[Wireshark-bugs] [Bug 16447] Wireshark not passing correct options to sshdump in macOS

2020-03-23 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16447 --- Comment #8 from Rodrigo Ventura --- The buttons are indeed there and I entirely missed them - my bad. The password is lost and one has to retype it, which is understandable for security reasons. However, wireshark hangs in this situa

[Wireshark-bugs] [Bug 16455] New: IPv6 Extension Headers not high not highlighted in Packet Byte Pane

2020-03-23 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16455 Bug ID: 16455 Summary: IPv6 Extension Headers not high not highlighted in Packet Byte Pane Product: Wireshark Version: 3.2.0 Hardware: x86 OS: Window

[Wireshark-bugs] [Bug 16455] IPv6 Extension Headers not highlighted in Packet Byte Pane

2020-03-23 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16455 leut...@netsniffing.ch changed: What|Removed |Added Summary|IPv6 Extension Headers not |IPv6 Extension Headers no

[Wireshark-bugs] [Bug 16455] IPv6 Extension Headers not highlighted in Packet Byte Pane

2020-03-23 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16455 --- Comment #1 from leut...@netsniffing.ch --- Created attachment 17685 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=17685&action=edit Screenshot 1 -- You are receiving this mail because: You are watching all bug changes._

[Wireshark-bugs] [Bug 16455] IPv6 Extension Headers not highlighted in Packet Byte Pane

2020-03-23 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16455 --- Comment #2 from leut...@netsniffing.ch --- Created attachment 17686 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=17686&action=edit Screenshot 2 -- You are receiving this mail because: You are watching all bug changes._

[Wireshark-bugs] [Bug 16455] IPv6 Extension Headers not highlighted in Packet Byte Pane

2020-03-23 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16455 leut...@netsniffing.ch changed: What|Removed |Added CC||leut...@netsniffing.ch -

[Wireshark-bugs] [Bug 16455] IPv6 Extension Headers not highlighted in Packet Byte Pane

2020-03-23 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16455 Alexis La Goutte changed: What|Removed |Added CC||alexis.lagou...@gmail.com,

[Wireshark-bugs] [Bug 16455] IPv6 Extension Headers not highlighted in Packet Byte Pane

2020-03-23 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16455 leut...@netsniffing.ch changed: What|Removed |Added Attachment #17685|0 |1 is obsolete|

[Wireshark-bugs] [Bug 16455] IPv6 Extension Headers not highlighted in Packet Byte Pane

2020-03-23 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16455 --- Comment #4 from Christopher Maynard --- (In reply to leut...@netsniffing.ch from comment #0) > If you select an IPv6 header (with extensions) in the (collapsed) Packet > Details, only the IPv6 Base header (40 Bytes) is marked in the Pa

[Wireshark-bugs] [Bug 16455] IPv6 Extension Headers not highlighted in Packet Byte Pane

2020-03-23 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16455 João Valverde changed: What|Removed |Added Ever confirmed|0 |1 Status|UNCONFIRMED

[Wireshark-bugs] [Bug 16456] New: SNMP MIB Data Not Fully Decoded

2020-03-23 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16456 Bug ID: 16456 Summary: SNMP MIB Data Not Fully Decoded Product: Wireshark Version: 3.2.2 Hardware: x86-64 OS: Windows 8.1 Status: UNCONFIRMED Sever

[Wireshark-bugs] [Bug 16456] SNMP MIB Data Not Fully Decoded

2020-03-23 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16456 --- Comment #1 from Tim L --- Created attachment 17689 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=17689&action=edit MIB decode with existing libsmi -- You are receiving this mail because: You are watching all bug changes

[Wireshark-bugs] [Bug 16456] SNMP MIB Data Not Fully Decoded

2020-03-23 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16456 --- Comment #2 from Tim L --- Created attachment 17690 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=17690&action=edit MIB decode with rebuilt libsmi -- You are receiving this mail because: You are watching all bug changes.

[Wireshark-bugs] [Bug 16454] RFC8613 OSCORE - COAP Option Number 9 is reported as unknown. Option Number 21 is accepted as OSCORE Option, in contradiction to RFC8613.

2020-03-23 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16454 Guy Harris changed: What|Removed |Added Resolution|--- |FIXED Status|CONFIRMED

[Wireshark-bugs] [Bug 16456] SNMP MIB Data Not Fully Decoded

2020-03-24 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16456 Jaap Keuter changed: What|Removed |Added Component|Dissection engine |Build process |(l

[Wireshark-bugs] [Bug 16457] New: tshark logs: "...could not be opened: Too many open files."

