vulnerability
Arch Linux: Denial of service (CVE-2016-9376)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:N/A:P) | Nov 17, 2016 | Jul 11, 2025 | Nov 27, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
Nov 17, 2016
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the OpenFlow dissector could crash with memory exhaustion, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-openflow_v5.c by ensuring that certain length values were sufficiently large.
Solution
arch-linux-upgrade-latest
References
- CVE-2016-9376
- https://attackerkb.com/topics/CVE-2016-9376
- URL-http://www.debian.org/security/2016/dsa-3719
- URL-http://www.securityfocus.com/bid/94369
- URL-http://www.securitytracker.com/id/1037313
- URL-https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13071
- URL-https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f2a7af8d3928e18ef15778e63b9b6c78f8bd1bef
- URL-https://security.archlinux.org/ASA-201611-23
- URL-https://security.archlinux.org/ASA-201611-24
- URL-https://security.archlinux.org/ASA-201611-25
- URL-https://www.wireshark.org/security/wnpa-sec-2016-60.html
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.