Wireshark-bugs: [Wireshark-bugs] [Bug 5616] New: Patch to add export info on malformed GapAcks i

Date: Tue, 25 Jan 2011 01:26:40 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5616

           Summary: Patch to add export info on malformed GapAcks in SCTP
                    SACKs and NR-SACKs
           Product: Wireshark
           Version: SVN
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Normal
          Priority: Low
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: dreibh@xxxxxxxxxxxxxx


Created an attachment (id=5779)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=5779)
The patch

Build Information:
wireshark 1.5.0+svn35612 (SVN Rev 35634 from /trunk)

Copyright 1998-2011 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with GTK+ 2.22.0, with GLib 2.26.0, with libpcap 1.1.1, with
libz 1.2.3.4, without POSIX capabilities, without libpcre, with SMI 0.4.8, with
c-ares 1.7.3, without Lua, without Python, with GnuTLS 2.8.6, with Gcrypt
1.4.5,
with MIT Kerberos, with GeoIP, without PortAudio, without AirPcap.

Running on Linux 2.6.37dreibholz, with libpcap version 1.1.1, with libz
1.2.3.4,
GnuTLS 2.8.6, Gcrypt 1.4.5.

Built using gcc 4.4.5.
--
The attached patch adds checks for malformed GapAcks in SCTP SACKs and NR-SACKs
to the SCTP dissector. An expert info with error information is generated if:
- (R/NR)-GapAck start <= CumAck + 1 or
- (R/NR)-GapAck start <= (R/NR)-GapAck end + 1 of previous (R/NR)-GapAck entry
or
- (R/NR)-GapAck start > (R/NR)-GapAck end.

This information is highly useful for debugging SACK and NR-SACK handling in
SCTP implementations.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.