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16457 Bug ID: 16457 Summary: tshark logs: "...could not be opened: Too many open files." Product: Wireshark Version: 3.2.2 Hardware: x86-64 OS: SuSE

[Wireshark-bugs] [Bug 16457] tshark logs: "...could not be opened: Too many open files."

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16457 --- Comment #1 from fabian --- The older version of tshark where this error does not occur was: TShark (Wireshark) 2.4.16 (v2.4.16) If I run: $ ls -l /proc/$(ps -C tshark -o pid= | tr -d " ")/fd I get some files and sockets, but only o

[Wireshark-bugs] [Bug 16453] Decryption tests fail on ubuntu

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16453 Dario Lombardo changed: What|Removed |Added CC||pe...@lekensteyn.nl --- Comment

[Wireshark-bugs] [Bug 16455] IPv6 Extension Headers not highlighted in Packet Byte Pane

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16455 --- Comment #6 from leut...@netsniffing.ch --- B.t.w. If you select frame one in the enclosed file, the highlight works correct and markes all 48 bytes! (See Screenshot 3) -- You are receiving this mail because: You are watching all bug

[Wireshark-bugs] [Bug 16455] IPv6 Extension Headers not highlighted in Packet Byte Pane

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16455 --- Comment #7 from leut...@netsniffing.ch --- Created attachment 17691 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=17691&action=edit Screenshot 3 -- You are receiving this mail because: You are watching all bug changes._

[Wireshark-bugs] [Bug 16453] Decryption tests fail on ubuntu

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16453 Peter Wu changed: What|Removed |Added CC||mikael.kanst...@gmail.com --- Comment

[Wireshark-bugs] [Bug 14660] Create color rule from Filter

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14660 David Perry changed: What|Removed |Added CC||boolean...@gmail.com --- Comment #5

[Wireshark-bugs] [Bug 14660] Create color rule from Filter

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14660 --- Comment #6 from David Perry --- Created attachment 17693 --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=17693&action=edit Screenshot showing the proposed UI changes -- You are receiving this mail because: You are watchin

[Wireshark-bugs] [Bug 16453] Decryption tests fail on ubuntu

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16453 --- Comment #4 from Dario Lombardo --- Well, I didn't notice it's working again. That makes the search much more difficult. I'll try with ASAN, I may be lucky with some memory issue. -- You are receiving this mail because: You are watchi

[Wireshark-bugs] [Bug 16453] Decryption tests fail on ubuntu

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16453 --- Comment #5 from Mikael Kanstrup --- This one was tricky. The error either means decryption failed or that tshark for some other reason cannot parse ARP properly. I've executed the tests successfully locally before uploading my patches

[Wireshark-bugs] [Bug 16453] Decryption tests fail on ubuntu

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16453 --- Comment #6 from Mikael Kanstrup --- Valgrind unfortunately did not complain. Tried the following with proper 80211_keys configured: valgrind --tool=memcheck --leak-check=full ./run/tshark -r ../wireshark/test/captures/owe.pcapng.gz -

[Wireshark-bugs] [Bug 16453] Decryption tests fail on ubuntu

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16453 --- Comment #7 from Dario Lombardo --- ASAN didn't complain as well with your command. -- You are receiving this mail because: You are watching all bug changes.___ S

[Wireshark-bugs] [Bug 16455] IPv6 Extension Headers not highlighted in Packet Byte Pane

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16455 --- Comment #8 from Jaap Keuter --- (In reply to leut...@netsniffing.ch from comment #6) > B.t.w. If you select frame one in the enclosed file, the highlight works > correct and markes all 48 bytes! (See Screenshot 3) This only happens i

[Wireshark-bugs] [Bug 16453] Decryption tests fail on ubuntu

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16453 --- Comment #8 from Mikael Kanstrup --- Not sure if you saw already but first I didn't. In the failing log there are a bunch of tests failing. Most of them are decryption tests but there are other failing tests too. == 33 failed, 517

[Wireshark-bugs] [Bug 16453] Decryption tests fail on ubuntu

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16453 --- Comment #9 from Dario Lombardo --- (In reply to Mikael Kanstrup from comment #8) > Not sure if you saw already but first I didn't. In the failing log there are > a bunch of tests failing. Most of them are decryption tests but there are

[Wireshark-bugs] [Bug 16453] Decryption tests fail on ubuntu

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16453 --- Comment #10 from Peter Wu --- You could try to diff the full build logs for both builds, perhaps it is a bug in the compiler or one of the other Ubuntu packages? @Mikael it may be worth setting WIRESHARK_CONFIG_DIR=/x or HOME=/x befor

[Wireshark-bugs] [Bug 16457] tshark logs: "...could not be opened: Too many open files."

