Wireshark-bugs: [Wireshark-bugs] [Bug 6396] New: Added cursor type decoding to MySQL dissector
Date: Mon, 26 Sep 2011 12:14:06 -0700 (PDT)

           Summary: Added cursor type decoding to MySQL dissector
           Product: Wireshark
           Version: SVN
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Minor
          Priority: Low
         Component: Wireshark
        AssignedTo: [email protected]
        ReportedBy: [email protected]

Build Information:
Compiled (32-bit) with GTK+ 2.24.4, with Cairo 1.10.2, with Pango 1.28.4, with
GLib 2.28.6, with libpcap 1.1.1, with libz, without POSIX capabilities,
with threads support, without SMI, without c-ares, without ADNS, without Lua,
with Python 2.6.7, with GnuTLS 2.12.10, with Gcrypt 1.5.0, with MIT Kerberos,
with GeoIP, without PortAudio, without AirPcap.

Running on Linux, with locale hu_HU.UTF-8, with libpcap version 1.1.1,
with libz, GnuTLS 2.12.10, Gcrypt 1.5.0.

Built using gcc 4.6.1.
The current MySQL dissector treats the exec_flags field as unused, however
since MySQL 5.0, this field is used to indicate the type of the cursor as it
can be read at

I attached a capture containing a single "execute" packet, which has a non-zero
exec_flags field.

Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.