https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13932
Huang Qiangxiong changed:
What|Removed |Added
Attachment #15864|0 |1
is obsolete|
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13932
--- Comment #10 from Huang Qiangxiong ---
Created attachment 15871
--> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=15871&action=edit
source file of protobuf-cpp-3.4.1.zip
Exactly the same as
https://github.com/google/protobuf/
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13932
--- Comment #11 from Pascal Quantin ---
(In reply to Huang Qiangxiong from comment #10)
> Created attachment 15871 [details]
> source file of protobuf-cpp-3.4.1.zip
>
> Exactly the same as
> https://github.com/google/protobuf/releases/dow
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14102
Bug ID: 14102
Summary: 802.11 malformed packets in monitor mode
Product: Wireshark
Version: 2.2.0
Hardware: x86
OS: Windows 10
Status: UNCONFIRMED
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14102
--- Comment #1 from nmolin...@itdiberia.com ---
Is there any capture filter to select the channel the APs are using? As this
may be also a problem, as I think in monitor mode one channel needs to be
selected. In the AirPcap Control Panel, y
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14102
Pascal Quantin changed:
What|Removed |Added
Resolution|--- |NOTOURBUG
Status|UNC
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14092
Pascal Quantin changed:
What|Removed |Added
Status|INCOMPLETE |RESOLVED
CC|
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14102
nmolin...@itdiberia.com changed:
What|Removed |Added
Ever confirmed|0 |1
Status|RES
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14102
Pascal Quantin changed:
What|Removed |Added
Resolution|--- |NOTOURBUG
Status|INC
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14076
--- Comment #8 from Kevin ---
New issue in the module, line 11427. Fourth parameter should read "Select the
CAT002 version", not "CAT001".
For I021_150 dependent field, you could add an additional field type of
"DEPENDENT" and add an addi
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13932
--- Comment #12 from Michael Mann ---
(In reply to Huang Qiangxiong from comment #0)
> Created attachment 15730 [details]
> grpc/protobuf sample cap file. (message compress by gzip)
I don't see in https://developers.google.cn/protocol-buf
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13932
--- Comment #13 from Huang Qiangxiong ---
(In reply to Michael Mann from comment #12)
> (In reply to Huang Qiangxiong from comment #0)
> > Created attachment 15730 [details]
> > grpc/protobuf sample cap file. (message compress by gzip)
>
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13932
--- Comment #14 from Huang Qiangxiong ---
(In reply to Huang Qiangxiong from comment #13)
> (In reply to Michael Mann from comment #12)
> > (In reply to Huang Qiangxiong from comment #0)
> > > Created attachment 15730 [details]
> > > grpc/
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14076
--- Comment #9 from Marko Hrastovec ---
(In reply to Kevin from comment #8)
> New issue in the module, line 11427. Fourth parameter should read "Select
> the CAT002 version", not "CAT001".
>
> For I021_150 dependent field, you could add a
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14103
Bug ID: 14103
Summary: I can't post because of akismet security
Product: Web sites
Version: N/A
Hardware: x86
OS: Windows 10
Status: UNCONFIRMED
Se
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14104
Bug ID: 14104
Summary: SEARCH only searches INFO column
Product: Wireshark
Version: 2.4.1
Hardware: x86
OS: Windows 7
Status: UNCONFIRMED
Severity
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14104
buercks...@sbcglobal.net changed:
What|Removed |Added
Severity|Major |Normal
Priori
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14105
Bug ID: 14105
Summary: gsmtap: SACCH/SDCCH dissection has changed between
2.2.7 and 2.4.1
Product: Wireshark
Version: 2.4.1
Hardware: All
OS: Linux
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14105
--- Comment #1 from Pascal Quantin ---
It has been 10 years or so that I have not done 2G, but how could a System
Information be transmitted over SACCH instead of CCCH?
--
You are receiving this mail because:
You are watching all bug cha
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14105
--- Comment #2 from Peter Wu ---
Anonymous user said:
"SI1/2/2ter/2quater/3/4 are usually transmitted on CCCH/BCCH,
SI5/5ter/6 are not, these are usually transmitted on SACCH/SDCCH"
No idea what that means though.
--
You are receiving t
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14105
--- Comment #3 from Pascal Quantin ---
1O years is a long time, I did not remember some SI could be transmitted over
dedicated channels and not only broadcast ones...
Having a look right now.
--
You are receiving this mail because:
You a
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14104
Pascal Quantin changed:
What|Removed |Added
Ever confirmed|0 |1
CC|
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14105
Pascal Quantin changed:
What|Removed |Added
CC||lafo...@gnumonks.org
--- Comment
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14010
--- Comment #22 from Gerald Combs ---
(In reply to Alexis La Goutte from comment #21)
>
> Waiting 5.9.2 (planned for September...)
I updated the master (2.5) and Petri Dish builders to Qt 5.9.2. Can someone
experiencing this issue try Wi
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14106
Bug ID: 14106
Summary: Buildbot crash output: fuzz-2017-10-05-32240.pcap
Product: Wireshark
Version: unspecified
Hardware: x86-64
OS: Ubuntu
Status: CONFIRME
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14025
--- Comment #8 from Gerald Combs ---
This doesn't appear to be exploitable or cause a denial of service, and
therefore doesn't appear to warrant a CVE ID. If it does please let me know.
--
You are receiving this mail because:
You are wat
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14032
--- Comment #8 from Gerald Combs ---
This doesn't appear to be exploitable or cause a denial of service, and
therefore doesn't appear to warrant a CVE ID. If it does please let me know.
--
You are receiving this mail because:
You are wat
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14010
--- Comment #23 from Gerald Combs ---
(In reply to Gerald Combs from comment #22)
>
> upcoming 2.4.3 release.
Oops - make that 2.4.2.
--
You are receiving this mail because:
You are watching all bug changes.
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14010
--- Comment #24 from WWT ---
(In reply to Gerald Combs from comment #22)
> (In reply to Alexis La Goutte from comment #21)
> >
> > Waiting 5.9.2 (planned for September...)
>
> I updated the master (2.5) and Petri Dish builders to Qt 5.9.
29 matches
Mail list logo