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16457 --- Comment #2 from Guy Harris --- (In reply to fabian from comment #0) > I can see, that tshark is still pointing to the captured files which were > moved by the other service: Yes, TShark simply should not have to have anywhere near 102

[Wireshark-bugs] [Bug 16457] tshark logs: "...could not be opened: Too many open files."

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16457 Guy Harris changed: What|Removed |Added Ever confirmed|0 |1 Status|UNCONFIRMED

[Wireshark-bugs] [Bug 16457] tshark logs: "...could not be opened: Too many open files."

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16457 --- Comment #4 from Gerrit Code Review --- Change 36580 had a related patch set uploaded by Guy Harris: Maintain cf->state, because file cleanup depends on it. https://code.wireshark.org/review/36580 -- You are receiving this mail becau

[Wireshark-bugs] [Bug 16457] tshark logs: "...could not be opened: Too many open files."

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16457 --- Comment #6 from Gerrit Code Review --- Change 36581 had a related patch set uploaded by Guy Harris: Maintain cf->state, because file cleanup depends on it. https://code.wireshark.org/review/36581 -- You are receiving this mail becau

[Wireshark-bugs] [Bug 16457] tshark logs: "...could not be opened: Too many open files."

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16457 --- Comment #5 from Gerrit Code Review --- Change 36580 merged by Guy Harris: Maintain cf->state, because file cleanup depends on it. https://code.wireshark.org/review/36580 -- You are receiving this mail because: You are watching all b

[Wireshark-bugs] [Bug 16457] tshark logs: "...could not be opened: Too many open files."

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16457 --- Comment #7 from Gerrit Code Review --- Change 36581 merged by Guy Harris: Maintain cf->state, because file cleanup depends on it. https://code.wireshark.org/review/36581 -- You are receiving this mail because: You are watching all b

[Wireshark-bugs] [Bug 16457] tshark logs: "...could not be opened: Too many open files."

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16457 Guy Harris changed: What|Removed |Added Status|CONFIRMED |RESOLVED Resolution|---

[Wireshark-bugs] [Bug 16457] tshark logs: "...could not be opened: Too many open files."

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16457 --- Comment #9 from Gerrit Code Review --- Change 36582 merged by Guy Harris: Maintain cf->state, because file cleanup depends on it. https://code.wireshark.org/review/36582 -- You are receiving this mail because: You are watching all b

[Wireshark-bugs] [Bug 16457] tshark logs: "...could not be opened: Too many open files."

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16457 --- Comment #8 from Gerrit Code Review --- Change 36582 had a related patch set uploaded by Guy Harris: Maintain cf->state, because file cleanup depends on it. https://code.wireshark.org/review/36582 -- You are receiving this mail becau

[Wireshark-bugs] [Bug 13597] Adding or removing columns causes scrollbar havoc.

2020-03-25 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13597 Dylan changed: What|Removed |Added Ever confirmed|0 |1 Status|UNCONFIRMED

[Wireshark-bugs] [Bug 16458] New: Read of uninitialized memory in detect_camins_file

2020-03-26 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16458 Bug ID: 16458 Summary: Read of uninitialized memory in detect_camins_file Product: Wireshark Version: Git Hardware: x86 OS: Linux Status: UNCONFIRMED

[Wireshark-bugs] [Bug 16459] New: Read of uninitialized memory in lanalyzer_read_trace_record

2020-03-26 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16459 Bug ID: 16459 Summary: Read of uninitialized memory in lanalyzer_read_trace_record Product: Wireshark Version: Git Hardware: x86 OS: Linux

[Wireshark-bugs] [Bug 16460] New: Read of uninitialized memory in pntoh16

2020-03-26 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16460 Bug ID: 16460 Summary: Read of uninitialized memory in pntoh16 Product: Wireshark Version: Git Hardware: x86 OS: Linux Status: UNCONFIRMED Severity

