[Wireshark-bugs] [Bug 1419] dumpcap keeps running after Wireshark crashes

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419

--- Comment #22 from Gerald Combs  ---
(In reply to David Eichar from comment #21)
> I just tried "net stop npf". After several seconds the response was:
> "The NetGroup Packet Filter Driver service could not be stopped."
> Note, this is happening on Windows Server 2016 with several users having
> logged out, but dumpcap.exe still remains running.

Can you try uninstalling WinPcap and installing Npcap? It should be more
reliable, particularly on newer Windows versions. We're hoping to include it
with Wireshark 3.0.

-- 
You are receiving this mail because:
You are watching all bug changes.
You are the assignee for the bug.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14642] WinSparkle 0.5.6 is out of date and is buggy.

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14642

Gerald Combs  changed:

   What|Removed |Added

 Resolution|--- |FIXED
 Status|UNCONFIRMED |RESOLVED

--- Comment #13 from Gerald Combs  ---
I've upgraded each of our supported branches to 0.5.7. I'm not sure what our
options are if we need to upgrade beyond that.

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14642] WinSparkle 0.5.6 is out of date and is buggy.

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14642

--- Comment #12 from Gerrit Code Review  ---
Change 27280 merged by Gerald Combs:
Windows: Upgrade WinSparkle to 0.5.7.

https://code.wireshark.org/review/27280

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14642] WinSparkle 0.5.6 is out of date and is buggy.

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14642

--- Comment #11 from Gerrit Code Review  ---
Change 27279 merged by Gerald Combs:
Windows: Upgrade WinSparkle to 0.5.7.

https://code.wireshark.org/review/27279

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14642] WinSparkle 0.5.6 is out of date and is buggy.

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14642

--- Comment #10 from Gerrit Code Review  ---
Change 27278 merged by Gerald Combs:
Windows: Upgrade WinSparkle to 0.5.7.

https://code.wireshark.org/review/27278

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14506] PROXY protocol (v2) support (HAproxy) for TCP: skip and maybe implement a full dissector

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14506

--- Comment #11 from christian.rohm...@inovex.de ---
Awesome Alexis, thank you very much for making this happen so quickly.

I see that your code still goes through code review, but at least one build has
been done already - https://code.wireshark.org/review/#/c/10626/.

Are there any nightly / unstable builds for Linux available which I could test?
https://www.wireshark.org/download/automated/ seems to only have OSX and
Windows.

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14642] WinSparkle 0.5.6 is out of date and is buggy.

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14642

--- Comment #9 from Gerrit Code Review  ---
Change 27276 merged by Gerald Combs:
Windows: Upgrade WinSparkle to 0.5.7.

https://code.wireshark.org/review/27276

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 1419] dumpcap keeps running after Wireshark crashes

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1419

David Eichar  changed:

   What|Removed |Added

 CC||d...@att.net

--- Comment #21 from David Eichar  ---
I just tried "net stop npf". After several seconds the response was:
"The NetGroup Packet Filter Driver service could not be stopped."
Note, this is happening on Windows Server 2016 with several users having logged
out, but dumpcap.exe still remains running.

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14642] WinSparkle 0.5.6 is out of date and is buggy.

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14642

--- Comment #8 from Gerrit Code Review  ---
Change 27280 had a related patch set uploaded by Gerald Combs:
Windows: Upgrade WinSparkle to 0.5.7.

https://code.wireshark.org/review/27280

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14642] WinSparkle 0.5.6 is out of date and is buggy.

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14642

--- Comment #7 from Gerrit Code Review  ---
Change 27279 had a related patch set uploaded by Gerald Combs:
Windows: Upgrade WinSparkle to 0.5.7.

https://code.wireshark.org/review/27279

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14642] WinSparkle 0.5.6 is out of date and is buggy.

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14642

--- Comment #6 from Gerrit Code Review  ---
Change 27278 had a related patch set uploaded by Gerald Combs:
Windows: Upgrade WinSparkle to 0.5.7.

https://code.wireshark.org/review/27278

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14642] WinSparkle 0.5.6 is out of date and is buggy.

