Wireshark-bugs: [Wireshark-bugs] [Bug 12053] New: Bluetooth LE packet disection error

Date: Wed, 27 Jan 2016 16:57:52 +0000
Bug ID 12053
Summary Bluetooth LE packet disection error
Product Wireshark
Version 2.0.1
Hardware x86
OS All
Status CONFIRMED
Severity Major
Priority Low
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Build Information:
Wireshark 2.0.1 (SVN Rev Unknown from unknown)

Copyright 1998-2015 Gerald Combs <[email protected]> and contributors.
License GPLv2+: GNU GPL version 2 or later
<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled (64-bit) with Qt 4.8.6, with libpcap, without POSIX capabilities,
without libnl, with libz 1.2.8, with GLib 2.40.2, without SMI, without c-ares,
without ADNS, without Lua, without GnuTLS, without Gcrypt, without Kerberos,
without GeoIP, without QtMultimedia, without AirPcap.

Running on Linux 3.19.0-32-generic, with locale C, with libpcap version 1.5.3,
with libz 1.2.8.
Intel(R) Core(TM) i7-4700MQ CPU @ 2.40GHz (with SSE4.2)

Built using gcc 4.8.4.

--
I recently moved all my work involving Bluetooth in wireshark to a windows 10
virtual machine. I fixed an initial error with encapsulation where I added user
10 DLT = 157 with btle as the protocol, which was the same as I did before and
it worked fine. However this time, while I get no errors, the layout is
different and it is missing a lot of info like source and destination, payload,
any handle values. The type of packets displayed are "Empty PDU", "Control
Opcode: LL_START_ENC_RSP", and "L2CAP Fragment". This is reproducible on Linux
as well.


You are receiving this mail because:
  • You are watching all bug changes.