[Wireshark-bugs] [Bug 16461] New: Read of uninitialized memory in find_signature

2020-03-26 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16461 Bug ID: 16461 Summary: Read of uninitialized memory in find_signature Product: Wireshark Version: Git Hardware: x86 OS: Linux Status: UNCONFIRMED S

[Wireshark-bugs] [Bug 16462] New: Signed Overflow in nstime_delta

2020-03-26 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16462 Bug ID: 16462 Summary: Signed Overflow in nstime_delta Product: Wireshark Version: Git Hardware: x86 OS: Linux Status: UNCONFIRMED Severity: Major

[Wireshark-bugs] [Bug 16463] New: Signed Overflow in *nstime_cmp*

2020-03-26 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16463 Bug ID: 16463 Summary: Signed Overflow in *nstime_cmp* Product: Wireshark Version: Git Hardware: x86 OS: Linux Status: UNCONFIRMED Severity: Major

[Wireshark-bugs] [Bug 16464] New: Signed Overflow in peekclassic_read_packet_v7

2020-03-26 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16464 Bug ID: 16464 Summary: Signed Overflow in peekclassic_read_packet_v7 Product: Wireshark Version: Git Hardware: x86 OS: Linux Status: UNCONFIRMED Se

[Wireshark-bugs] [Bug 16457] tshark logs: "...could not be opened: Too many open files."

2020-03-26 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16457 --- Comment #11 from fabian --- Thanks for this fast fix :-) -- You are receiving this mail because: You are watching all bug changes.___ Sent via:Wireshark-bugs

[Wireshark-bugs] [Bug 16465] New: Signed Overflow in ber_open

2020-03-26 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16465 Bug ID: 16465 Summary: Signed Overflow in ber_open Product: Wireshark Version: Git Hardware: x86 OS: Linux Status: UNCONFIRMED Severity: Major

[Wireshark-bugs] [Bug 16453] Decryption tests fail on ubuntu

2020-03-26 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16453 --- Comment #11 from Mikael Kanstrup --- (In reply to Peter Wu from comment #10) > @Mikael it may be worth setting WIRESHARK_CONFIG_DIR=/x or HOME=/x before > running valgrind. This ensures that the test is executed with an empty > configu

[Wireshark-bugs] [Bug 16453] Decryption tests fail on ubuntu

2020-03-26 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16453 --- Comment #12 from Dario Lombardo --- No they don't look so. But I haven't seen them in the test log I checked. Which CI are you looking at? -- You are receiving this mail because: You are watching all bug changes._

[Wireshark-bugs] [Bug 16453] Decryption tests fail on ubuntu

2020-03-26 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16453 --- Comment #13 from Mikael Kanstrup --- (In reply to Dario Lombardo from comment #12) > No they don't look so. But I haven't seen them in the test log I checked. > Which CI are you looking at? The one Peter shared. Build 189: https://git

[Wireshark-bugs] [Bug 13569] RTP PLAYER enhancement Pause , resume and ability to move playback , increase ICON legend

2020-03-26 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13569 Chuck Craft changed: What|Removed |Added CC||bubbas...@gmail.com --- Comment #1

[Wireshark-bugs] [Bug 16466] New: LBMSRS packet upload for review

2020-03-26 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16466 Bug ID: 16466 Summary: LBMSRS packet upload for review Product: Wireshark Version: unspecified Hardware: x86-64 OS: Windows 10 Status: UNCONFIRMED

[Wireshark-bugs] [Bug 13845] Progress bar not displayed in RTP audio stream playback when 'Time of Day' check box selected

2020-03-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13845 Mitch Claborn changed: What|Removed |Added CC||mi...@mmhatch.com -- You are rec

[Wireshark-bugs] [Bug 13845] Progress bar not displayed in RTP audio stream playback when 'Time of Day' check box selected

2020-03-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13845 --- Comment #1 from Mitch Claborn --- This is a problem in 3.2.2 -- You are receiving this mail because: You are watching all bug changes.___ Sent via:Wireshark-

[Wireshark-bugs] [Bug 16153] Window size scaling factor when set from Preferences

2020-03-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16153 --- Comment #1 from Gerrit Code Review --- Change 36610 had a related patch set uploaded by Martin Mathieson: When using preference for window scaling, show same way as signalled. https://code.wireshark.org/review/36610 -- You are recei

[Wireshark-bugs] [Bug 16462] Signed Overflow in nstime_delta

2020-03-28 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16462 Martin Mathieson changed: What|Removed |Added CC||ghar...@sonic.net,

