Wireshark-bugs: [Wireshark-bugs] [Bug 10196] New: TCP sequence analysis done twice

Date: Wed, 18 Jun 2014 06:50:04 +0000
Bug ID 10196
Summary TCP sequence analysis done twice
Classification Unclassified
Product Wireshark
Version unspecified
Hardware All
OS All
Status UNCONFIRMED
Severity Minor
Priority Low
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Build Information:
wireshark 1.99.0 (v1.99.0-rc1-377-gef1f305 from unknown)

Copyright 1998-2014 Gerald Combs <[email protected]> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with Qt 5.3.0 with GLib 2.40.0, with libpcap, with libz
1.2.5,
without POSIX capabilities, without SMI, with c-ares 1.10.0, with Lua 5.1, with
GnuTLS 3.2.15, with Gcrypt 1.6.1, without Kerberos, with GeoIP, without
PortAudio, without AirPcap.

Running on Mac OS X 10.9.3, build 13D65 (Darwin 13.2.0), with locale
en_CA.UTF-8, with libpcap version 1.3.0 - Apple version 41, with libz 1.2.5,
GnuTLS 3.2.15, Gcrypt 1.6.1.
Intel(R) Core(TM) i7-4850HQ CPU @ 2.30GHz (with SSE4.2)

Built using clang 4.2.1 Compatible Apple LLVM 5.1 (clang-503.0.40).
--
While implementing something in the area, I noticed that some of the sequence
number analysis is not guarded by an fd.visited check and so seems to get run
multiple times when run in the GUI. Not sure if this works out to a problem, or
just a possible optimization, or...


You are receiving this mail because:
  • You are watching all bug changes.