[Wireshark-bugs] [Bug 13703] New: WiFi turns off on its own

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13703 Bug ID: 13703 Summary: WiFi turns off on its own Product: Wireshark Version: unspecified Hardware: Other OS: All Status: UNCONFIRMED Severity:

[Wireshark-bugs] [Bug 13702] wireshark does not dissect OpenFlow 1.5.1

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13702 --- Comment #2 from Gerrit Code Review --- Change 21624 had a related patch set uploaded by Michael Mann: Add basic support for OpenFlow 1.5.1 https://code.wireshark.org/review/21624 -- You are

[Wireshark-bugs] [Bug 13704] New: DTLS decryption failure: (Extension: Extended Master Secret) causes handshake decryption to fail

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13704 Bug ID: 13704 Summary: DTLS decryption failure: (Extension: Extended Master Secret) causes handshake decryption to fail Product: Wireshark Version: 2.2.6 Hardware:

[Wireshark-bugs] [Bug 13704] DTLS decryption failure: (Extension: Extended Master Secret) causes handshake decryption to fail

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13704 --- Comment #1 from raisonbran...@gmail.com --- Created attachment 15542 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=15542=edit Packet capture. Encrypted Handshake Message fails to decrypt. -- You are receiving this mail

[Wireshark-bugs] [Bug 13704] DTLS decryption failure: (Extension: Extended Master Secret) causes handshake decryption to fail

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13704 raisonbran...@gmail.com changed: What|Removed |Added CC||raisonbran...@gmail.com

[Wireshark-bugs] [Bug 13704] DTLS decryption failure: (Extension: Extended Master Secret) causes handshake decryption to fail

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13704 --- Comment #2 from raisonbran...@gmail.com --- Created attachment 15543 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=15543=edit server RSA key -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 13699] ldap protocol - can't define multiple ports

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13699 Jan changed: What|Removed |Added Hardware|x86 |x86-64

[Wireshark-bugs] [Bug 13699] New: ldap protocol - can't define multiple ports

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13699 Bug ID: 13699 Summary: ldap protocol - can't define multiple ports Product: Wireshark Version: 2.2.6 Hardware: x86 OS: Windows 7 Status: UNCONFIRMED

[Wireshark-bugs] [Bug 13690] SMB protocol parser does not parse SMB_COM_TRANSACTION2_SECONDARY (0x33) command correctly

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13690 --- Comment #5 from Alex --- (In reply to Alexis La Goutte from comment #4) > There is actually a check on WordCount (wc) if it is wc=8 but on your pcap > it is wc = 9 > > don't known why ? Look at this

[Wireshark-bugs] [Bug 13695] STOMP dissector required

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13695 Uli Heilmeier changed: What|Removed |Added Status|UNCONFIRMED |CONFIRMED

[Wireshark-bugs] [Bug 13695] STOMP dissector required

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13695 --- Comment #2 from Jaap Keuter --- Prime candidate for tvbparse I would say. -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 13698] SIP packets with SDP marked as malformed

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13698 --- Comment #2 from Jan --- not sure if it's a problem.. as per RFC 7243: rtcp-xr-attrib = "a=" "rtcp-xr" ":" [xr-format *(SP xr-format)] CRLF ; defined in [RFC3611] and in 3611: rtcp-xr-attrib

[Wireshark-bugs] [Bug 13698] SIP packets with SDP marked as malformed

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13698 --- Comment #3 from Jaap Keuter --- But check RFC 3611 Errata ID 3795: Status: Verified Type: Technical Reported By: Stephen James Date Reported: 2013-11-11 Verifier Name: Ben Campbell Date Verified: 2015-07-22

[Wireshark-bugs] [Bug 13690] SMB protocol parser does not parse SMB_COM_TRANSACTION2_SECONDARY (0x33) command correctly

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13690 --- Comment #4 from Alexis La Goutte --- There is actually a check on WordCount (wc) if it is wc=8 but on your pcap it is wc = 9 don't known why ? -- You are receiving this mail because: You are watching all

[Wireshark-bugs] [Bug 13698] New: SIP packets with SDP marked as malformed

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13698 Bug ID: 13698 Summary: SIP packets with SDP marked as malformed Product: Wireshark Version: 2.2.6 Hardware: x86-64 OS: Windows 7 Status: UNCONFIRMED

[Wireshark-bugs] [Bug 13698] SIP packets with SDP marked as malformed

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13698 --- Comment #1 from Jaap Keuter --- What's with the colon while no parameter value follows? -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 13700] New: TCP retransmission with additional payload leads to incorrect bytes and length in stream

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13700 Bug ID: 13700 Summary: TCP retransmission with additional payload leads to incorrect bytes and length in stream Product: Wireshark Version: 2.2.6 Hardware: x86-64

