Actions
Bug #5066
closeddetect/iponly: mixing netblocks can lead to FN/FP
Affected Versions:
Effort:
Difficulty:
Label:
Needs backport to 5.0, Needs backport to 6.0
Description
Some combinations of netblocks inserted into the IP-Only engine will lead to an incorrect radix tree being set up, leading to FN/FP.
Updated by Victor Julien almost 3 years ago
- Related to Bug #5081: detect/iponly: rule parsing does not always apply netmask correctly added
Updated by Victor Julien almost 3 years ago
- Status changed from In Progress to Closed
Updated by Jeff Lucovsky almost 3 years ago
- Copied to Bug #5116: detect/iponly: mixing netblocks can lead to FN/FP added
Updated by Jeff Lucovsky almost 3 years ago
- Copied to Bug #5117: detect/iponly: mixing netblocks can lead to FN/FP added
Actions