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14642

--- Comment #5 from Gerrit Code Review  ---
Change 27276 had a related patch set uploaded by Gerald Combs:
Windows: Upgrade WinSparkle to 0.5.7.

https://code.wireshark.org/review/27276

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14649] New: "TCP Previous segment not captured" and/or "TCP Out-Of-Order" breaks WebSocket dissection

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14649

Bug ID: 14649
   Summary: "TCP Previous segment not captured" and/or "TCP
Out-Of-Order" breaks WebSocket dissection
   Product: Wireshark
   Version: 2.6.0
  Hardware: x86
OS: Windows 10
Status: UNCONFIRMED
  Severity: Major
  Priority: Low
 Component: Dissection engine (libwireshark)
  Assignee: bugzilla-ad...@wireshark.org
  Reporter: arceus...@gmail.com
  Target Milestone: ---

Created attachment 16305
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=16305=edit
Capture file with messed up dissection

Build Information:
Version 2.6.0 (v2.6.0-0-gc7239f02) 
Copyright 1998-2018 Gerald Combs  and contributors.
License GPLv2+: GNU GPL version 2 or later
 This is free software;
see the source for copying conditions. There is NO warranty; not even for
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 
Compiled (64-bit) with Qt 5.9.4, with WinPcap (4_1_3), with GLib 2.42.0, with
zlib 1.2.11, with SMI 0.4.8, with c-ares 1.14.0, with Lua 5.2.4, with GnuTLS
3.4.11, with Gcrypt 1.7.6, with MIT Kerberos, with MaxMind DB resolver, with
nghttp2 1.14.0, with LZ4, with Snappy, with libxml2 2.9.4, with QtMultimedia,
with AirPcap, with SBC, with SpanDSP, with bcg729. 
Running on 64-bit Windows 10, build 16299, with Intel(R) Core(TM) i5-7300HQ CPU
@ 2.50GHz (with SSE4.2), with 8088 MB of physical memory, with locale
English_United States.1252, with WinPcap version 4.1.3 (packet.dll version
4.1.0.2980), based on libpcap version 1.0 branch 1_0_rel0b (20091008), with
GnuTLS 3.4.11, with Gcrypt 1.7.6, without AirPcap, binary plugins supported (14
loaded). Built using Microsoft Visual C++ 14.12 build 25835 
Wireshark is Open Source Software released under the GNU General Public
License. 
Check the man page and http://www.wireshark.org for more information. 
--
Prior to getting a "TCP Previous segment not captured" packet followed by a
"TCP Out-Of-Order" packet, WebSocket dissects correctly and without issue.
After that, it suddenly becomes unable to properly dissect it, sometimes seeing
the WebSocket segment as being multiple, sometimes seeing it as starting
earlier or later than it actually does, and then eventually it just stops
seeing it as WebSocket. Problem has existed for several versions (Some of my
computers HAD older versions of WireShark on them when I saw this, and all of
them still have this problem in the current version.

Some examples from the file labeled "problems 1":

-Packet 170 has a single WebSocket stream that is supposed to start at byte 36,
but it starts at byte 40 instead, and thinks there are two WebSocket streams.

-Packet 172 is WebSocket "Connection close", but is seen as a regular TCP
packet.

pretty much every packet that is not just an ACK has been dissected
incorrectly.

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14644] TCP Spurious Retransmission breaks decryption

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14644

Ken Peterson  changed:

   What|Removed |Added

 Status|UNCONFIRMED |CONFIRMED
 Ever confirmed|0   |1

--- Comment #4 from Ken Peterson  ---
*** This bug has been confirmed by popular vote. ***

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14648] New: Unable to create or open VOIP captures

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14648

Bug ID: 14648
   Summary: Unable to create or open VOIP captures
   Product: Wireshark
   Version: 2.6.0
  Hardware: x86
OS: Windows 10
Status: UNCONFIRMED
  Severity: Major
  Priority: Low
 Component: Capture file support (libwiretap)
  Assignee: bugzilla-ad...@wireshark.org
  Reporter: mpa...@gmail.com
  Target Milestone: ---

Created attachment 16304
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=16304=edit
Capture with voip traffic created in 2.4.6

