Merge pull request #4457 from dgarske/zd13036

Fix for sniffer to trap negative size calculation
This commit is contained in:
Sean Parkinson
2021-10-21 08:17:52 +10:00
committed by GitHub

View File

@ -5034,9 +5034,6 @@ static int FixSequence(TcpInfo* tcpInfo, SnifferSession* session)
&session->flags.srvSkipPartial :
&session->flags.cliSkipPartial;
if (tcpInfo->ackNumber < seqStart) {
return -1; /* do not fix sequence - could be ack on unseen seq */
}
*skipPartial = 1;
if (list != NULL)
@ -5044,7 +5041,6 @@ static int FixSequence(TcpInfo* tcpInfo, SnifferSession* session)
else
*expected = tcpInfo->ackNumber - seqStart;
return 1;
}
@ -5062,7 +5058,7 @@ static int CheckAck(TcpInfo* tcpInfo, SnifferSession* session)
/* handle rollover of sequence */
if (tcpInfo->ackNumber < seqStart)
real = 0xffffffffU - seqStart + tcpInfo->ackNumber;
real = 0xffffffffU - seqStart + tcpInfo->ackNumber + 1;
TraceAck(real, expected);
@ -5164,7 +5160,7 @@ static int CheckPreRecord(IpInfo* ipInfo, TcpInfo* tcpInfo,
}
}
if (*sslBytes == 0) {
if (*sslBytes <= 0) {
Trace(NO_DATA_STR);
return 1;
}