fix comparing a sequence number of TCP fragment when its value wraps over uint32_t limit

Change-Id: I0ff939e2d1265a2d9380c83f8f538bb43b0dadf9
Reviewed-on: https://code.wireshark.org/review/875
Reviewed-by: Pavel Karneliuk <pavel_karneliuk@epam.com>
Reviewed-by: Evan Huus <eapache@gmail.com>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
This commit is contained in:
Pavel Karneliuk 2014-03-31 12:55:15 +03:00 committed by Anders Broman
parent 01b65269bf
commit 0b5f26b67d
1 changed files with 1 additions and 1 deletions

View File

@ -441,7 +441,7 @@ check_fragments( int idx, tcp_stream_chunk *sc, guint32 acknowledged ) {
lowest_seq = current->seq;
}
if( current->seq < seq[idx] ) {
if( LT_SEQ(current->seq, seq[idx]) ) {
guint32 newseq;
/* this sequence number seems dated, but
check the end to make sure it has no more