Build Information:
Version 2.6.0 (v2.6.0-0-gc7239f02) 
Copyright 1998-2018 Gerald Combs  and contributors.
License GPLv2+: GNU GPL version 2 or later
 This is free software;
see the source for copying conditions. There is NO warranty; not even for
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 
Compiled (64-bit) with Qt 5.9.4, with WinPcap (4_1_3), with GLib 2.42.0, with
zlib 1.2.11, with SMI 0.4.8, with c-ares 1.14.0, with Lua 5.2.4, with GnuTLS
3.4.11, with Gcrypt 1.7.6, with MIT Kerberos, with MaxMind DB resolver, with
nghttp2 1.14.0, with LZ4, with Snappy, with libxml2 2.9.4, with QtMultimedia,
with AirPcap, with SBC, with SpanDSP, with bcg729. 
Running on 64-bit Windows 10, build 15063, with Intel(R) Core(TM) i7-7600U CPU
@ 2.80GHz (with SSE4.2), with 16222 MB of physical memory, with locale
English_United States.1252, with WinPcap version 4.1.3 (packet.dll version
4.1.0.2980), based on libpcap version 1.0 branch 1_0_rel0b (20091008), with
GnuTLS 3.4.11, with Gcrypt 1.7.6, without AirPcap, binary plugins supported (14
loaded). Built using Microsoft Visual C++ 14.12 build 25835 
Wireshark is Open Source Software released under the GNU General Public
License. 
Check the man page and http://www.wireshark.org for more information. 
--
Opening pcap/pcapng files or creating captures with VOIP traffic causes an
immediate crash of the program. Opening the same pcap in 2.4.6 and performing
the same VOIP capture runs without issue.

Verified in Win 10

Windows error is below:
Faulting application name: Wireshark.exe, version: 2.6.0.0, time stamp:
0x5adf6e30
Faulting module name: libwireshark.dll, version: 2.6.0.0, time stamp:
0x5adf6d1a
Exception code: 0xc005
Fault offset: 0x00016ae7
Faulting process id: 0x4be0
Faulting application start time: 0x01d3e220064d4adb
Faulting application path: C:\Program Files\Wireshark\Wireshark.exe
Faulting module path: C:\Program Files\Wireshark\libwireshark.dll
Report Id: c8af1556-ffa9-4e20-b83a-44984f513bbc
Faulting package full name: 
Faulting package-relative application ID:

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14641] Remove: HACK to support UHD's weird header offset on data packets

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14641

--- Comment #8 from Gerrit Code Review  ---
Change 27254 merged by Pascal Quantin:
VITA 49: add an explicit option to activate Ettus UHD header workaround

https://code.wireshark.org/review/27254

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14633] "Copy as printable text" isn't copying non-alphanumeric characters

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14633

Jaap Keuter  changed:

   What|Removed |Added

 Ever confirmed|0   |1
 Status|UNCONFIRMED |CONFIRMED

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14641] Remove: HACK to support UHD's weird header offset on data packets

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14641

--- Comment #7 from Gerrit Code Review  ---
Change 27254 had a related patch set uploaded by Pascal Quantin:
VITA 49: add an explicit option to activate Ettus UHD header workaround

https://code.wireshark.org/review/27254

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14641] Remove: HACK to support UHD's weird header offset on data packets

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14641

--- Comment #6 from Gerrit Code Review  ---
Change 27253 merged by Pascal Quantin:
VITA 49: add an explicit option to activate Ettus UHD header workaround

https://code.wireshark.org/review/27253

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14641] Remove: HACK to support UHD's weird header offset on data packets

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14641

Pascal Quantin  changed:

   What|Removed |Added

 Status|CONFIRMED   |RESOLVED
 Resolution|--- |FIXED

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14641] Remove: HACK to support UHD's weird header offset on data packets

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14641

--- Comment #5 from Gerrit Code Review  ---
Change 27253 had a related patch set uploaded by Pascal Quantin:
VITA 49: add an explicit option to activate Ettus UHD header workaround

https://code.wireshark.org/review/27253

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14647] Buildbot crash output: fuzz-2018-05-01-9711.pcap

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14647

--- Comment #4 from Gerrit Code Review  ---
Change 27252 merged by Pascal Quantin:
IEEE 1905.1a: use col_add_str to add non const strings

https://code.wireshark.org/review/27252

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14647] Buildbot crash output: fuzz-2018-05-01-9711.pcap

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14647

--- Comment #3 from Gerrit Code Review  ---
Change 27252 had a related patch set uploaded by Pascal Quantin:
IEEE 1905.1a: use col_add_str to add non const strings

https://code.wireshark.org/review/27252

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14647] Buildbot crash output: fuzz-2018-05-01-9711.pcap