[Wireshark-bugs] [Bug 16153] Window size scaling factor when set from Preferences

2020-03-29 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16153 --- Comment #2 from Gerrit Code Review --- Change 36610 merged by Martin Mathieson: When using preference for window scaling, show same way as signalled. https://code.wireshark.org/review/36610 -- You are receiving this mail because: Yo

[Wireshark-bugs] [Bug 16453] Decryption tests fail on Ubuntu with GitHub actions

2020-03-29 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16453 Peter Wu changed: What|Removed |Added Resolution|--- |WORKSFORME Summary|Decrypti

[Wireshark-bugs] [Bug 16453] Decryption tests fail on Ubuntu with GitHub actions

2020-03-29 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16453 --- Comment #15 from Dario Lombardo --- I ended up to the same conclusion. Something their side. I was waiting for a "sentiment timeout" before closing this bug. -- You are receiving this mail because: You are watching all bug changes.__

[Wireshark-bugs] [Bug 16467] New: Documentation - ${parameter} overloading of Display Filter Macro syntax

2020-03-29 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16467 Bug ID: 16467 Summary: Documentation - ${parameter} overloading of Display Filter Macro syntax Product: Wireshark Version: unspecified Hardware: All

[Wireshark-bugs] [Bug 16463] Signed Overflow in *nstime_cmp*

2020-03-30 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16463 Martin Mathieson changed: What|Removed |Added CC||martin.r.mathieson@googlema

[Wireshark-bugs] [Bug 16343] Wrong "clock drift" and "freq drift" in "RTP stream analysis" window

2020-03-30 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16343 Martin Mathieson changed: What|Removed |Added Resolution|--- |FIXED CC|

[Wireshark-bugs] [Bug 15841] Scaling Factor preference is used even when TCP handshake does not support Window Scaling

2020-03-30 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15841 Martin Mathieson changed: What|Removed |Added CC||martin.r.mathieson@googlema

[Wireshark-bugs] [Bug 16415] Support for IEEE 802.11 60GHz Information Element

2020-03-30 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16415 Peter Wu changed: What|Removed |Added Comment #3 is|1 |0 private|

[Wireshark-bugs] [Bug 16426] Support for new 802.11ad-2012 DMG fixed parameters

2020-03-30 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16426 Peter Wu changed: What|Removed |Added Comment #4 is|1 |0 private|

[Wireshark-bugs] [Bug 16468] New: f5ethtrailer can't find trailer when short frame contains padding

2020-03-30 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16468 Bug ID: 16468 Summary: f5ethtrailer can't find trailer when short frame contains padding Product: Wireshark Version: 3.2.2 Hardware: x86 OS: macOS 10

[Wireshark-bugs] [Bug 16468] f5ethtrailer can't find trailer when short frame contains padding

2020-03-30 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16468 --- Comment #1 from Jason Cohen --- More specific output related to the fields in question: $ tshark -r short-frames.pcap -T fields -e eth.padding -e eth.trailer -e f5ethtrailer.trailer_magic f5deb0f5006b0001000100 f5deb0f5006b0001000100

[Wireshark-bugs] [Bug 15841] Scaling Factor preference is used even when TCP handshake does not support Window Scaling

2020-03-30 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15841 --- Comment #2 from Gerrit Code Review --- Change 36637 had a related patch set uploaded by Martin Mathieson: TCP: Don't scale calculated window size using preference if no scaling signalled. https://code.wireshark.org/review/36637 -- Y

[Wireshark-bugs] [Bug 15959] TCP Calculated Window Size is incorrect when no window scaling -2 is used, scale factor from preferences is used

2020-03-30 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15959 --- Comment #1 from Gerrit Code Review --- Change 36637 had a related patch set uploaded by Martin Mathieson: TCP: Don't scale calculated window size using preference if no scaling signalled. https://code.wireshark.org/review/36637 -- Y

[Wireshark-bugs] [Bug 16468] f5ethtrailer can't find trailer when short frame contains padding

2020-03-30 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16468 Peter Wu changed: What|Removed |Added CC||pe...@lekensteyn.nl,

[Wireshark-bugs] [Bug 16375] [oss-fuzz] Direct-leak in g_malloc (dissect_dhcpopt_sip_servers)

