smsops/smsops_impl.c
index b5eef0a593..d686c2ea78 100644
--- a/src/modules/smsops/smsops_impl.c
+++ b/src/modules/smsops/smsops_impl.c
@@ -543,7 +543,7 @@ int decode_3gpp_sms(struct sip_msg *msg) {
// Check for malicious length, which might cause buffer overflow
if(udh_len > body.len - p) {
- LM_ERR("TP-User-Data-Lenght is bigger than the remaining message
buffer!\n");
+ LM_ERR("TP-User-Data-Length is bigger than the remaining message
buffer!\n");
return -1;
}
@@ -564,7 +564,7 @@ int decode_3gpp_sms(struct sip_msg *msg) {
// Check for malicious length, which might cause buffer overflow
if(udh_read + ie->data.len + 2 /* two octets are read so far */ > udh_len)
{
- LM_ERR("IE Lenght for IE id %d is bigger than the remaining User-Data
element!\n",
+ LM_ERR("IE Length for IE id %d is bigger than the remaining User-Data
element!\n",
ie->identifier);
pkg_free(ie);
return -1;