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14647

Pascal Quantin  changed:

   What|Removed |Added

 CC||pascal.quan...@gmail.com
 Status|CONFIRMED   |RESOLVED
 Resolution|--- |FIXED

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14641] Remove: HACK to support UHD's weird header offset on data packets

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14641

--- Comment #4 from Gerrit Code Review  ---
Change 27249 merged by Anders Broman:
VITA 49: add an explicit option to activate Ettus UHD header workaround

https://code.wireshark.org/review/27249

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14647] Buildbot crash output: fuzz-2018-05-01-9711.pcap

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14647

--- Comment #2 from Gerrit Code Review  ---
Change 27250 merged by Anders Broman:
IEEE 1905.1a: use col_add_str to add non const strings

https://code.wireshark.org/review/27250

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14633] "Copy as printable text" isn't copying non-alphanumeric characters

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14633

Martin Meadows  changed:

   What|Removed |Added

 OS|Linux   |Windows 10
 CC||mar...@netconfigs.com
   Severity|Minor   |Normal
   Priority|Low |Medium

--- Comment #1 from Martin Meadows  ---
I confirm this bug on 2.6.0
I have a UDP packet containing XML.
I right-click the payload data and selecting 'Copy ... as Printable Text'.
When pasted into notepad++, all the non-alphanumeric characters have been
stripped.
Instead, I have to 'Copy ... Copy Bytes as Hex + ASCII Dump' and massage - ugh!

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14647] Buildbot crash output: fuzz-2018-05-01-9711.pcap

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14647

--- Comment #1 from Gerrit Code Review  ---
Change 27250 had a related patch set uploaded by Pascal Quantin:
IEEE 1905.1a: use col_add_str to add non const strings

https://code.wireshark.org/review/27250

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14641] Remove: HACK to support UHD's weird header offset on data packets

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14641

--- Comment #3 from Gerrit Code Review  ---
Change 27249 had a related patch set uploaded by Pascal Quantin:
VITA 49: add an explicit option to activate Ettus UHD header workaround

https://code.wireshark.org/review/27249

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14647] New: Buildbot crash output: fuzz-2018-05-01-9711.pcap

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14647

Bug ID: 14647
   Summary: Buildbot crash output: fuzz-2018-05-01-9711.pcap
   Product: Wireshark
   Version: unspecified
  Hardware: x86-64
OS: Ubuntu
Status: CONFIRMED
  Severity: Major
  Priority: High
 Component: Dissection engine (libwireshark)
  Assignee: bugzilla-ad...@wireshark.org
  Reporter: buildbot-do-not-re...@wireshark.org
  Target Milestone: ---

Problems have been found with the following capture file:

https://www.wireshark.org/download/automated/captures/fuzz-2018-05-01-9711.pcap

stderr:
Input file: /home/wireshark/menagerie/menagerie/6866-dce-packets.cap

Build host information:
Linux wsbb04 4.4.0-122-generic #146-Ubuntu SMP Mon Apr 23 15:34:04 UTC 2018
x86_64 x86_64 x86_64 GNU/Linux
Distributor ID: Ubuntu
Description:Ubuntu 16.04.4 LTS
Release:16.04
Codename:   xenial

Buildbot information:
BUILDBOT_REPOSITORY=ssh://wireshark-build...@code.wireshark.org:29418/wireshark
BUILDBOT_WORKERNAME=clang-code-analysis
BUILDBOT_BUILDNUMBER=4733
BUILDBOT_URL=http://buildbot.wireshark.org/wireshark-master/
BUILDBOT_BUILDERNAME=Clang Code Analysis
BUILDBOT_GOT_REVISION=14720ace095a07c9e2394e14337476691e21

Return value:  0

Dissector bug:  0

Valgrind error count:  19



Git commit
commit 14720ace095a07c9e2394e14337476691e21
Author: Stig Bjørlykke 
Date:   Mon Apr 30 09:47:58 2018 +0200

Fix comment end after SPDX identifier

Move */ to a separate line below the SPDX identifier.

