[Wireshark-bugs] [Bug 12922] TLS padding extension dissector length parsing bug

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12922 Alexis La Goutte changed: What|Removed |Added Status|UNCONFIRMED

[Wireshark-bugs] [Bug 12922] New: TLS padding extension dissector length parsing bug

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12922 Bug ID: 12922 Summary: TLS padding extension dissector length parsing bug Product: Wireshark Version: 2.0.5 Hardware: x86 OS: Linux (other) Status:

[Wireshark-bugs] [Bug 12687] SocketCAN dissector does not support CAN FD

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12687 --- Comment #72 from Guy Harris --- (In reply to Oliver Hartkopp from comment #71) > Do you know when these updated libpcap / Wireshark changes for CAN will > become an official release? I updated to Wireshark 2.2 on

[Wireshark-bugs] [Bug 12687] SocketCAN dissector does not support CAN FD

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12687 --- Comment #71 from Oliver Hartkopp --- (In reply to Guy Harris from comment #70) > (In reply to Guy Harris from comment #66) > > If so, then we can use PF_PACKET sockets and, in linux_check_direction() in > >

[Wireshark-bugs] [Bug 12687] SocketCAN dissector does not support CAN FD

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12687 --- Comment #70 from Guy Harris --- (In reply to Guy Harris from comment #66) > If so, then we can use PF_PACKET sockets and, in linux_check_direction() in > pcap-linux.c, reject PACKET_OUTGOING packets with a protocol

[Wireshark-bugs] [Bug 12874] Unable to dissect SPDY streams after a protocol switch in plain text

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12874 --- Comment #8 from Peter Wu --- (In reply to Alexis La Goutte from comment #7) > do be more precis : > Spdy uses endless zlib stream per connection, not per stream. Try decompress > incoming header block without

[Wireshark-bugs] [Bug 12874] Unable to dissect SPDY streams after a protocol switch in plain text

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12874 --- Comment #7 from Alexis La Goutte --- (In reply to Alexis La Goutte from comment #6) > (In reply to Peter Wu from comment #5) > > With the above patch SPDY dissector is invoked automatically. The latest > >

[Wireshark-bugs] [Bug 12874] Unable to dissect SPDY streams after a protocol switch in plain text

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12874 --- Comment #6 from Alexis La Goutte --- (In reply to Peter Wu from comment #5) > With the above patch SPDY dissector is invoked automatically. The latest > version (3.1) seems not to be supported though, I get

[Wireshark-bugs] [Bug 12751] Invalid memory access in UMTS-FP dissector

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12751 --- Comment #8 from Gerrit Code Review --- Change 17801 merged by Balint Reczey: FP: ensure that mac and rlc structures are always allocated https://code.wireshark.org/review/17801 -- You are

[Wireshark-bugs] [Bug 12752] Stack overflow in Catapult DCT2000 dissector

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12752 --- Comment #7 from Gerrit Code Review --- Change 17802 had a related patch set uploaded by Balint Reczey: DCT2000: prevent a stack buffer overflow https://code.wireshark.org/review/17802 -- You are

[Wireshark-bugs] [Bug 12751] Invalid memory access in UMTS-FP dissector

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12751 --- Comment #7 from Gerrit Code Review --- Change 17801 had a related patch set uploaded by Balint Reczey: FP: ensure that mac and rlc structures are always allocated

[Wireshark-bugs] [Bug 12782] Buildbot crash output: fuzz-2016-08-22-20350.pcap

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12782 --- Comment #7 from Gerrit Code Review --- Change 17799 had a related patch set uploaded by Balint Reczey: IPMI: do not use col_set_str with non const strings https://code.wireshark.org/review/17799 --

[Wireshark-bugs] [Bug 12750] Buffer overflow in Catapult DCT2000 dissector

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12750 --- Comment #7 from Gerrit Code Review --- Change 17798 had a related patch set uploaded by Balint Reczey: DCT2000: fix a buffer overflow in case of malformed packet

[Wireshark-bugs] [Bug 12921] New: Example capture of eap wlan identity

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12921 Bug ID: 12921 Summary: Example capture of eap wlan identity Product: Wireshark Version: Git Hardware: x86 OS: All Status: UNCONFIRMED Severity:

[Wireshark-bugs] [Bug 12907] Option 82 suboption 12 is displayed as Unknown in linux version of tshark

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12907 --- Comment #6 from Alexis La Goutte --- (In reply to Arvindkumar from comment #5) > In which release this fix will come into the stream. You can try nighty build of 2.3.x available

[Wireshark-bugs] [Bug 12907] Option 82 suboption 12 is displayed as Unknown in linux version of tshark

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12907 --- Comment #5 from Arvindkumar --- In which release this fix will come into the stream. -- You are receiving this mail because: You are watching all bug changes.

[Wireshark-bugs] [Bug 12899] DHCPv6 Option 53 is displayed as Unknown in option.type of tshark's linux version

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12899 Arvindkumar changed: What|Removed |Added Status|RESOLVED|VERIFIED

[Wireshark-bugs] [Bug 12071] Capture File Properties under Statistics Grayed Out after Stopping a Capture

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12071 --- Comment #7 from Gerrit Code Review --- Change 17792 had a related patch set uploaded by Pascal Quantin: Qt: fix some menus activation when stopping a capture https://code.wireshark.org/review/17792

[Wireshark-bugs] [Bug 12898] Export packet dissections Option disabled after capturing traffic

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12898 --- Comment #8 from Gerrit Code Review --- Change 17792 merged by Pascal Quantin: Qt: fix some menus activation when stopping a capture https://code.wireshark.org/review/17792 -- You are receiving

[Wireshark-bugs] [Bug 12898] Export packet dissections Option disabled after capturing traffic

2016-09-19 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12898 --- Comment #7 from Gerrit Code Review --- Change 17792 had a related patch set uploaded by Pascal Quantin: Qt: fix some menus activation when stopping a capture https://code.wireshark.org/review/17792