TCP reassembly can call subdissector with incorrect TCP sequence number
This issue was migrated from bug 4624 in our old bug tracker.
Original bug information:
Reporter: jmm…@mit…
Status: RESOLVED FIXED
Product: Wireshark
Component: GTK+ UI
OS: All
Platform: All
Version: 1.2.6
Attachments:
diff: set tcpinfo->seq in desegment_tcp() before calling process_tcp_payload()
fake.pcap: packet trace with simple protocol whose PDUs are split across packets
packet-fake.c: dissector for the simple protocol
output.txt: output from dissection of simple protocol, showing duplicated sequence numbers