fix comparing a sequence number of TCP fragment when its value wraps over uint32_t...
authorPavel Karneliuk <pavel_karneliuk@epam.com>
Mon, 31 Mar 2014 09:55:15 +0000 (12:55 +0300)
committerAnders Broman <a.broman58@gmail.com>
Tue, 1 Apr 2014 15:42:51 +0000 (15:42 +0000)
Change-Id: I0ff939e2d1265a2d9380c83f8f538bb43b0dadf9
Reviewed-on: https://code.wireshark.org/review/875
Reviewed-by: Pavel Karneliuk <pavel_karneliuk@epam.com>
Reviewed-by: Evan Huus <eapache@gmail.com>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
epan/follow.c

index 8d4cd635daf4df54aaa89777990cbd303f2ba46d..b2c62962d785f9861e51e19796b5d50993705aa5 100644 (file)
@@ -441,7 +441,7 @@ check_fragments( int idx, tcp_stream_chunk *sc, guint32 acknowledged ) {
         lowest_seq = current->seq;
       }
 
-      if( current->seq < seq[idx] ) {
+      if( LT_SEQ(current->seq, seq[idx]) ) {
         guint32 newseq;
         /* this sequence number seems dated, but
            check the end to make sure it has no more