2020-03-31 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16375 --- Comment #1 from Gerrit Code Review --- Change 36640 had a related patch set uploaded by Yannan: [WIP] Fuzz test memory leak fix, partial https://code.wireshark.org/review/36640 -- You are receiving this mail because: You are watchin

[Wireshark-bugs] [Bug 15841] Scaling Factor preference is used even when TCP handshake does not support Window Scaling

2020-03-31 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15841 --- Comment #3 from Gerrit Code Review --- Change 36637 merged by Martin Mathieson: TCP: Don't scale calculated window size using preference if no scaling signalled https://code.wireshark.org/review/36637 -- You are receiving this mail

[Wireshark-bugs] [Bug 15959] TCP Calculated Window Size is incorrect when no window scaling -2 is used, scale factor from preferences is used

2020-03-31 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15959 --- Comment #2 from Gerrit Code Review --- Change 36637 merged by Martin Mathieson: TCP: Don't scale calculated window size using preference if no scaling signalled https://code.wireshark.org/review/36637 -- You are receiving this mail

[Wireshark-bugs] [Bug 16469] New: ieee80211: Dissection of Beacon Measurement request/report not complete

2020-03-31 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16469 Bug ID: 16469 Summary: ieee80211: Dissection of Beacon Measurement request/report not complete Product: Wireshark Version: 3.2.2 Hardware: x86 OS: A

[Wireshark-bugs] [Bug 15959] TCP Calculated Window Size is incorrect when no window scaling -2 is used, scale factor from preferences is used

2020-03-31 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15959 Martin Mathieson changed: What|Removed |Added CC||martin.r.mathieson@googlema

[Wireshark-bugs] [Bug 15841] Scaling Factor preference is used even when TCP handshake does not support Window Scaling

2020-03-31 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15841 Martin Mathieson changed: What|Removed |Added Resolution|--- |FIXED Status|UNCON

[Wireshark-bugs] [Bug 16469] ieee80211: Dissection of Beacon Measurement request/report not complete

2020-03-31 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16469 Alexis La Goutte changed: What|Removed |Added Status|UNCONFIRMED |IN_PROGRESS CC

[Wireshark-bugs] [Bug 16470] New: The IEEE 802.3br frame preemption dissector is confused by unrelated packets

2020-03-31 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16470 Bug ID: 16470 Summary: The IEEE 802.3br frame preemption dissector is confused by unrelated packets Product: Wireshark Version: 2.6.10 Hardware: x86

[Wireshark-bugs] [Bug 16470] The IEEE 802.3br frame preemption dissector is confused by unrelated packets

2020-03-31 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16470 --- Comment #1 from levente.mesza...@gmail.com --- I've just checked Wireshark 3.2.2 and it has the same problem. -- You are receiving this mail because: You are watching all bug changes.___

[Wireshark-bugs] [Bug 16471] New: Add support for dissecting ScyllaDB RPC protocol

2020-03-31 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16471 Bug ID: 16471 Summary: Add support for dissecting ScyllaDB RPC protocol Product: Wireshark Version: Git Hardware: x86 OS: Linux Status: UNCONFIRMED

[Wireshark-bugs] [Bug 16469] ieee80211: Dissection of Beacon Measurement request/report not complete

2020-03-31 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16469 --- Comment #1 from Gerrit Code Review --- Change 36643 had a related patch set uploaded by cedric izoard: ieee80211: Beacon Radio Measurement request/report update https://code.wireshark.org/review/36643 -- You are receiving this mail

[Wireshark-bugs] [Bug 16472] New: Typo in About Wireshark > Keyboard Shortcuts > Unignore All Displayed

2020-03-31 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16472 Bug ID: 16472 Summary: Typo in About Wireshark > Keyboard Shortcuts > Unignore All Displayed Product: Wireshark Version: 3.2.2 Hardware: x86 OS: macO

[Wireshark-bugs] [Bug 16472] Typo in About Wireshark > Keyboard Shortcuts > Unignore All Displayed

2020-04-01 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16472 --- Comment #1 from Gerrit Code Review --- Change 36651 had a related patch set uploaded by Uli Heilmeier: QT/UI: Fix shortcut https://code.wireshark.org/review/36651 -- You are receiving this mail because: You are watching all bug chan

[Wireshark-bugs] [Bug 16472] Typo in About Wireshark > Keyboard Shortcuts > Unignore All Displayed

2020-04-01 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16472 Uli Heilmeier changed: What|Removed |Added Version|3.2.2 |Git Ever confirmed|0

