From a27dee63708303348b1b5af6aef40ac3ef1e81dc Mon Sep 17 00:00:00 2001 From: Tim Wojtulewicz Date: Wed, 11 Jun 2025 14:02:44 -0700 Subject: [PATCH] Fix comparison against CapLen results in IPTunnel --- src/packet_analysis/protocol/iptunnel/IPTunnel.cc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/packet_analysis/protocol/iptunnel/IPTunnel.cc b/src/packet_analysis/protocol/iptunnel/IPTunnel.cc index a6330fff2d..e589f4788b 100644 --- a/src/packet_analysis/protocol/iptunnel/IPTunnel.cc +++ b/src/packet_analysis/protocol/iptunnel/IPTunnel.cc @@ -39,9 +39,9 @@ bool IPTunnelAnalyzer::AnalyzePacket(size_t len, const uint8_t* data, Packet* pa auto result = packet_analysis::IP::ParsePacket(len, data, proto, inner); if ( result == packet_analysis::IP::ParseResult::BadProtocol ) Weird("invalid_inner_IP_version", packet); - else if ( result < packet_analysis::IP::ParseResult::CaplenTooSmall ) + else if ( result == packet_analysis::IP::ParseResult::CaplenTooSmall ) Weird("truncated_inner_IP", packet); - else if ( result > packet_analysis::IP::ParseResult::CaplenTooLarge ) + else if ( result == packet_analysis::IP::ParseResult::CaplenTooLarge ) Weird("inner_IP_payload_length_mismatch", packet); if ( result != packet_analysis::IP::ParseResult::Ok )