https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12951
--- Comment #5 from Jaap Keuter <jaap.keu...@xs4all.nl> --- The errored packet is related to line 2533 in your change of packet-icmpv6.c. The (incorrect) length value '1' causes the metric_len variable to underflow, rolling over to 255. Then it continues to dissect the data as DAG Metric Container ad infinitum. Or more precisely, until that TVB runs out of data. This should not happen, as in, your dissector should withstand protocol errors in the packet it receives (which are the circumstances Wireshark gets called in to help) as well as possible. Changing this to gint should work fine. -- You are receiving this mail because: You are watching all bug changes.
___________________________________________________________________________ Sent via: Wireshark-bugs mailing list <wireshark-bugs@wireshark.org> Archives: https://www.wireshark.org/lists/wireshark-bugs Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe