summaryrefslogtreecommitdiff
path: root/version.conf
diff options
context:
space:
mode:
authorPeter Wu <peter@lekensteyn.nl>2017-06-29 22:44:08 +0200
committerAnders Broman <a.broman58@gmail.com>2017-06-30 07:12:21 +0000
commitd813fa7c00f84dda8dff7d922cb9b3d75ec7f8cf (patch)
treeb275392305f2654d2c9aa68e8d1e7f7a138c052a /version.conf
parent9bad76eb2a7b7717db2dc51e578cc27d839e06bf (diff)
downloadwireshark-d813fa7c00f84dda8dff7d922cb9b3d75ec7f8cf.tar.gz
dumpcap: fix buffer overflow on packets larger than 2048 bytes
When the current capture buffer is too small, it must be increased before attempting to read the next data packet. Fix developed by Mikael Kanstrup (and Guy), I added comments such that the next reader does not have to guess whether "incl_len" is accidentally used for reading from the buffer (it is not). Change-Id: I980bd21ac79601a34d57ffc99a34bfb54c297ac0 Fixes: v2.5.0rc0-28-gd0865fd619 ("Allow bigger snapshot lengths for D-Bus captures.") Bug: 13852 Reviewed-on: https://code.wireshark.org/review/22464 Petri-Dish: Peter Wu <peter@lekensteyn.nl> Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> Reviewed-by: Guy Harris <guy@alum.mit.edu> (cherry picked from commit 8f8a0f72b442efe66c7ee26417a92508a1546289) Reviewed-on: https://code.wireshark.org/review/22467 Reviewed-by: Anders Broman <a.broman58@gmail.com>
Diffstat (limited to 'version.conf')
0 files changed, 0 insertions, 0 deletions