[Wireshark-bugs] [Bug 16329] Error while capturing packets: PacketReceivePacket error: The I/O operation has been aborted because of either a thread exit or an application request. (995)

2020-04-01 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16329 jwhit...@lakers.mercyhurst.edu changed: What|Removed |Added CC||jwhite30@lakers.me

[Wireshark-bugs] [Bug 16473] New: 16329

2020-04-01 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16473 Bug ID: 16473 Summary: 16329 Product: Wireshark Version: unspecified Hardware: x86-64 OS: Windows 10 Status: UNCONFIRMED Severity: Normal

[Wireshark-bugs] [Bug 16473] 16329

2020-04-01 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16473 Pascal Quantin changed: What|Removed |Added Resolution|--- |NOTABUG Status|UNCON

[Wireshark-bugs] [Bug 16472] Typo in About Wireshark > Keyboard Shortcuts > Unignore All Displayed

2020-04-01 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16472 --- Comment #2 from Gerrit Code Review --- Change 36651 merged by Gerald Combs: QT/UI: Fix shortcut https://code.wireshark.org/review/36651 -- You are receiving this mail because: You are watching all bug changes.___

[Wireshark-bugs] [Bug 16472] Typo in About Wireshark > Keyboard Shortcuts > Unignore All Displayed

2020-04-01 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16472 --- Comment #4 from Gerrit Code Review --- Change 36658 had a related patch set uploaded by Uli Heilmeier: QT/UI: Fix shortcut https://code.wireshark.org/review/36658 -- You are receiving this mail because: You are watching all bug chan

[Wireshark-bugs] [Bug 16472] Typo in About Wireshark > Keyboard Shortcuts > Unignore All Displayed

2020-04-01 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16472 --- Comment #3 from Gerrit Code Review --- Change 36657 had a related patch set uploaded by Uli Heilmeier: QT/UI: Fix shortcut https://code.wireshark.org/review/36657 -- You are receiving this mail because: You are watching all bug chan

[Wireshark-bugs] [Bug 16474] New: [oss-fuzz] #21541: Stack-overflow in fAbstractSyntaxNType

2020-04-01 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16474 Bug ID: 16474 Summary: [oss-fuzz] #21541: Stack-overflow in fAbstractSyntaxNType Product: Wireshark Version: unspecified Hardware: All OS: All

[Wireshark-bugs] [Bug 16472] Typo in About Wireshark > Keyboard Shortcuts > Unignore All Displayed

2020-04-01 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16472 --- Comment #5 from Gerrit Code Review --- Change 36657 merged by Gerald Combs: QT/UI: Fix shortcut https://code.wireshark.org/review/36657 -- You are receiving this mail because: You are watching all bug changes.___

[Wireshark-bugs] [Bug 16473] PacketReceivePacket error - "thread error or an application request" (995)

2020-04-01 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16473 Guy Harris changed: What|Removed |Added Resolution|NOTABUG |DUPLICATE Summary|16329

[Wireshark-bugs] [Bug 16472] Typo in About Wireshark > Keyboard Shortcuts > Unignore All Displayed

2020-04-01 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16472 --- Comment #6 from Gerrit Code Review --- Change 36658 merged by Gerald Combs: QT/UI: Fix shortcut https://code.wireshark.org/review/36658 -- You are receiving this mail because: You are watching all bug changes.___

[Wireshark-bugs] [Bug 16329] Error while capturing packets: PacketReceivePacket error: The I/O operation has been aborted because of either a thread exit or an application request. (995)

2020-04-01 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16329 --- Comment #12 from Guy Harris --- *** Bug 16473 has been marked as a duplicate of this bug. *** -- You are receiving this mail because: You are watching all bug changes.__

[Wireshark-bugs] [Bug 16472] Typo in About Wireshark > Keyboard Shortcuts > Unignore All Displayed

2020-04-01 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16472 Uli Heilmeier changed: What|Removed |Added Resolution|--- |FIXED Status|IN_PROGR

[Wireshark-bugs] [Bug 16475] New: Feature request - "Statistics UDP Multicast Streams" make it as an option in tshark

2020-04-01 Thread bugzilla-daemon
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16475 Bug ID: 16475 Summary: Feature request - "Statistics UDP Multicast Streams" make it as an option in tshark Product: Wireshark Version: unspecified Hardware: x86-64

  1   2   3   4   5   6   7   8   9   10   >