| Bug ID |
8577
|
| Summary |
HPFEED dissector, wrong value extracted from header
|
| Classification |
Unclassified
|
| Product |
Wireshark
|
| Version |
SVN
|
| Hardware |
x86
|
| OS |
All
|
| Status |
UNCONFIRMED
|
| Severity |
Normal
|
| Priority |
Low
|
| Component |
Dissection engine (libwireshark)
|
| Assignee |
[email protected]
|
| Reporter |
[email protected]
|
Created attachment 10582 [details]
Patch to fix the reported problem
Build Information:
--
There is a wrong value for packet length field extracted from header of
protocol HPFEED.
This is due to wrong length of data extracted (was extracted a single byte,
while the packet length is expressed on 4 bytes value).
Fixed extracting the right amount of data from the raw data.
You are receiving this mail because:
- You are watching all bug changes.