[Wireshark-bugs] [Bug 13701] [oss-fuzz] UBSAN: division by zero in packet-btl2cap.c:1687:87

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13701 --- Comment #1 from Peter Wu --- Created attachment 15538 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=15538=edit Packet capture file -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 13701] New: [oss-fuzz] UBSAN: division by zero in packet-btl2cap.c:1687:87

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13701 Bug ID: 13701 Summary: [oss-fuzz] UBSAN: division by zero in packet-btl2cap.c:1687:87 Product: Wireshark Version: Git Hardware: x86-64 URL:

[Wireshark-bugs] [Bug 13693] [oss-fuzz] timeout: get_chancount epan/dissectors/packet-thread.c:908:35

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13693 --- Comment #3 from Gerrit Code Review --- Change 21620 merged by Anders Broman: Thread CoAP: fix 2 potential infinite loops https://code.wireshark.org/review/21620 -- You are receiving this mail

[Wireshark-bugs] [Bug 13701] [oss-fuzz] UBSAN: division by zero in packet-btl2cap.c:1687:87

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13701 --- Comment #5 from Gerrit Code Review --- Change 21621 merged by Pascal Quantin: BT L2CAP: avoid a division by 0 https://code.wireshark.org/review/21621 -- You are receiving this mail because: You

[Wireshark-bugs] [Bug 13701] [oss-fuzz] UBSAN: division by zero in packet-btl2cap.c:1687:87

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13701 --- Comment #4 from Gerrit Code Review --- Change 21621 had a related patch set uploaded by Pascal Quantin: BT L2CAP: avoid a division by 0 https://code.wireshark.org/review/21621 -- You are receiving

[Wireshark-bugs] [Bug 13701] [oss-fuzz] UBSAN: division by zero in packet-btl2cap.c:1687:87

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13701 --- Comment #7 from Gerrit Code Review --- Change 21622 merged by Pascal Quantin: BT L2CAP: avoid a division by 0 https://code.wireshark.org/review/21622 -- You are receiving this mail because: You

[Wireshark-bugs] [Bug 13701] [oss-fuzz] UBSAN: division by zero in packet-btl2cap.c:1687:87

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13701 --- Comment #6 from Gerrit Code Review --- Change 21622 had a related patch set uploaded by Pascal Quantin: BT L2CAP: avoid a division by 0 https://code.wireshark.org/review/21622 -- You are receiving

[Wireshark-bugs] [Bug 13701] [oss-fuzz] UBSAN: division by zero in packet-btl2cap.c:1687:87

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13701 Pascal Quantin changed: What|Removed |Added Resolution|--- |FIXED

[Wireshark-bugs] [Bug 13693] [oss-fuzz] timeout: get_chancount epan/dissectors/packet-thread.c:908:35

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13693 Pascal Quantin changed: What|Removed |Added CC|

[Wireshark-bugs] [Bug 13702] New: wireshark does not dissect OpenFlow 1.5.1

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13702 Bug ID: 13702 Summary: wireshark does not dissect OpenFlow 1.5.1 Product: Wireshark Version: 2.2.6 Hardware: All OS: All Status: UNCONFIRMED

[Wireshark-bugs] [Bug 13702] wireshark does not dissect OpenFlow 1.5.1

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13702 Arc changed: What|Removed |Added CC||zenta...@rambler.ru

[Wireshark-bugs] [Bug 13702] wireshark does not dissect OpenFlow 1.5.1

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13702 Arc changed: What|Removed |Added Priority|Low |Medium -- You are

[Wireshark-bugs] [Bug 13702] wireshark does not dissect OpenFlow 1.5.1

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13702 Arc changed: What|Removed |Added Priority|Medium |Low -- You are

[Wireshark-bugs] [Bug 13701] [oss-fuzz] UBSAN: division by zero in packet-btl2cap.c:1687:87

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13701 --- Comment #2 from Gerrit Code Review --- Change 21618 had a related patch set uploaded by Pascal Quantin: BT L2CAP: avoid a division by 0 https://code.wireshark.org/review/21618 -- You are receiving

[Wireshark-bugs] [Bug 13693] [oss-fuzz] timeout: get_chancount epan/dissectors/packet-thread.c:908:35

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13693 --- Comment #2 from Gerrit Code Review --- Change 21620 had a related patch set uploaded by Pascal Quantin: Thread CoAP: fix 2 potential infinite loops https://code.wireshark.org/review/21620 -- You

[Wireshark-bugs] [Bug 13701] [oss-fuzz] UBSAN: division by zero in packet-btl2cap.c:1687:87

2017-05-12 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13701 --- Comment #3 from Gerrit Code Review --- Change 21618 merged by Anders Broman: BT L2CAP: avoid a division by 0 https://code.wireshark.org/review/21618 -- You are receiving this mail because: You are