[Wireshark-bugs] [Bug 8801] Selecting multiple packets not working

2018-06-18 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8801 Guy Harris changed: What|Removed |Added See Also||https://bugs.wireshark.org/

[Wireshark-bugs] [Bug 14612] Selecting multiple packets, and copying packet summaries with a keyboard shortcut, should be supported

2018-06-18 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14612 Guy Harris changed: What|Removed |Added See Also||https://bugs.wireshark.org/

[Wireshark-bugs] [Bug 14329] support display of multiple comments in wireshark

2018-06-18 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14329 Guy Harris changed: What|Removed |Added OS|Linux |All Component|Capture file

[Wireshark-bugs] [Bug 14879] Patch to wireshark.git/diameter/dictionary.xml for S6t

2018-06-18 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14879 --- Comment #7 from Dave B --- I have submitted a few more along with the NIR-Flags that was introduced in version 15.3 released today from last week's 3GPP meetings. Changes are in: https://code.wireshark.org/review/28331 -- You are

[Wireshark-bugs] [Bug 14465] Valid packet produces Malformed Packet: OpcUa

2018-06-18 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14465 --- Comment #9 from Gerrit Code Review --- Change 28328 had a related patch set uploaded by Erika Szelleová: OpcUa: fix in function getExtensionObjectType https://code.wireshark.org/review/28328 -- You are receiving this mail because:

[Wireshark-bugs] [Bug 14465] Valid packet produces Malformed Packet: OpcUa

2018-06-18 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14465 --- Comment #8 from Erika Szelleova --- I think I have found the culprit. The function tried to read the value "numeric" (in this case: Identifier) but it tried to read the incorrect bytes (it moved 4 bytes to the right from the value

[Wireshark-bugs] [Bug 14879] Patch to wireshark.git/diameter/dictionary.xml for S6t

2018-06-18 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14879 --- Comment #6 from Anders Broman --- (In reply to Dave B from comment #5) > Thanks for the review Anders... And yes, I agree with you. > > * I added the Periodic-Communication-Indicator(3115) enumerations to > Periodic-time(3117) in

[Wireshark-bugs] [Bug 14879] Patch to wireshark.git/diameter/dictionary.xml for S6t

2018-06-18 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14879 --- Comment #5 from Dave B --- Thanks for the review Anders... And yes, I agree with you. * I added the Periodic-Communication-Indicator(3115) enumerations to Periodic-time(3117) in error. I will correct that. * I failed to catch

[Wireshark-bugs] [Bug 14465] Valid packet produces Malformed Packet: OpcUa

2018-06-18 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14465 --- Comment #7 from Mark Giraud --- The 8 bytes should be parsed as something like this: ###[ UaExtensionObject ]### \TypeId\ |###[ UaNumericNodeId ]### | Encoding = 2 | Namespace = 0 | Identifier= 0 Encoding =

[Wireshark-bugs] [Bug 14465] Valid packet produces Malformed Packet: OpcUa

2018-06-18 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14465 --- Comment #6 from Mark Giraud --- The last 8 bytes should be dissected as en ExtensionObject. This should be possible without any issues, since they are b'\x02\x00\x00\x00\x00\x00\x00\x00' I think there might be some kind of issue in

[Wireshark-bugs] [Bug 14629] Locally originated 802.11s (mesh) frames incorrectly dissected

2018-06-18 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14629 --- Comment #1 from Gerrit Code Review --- Change 27156 merged by Richard Sharpe: 802.11: Dissect locally originated mesh frames https://code.wireshark.org/review/27156 -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 14465] Valid packet produces Malformed Packet: OpcUa

2018-06-18 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14465 --- Comment #5 from Erika Szelleova --- OK, so the problem is that the AdditionalHeader is parsed as an ExtensionObject, however, according to the spec. it should be reserved for future use (see Part 4 p. 146). While parsing, the

[Wireshark-bugs] [Bug 14465] Valid packet produces Malformed Packet: OpcUa

2018-06-18 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14465 Erika Szelleova changed: What|Removed |Added Status|INCOMPLETE |IN_PROGRESS

[Wireshark-bugs] [Bug 14886] New: Buildbot crash output: fuzz-2018-06-17-12295.pcap

2018-06-18 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14886 Bug ID: 14886 Summary: Buildbot crash output: fuzz-2018-06-17-12295.pcap Product: Wireshark Version: unspecified Hardware: x86-64 OS: Ubuntu Status:

[Wireshark-bugs] [Bug 14879] Patch to wireshark.git/diameter/dictionary.xml for S6t

2018-06-18 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14879 Anders Broman changed: What|Removed |Added Status|INCOMPLETE |IN_PROGRESS --- Comment #4 from

[Wireshark-bugs] [Bug 14875] CRC header of SYNC PDU is calculated wrongly

2018-06-18 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14875 --- Comment #3 from Mina --- (In reply to Jaap Keuter from comment #1) > (In reply to Mina from comment #0) > > polynomial is 0x3F > > 0x3F or 0x37 ? Polynomial is 0x6F according to 3GPP TS 25.446. -- You are receiving this mail