Change-Id: Id1032215449cfccae0933147b45e04b65e0b727f
Reviewed-on: https://code.wireshark.org/review/27211
Reviewed-by: Anders Broman 


==3042== Memcheck, a memory error detector
==3042== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
==3042== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info
==3042== Command:
/home/wireshark/builders/wireshark-master-fuzz/clangcodeanalysis/install.plain/bin/tshark
-nr /fuzz/buildbot/clangcodeanalysis/valgrind-fuzz/fuzz-2018-05-01-9711.pcap
==3042== 
==3042== Invalid read of size 1
==3042==at 0x4C30F62: strlen (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==3042==by 0x121572: print_columns (tshark.c:3755)
==3042==by 0x120E00: print_packet (tshark.c:3924)
==3042==by 0x1202B7: process_packet_single_pass (tshark.c:3560)
==3042==by 0x11EC53: process_cap_file (tshark.c:3369)
==3042==by 0x11C485: main (tshark.c:2053)
==3042==  Address 0x18050210 is 0 bytes inside a block of size 80 free'd
==3042==at 0x4C2EDEB: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==3042==by 0x7DD1FC3: wmem_free (wmem_core.c:67)
==3042==by 0x7DD4B73: wmem_simple_free_all (wmem_allocator_simple.c:95)
==3042==by 0x7DD2196: wmem_free_all_real (wmem_core.c:106)
==3042==by 0x7DD2146: wmem_free_all (wmem_core.c:112)
==3042==by 0x7DD6E32: wmem_leave_packet_scope (wmem_scopes.c:69)
==3042==by 0x7E2F8A6: epan_dissect_run_with_taps (epan.c:546)
==3042==by 0x12020F: process_packet_single_pass (tshark.c:3543)
==3042==by 0x11EC53: process_cap_file (tshark.c:3369)
==3042==by 0x11C485: main (tshark.c:2053)
==3042==  Block was alloc'd at
==3042==at 0x4C2DB8F: malloc (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==3042==by 0xB9F6718: g_malloc (in
/lib/x86_64-linux-gnu/libglib-2.0.so.0.4800.2)
==3042==by 0x7DD1EC3: wmem_alloc (wmem_core.c:37)
==3042==by 0x7DD4939: wmem_simple_alloc (wmem_allocator_simple.c:43)
==3042==by 0x7DD1F39: wmem_alloc (wmem_core.c:46)
==3042==by 0x7DD7EAD: wmem_strdup_vprintf (wmem_strutl.c:95)
==3042==by 0x7DD7E58: wmem_strdup_printf (wmem_strutl.c:68)
==3042==by 0x7EA7A11: val_to_str_ext (value_string.c:317)
==3042==by 0x6E1FE71: dissect_ieee1905 (packet-ieee1905.c:4521)
==3042==by 0x7E444C7: call_dissector_through_handle (packet.c:692)
==3042==by 0x7E40339: call_dissector_work (packet.c:777)
==3042==by 0x7E40147: dissector_try_uint_new (packet.c:1359)
==3042== 
==3042== Invalid read of size 1
==3042==at 0x4C30F74: strlen (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==3042==by 0x121572: print_columns (tshark.c:3755)
==3042==by 0x120E00: print_packet (tshark.c:3924)
==3042==by 0x1202B7: process_packet_single_pass (tshark.c:3560)
==3042==by 0x11EC53: process_cap_file (tshark.c:3369)
==3042==by 0x11C485: main (tshark.c:2053)
==3042==  Address 0x18050211 is 1 bytes inside a block of size 80 free'd
==3042==at 0x4C2EDEB: free (in
/usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==3042==by 0x7DD1FC3: wmem_free (wmem_core.c:67)
==3042==by 0x7DD4B73: wmem_simple_free_all (wmem_allocator_simple.c:95)
==3042==by 0x7DD2196: wmem_free_all_real (wmem_core.c:106)
==3042==by 0x7DD2146: wmem_free_all (wmem_core.c:112)
==3042==by 

[Wireshark-bugs] [Bug 14646] New: Wireshark crashes after adding new SSL private key file

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14646

Bug ID: 14646
   Summary: Wireshark crashes after adding new SSL private key
file
   Product: Wireshark
   Version: 2.6.0
  Hardware: x86
OS: Windows 10
Status: UNCONFIRMED
  Severity: Major
  Priority: Low
 Component: Dissection engine (libwireshark)
  Assignee: bugzilla-ad...@wireshark.org
  Reporter: 1daniel.schwar...@gmail.com
  Target Milestone: ---

