diff options
author | Pavel Karneliuk <pavel_karneliuk@epam.com> | 2014-03-31 12:55:15 +0300 |
---|---|---|
committer | Anders Broman <a.broman58@gmail.com> | 2014-04-01 15:42:51 +0000 |
commit | 0b5f26b67d68bdfd7e59c191cefe407f19edcafc (patch) | |
tree | 6796098f05cad3423ba6a90057a803b6b375b7cd /epan/follow.c | |
parent | 01b65269bf7bbb6500b852e11fefa19f72842843 (diff) |
fix comparing a sequence number of TCP fragment when its value wraps over uint32_t limit
Change-Id: I0ff939e2d1265a2d9380c83f8f538bb43b0dadf9
Reviewed-on: https://code.wireshark.org/review/875
Reviewed-by: Pavel Karneliuk <pavel_karneliuk@epam.com>
Reviewed-by: Evan Huus <eapache@gmail.com>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
Diffstat (limited to 'epan/follow.c')
-rw-r--r-- | epan/follow.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/epan/follow.c b/epan/follow.c index 8d4cd635da..b2c62962d7 100644 --- a/epan/follow.c +++ b/epan/follow.c @@ -441,7 +441,7 @@ check_fragments( int idx, tcp_stream_chunk *sc, guint32 acknowledged ) { lowest_seq = current->seq; } - if( current->seq < seq[idx] ) { + if( LT_SEQ(current->seq, seq[idx]) ) { guint32 newseq; /* this sequence number seems dated, but check the end to make sure it has no more |