forked from osmocom/wireshark
fix comparing a sequence number of TCP fragment when its value wraps over uint32_t limit
Change-Id: I0ff939e2d1265a2d9380c83f8f538bb43b0dadf9 Reviewed-on: https://code.wireshark.org/review/875 Reviewed-by: Pavel Karneliuk <pavel_karneliuk@epam.com> Reviewed-by: Evan Huus <eapache@gmail.com> Reviewed-by: Anders Broman <a.broman58@gmail.com>
This commit is contained in:
parent
01b65269bf
commit
0b5f26b67d
|
@ -441,7 +441,7 @@ check_fragments( int idx, tcp_stream_chunk *sc, guint32 acknowledged ) {
|
|||
lowest_seq = current->seq;
|
||||
}
|
||||
|
||||
if( current->seq < seq[idx] ) {
|
||||
if( LT_SEQ(current->seq, seq[idx]) ) {
|
||||
guint32 newseq;
|
||||
/* this sequence number seems dated, but
|
||||
check the end to make sure it has no more
|
||||
|
|
Loading…
Reference in New Issue