Created attachment 16303
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=16303=edit
Wireshark error in Event Viewer logs

Build Information:
Wireshark 2.6.0 (v2.6.0-0-gc7239f02)

Copyright 1998-2018 Gerald Combs  and contributors.
License GPLv2+: GNU GPL version 2 or later

This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with Qt 5.9.4, with WinPcap (4_1_3), with GLib 2.42.0, with
zlib 1.2.11, with SMI 0.4.8, with c-ares 1.14.0, with Lua 5.2.4, with GnuTLS
3.4.11, with Gcrypt 1.7.6, with MIT Kerberos, with MaxMind DB resolver, with
nghttp2 1.14.0, with LZ4, with Snappy, with libxml2 2.9.4, with QtMultimedia,
with AirPcap, with SBC, with SpanDSP, with bcg729.

Running on 64-bit Windows 10, build 16299, with Intel(R) Core(TM) i5-4300U CPU
@
1.90GHz (with SSE4.2), with 8070 MB of physical memory, with locale
German_Germany.1252, with WinPcap version 4.1.3 (packet.dll version
4.1.0.2980),
based on libpcap version 1.0 branch 1_0_rel0b (20091008), with GnuTLS 3.4.11,
with Gcrypt 1.7.6, without AirPcap, binary plugins supported (0 loaded).

Built using Microsoft Visual C++ 14.12 build 25835
--
Using Wireshark 2.6.0 (issue happened also on 2.4.4) on my Win10 laptop. Trying
to decrypt my traffic using a private key file.
While adding the pem file to the SSL properties Wireshark all the time crashes
immediately. It is not able to restart until I have deleted the new added key
manually from the ssl_keys file in my roaming folder. SSL Debug log is empty
(no details available).

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

[Wireshark-bugs] [Bug 14645] New: List of remote interfaces isn't usable anymore

2018-05-02 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14645

Bug ID: 14645
   Summary: List of remote interfaces isn't usable anymore
   Product: Wireshark
   Version: 2.6.0
  Hardware: x86-64
OS: Windows 10
Status: UNCONFIRMED
  Severity: Major
  Priority: Low
 Component: Qt UI
  Assignee: bugzilla-ad...@wireshark.org
  Reporter: d...@innovaphone.com
  Target Milestone: ---

Build Information:
Version 2.6.0 (v2.6.0-0-gc7239f02) 
Copyright 1998-2018 Gerald Combs  and contributors.
License GPLv2+: GNU GPL version 2 or later
 This is free software;
see the source for copying conditions. There is NO warranty; not even for
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 
Compiled (64-bit) with Qt 5.9.4, with WinPcap (4_1_3), with GLib 2.42.0, with
zlib 1.2.11, with SMI 0.4.8, with c-ares 1.14.0, with Lua 5.2.4, with GnuTLS
3.4.11, with Gcrypt 1.7.6, with MIT Kerberos, with MaxMind DB resolver, with
nghttp2 1.14.0, with LZ4, with Snappy, with libxml2 2.9.4, with QtMultimedia,
with AirPcap, with SBC, with SpanDSP, with bcg729. 
Running on 64-bit Windows 10, build 16299, with AMD Ryzen 7 1700 Eight-Core
Processor (with SSE4.2), with 16335 MB of physical memory, with locale
German_Germany.1252, with WinPcap version 4.1.3 (packet.dll version
4.1.0.2980), based on libpcap version 1.0 branch 1_0_rel0b (20091008), with
GnuTLS 3.4.11, with Gcrypt 1.7.6, without AirPcap, binary plugins supported (11
loaded). Built using Microsoft Visual C++ 14.12 build 25835 
Wireshark is Open Source Software released under the GNU General Public
License. 
Check the man page and http://www.wireshark.org for more information. 
--
If I open "Capture Options" -> "Manage Interfaces" to open a remote interface,
Wireshark now seems to try to connect to each host in the history of remote
interfaces to retrieve a list of its capture interfaces.

If I have many offline hosts, I get a timeout on each of these hosts and thus
I'm not able to use remote interfaces at all anymore as it takes me up to five
minutes until I'm able to select the desired interface.

-- 
You are receiving this mail because:
You are watching all bug changes.___
Sent via:Wireshark-bugs mailing list 
Archives:https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
 mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe