Project

General

Profile

Actions

Bug #5066

closed
VJ VJ

detect/iponly: mixing netblocks can lead to FN/FP

Bug #5066: detect/iponly: mixing netblocks can lead to FN/FP

Added by Victor Julien about 4 years ago. Updated about 4 years ago.

Status:
Closed
Priority:
High
Assignee:
Target version:
Affected Versions:
Effort:
Difficulty:
Label:
Needs backport to 5.0, Needs backport to 6.0

Description

Some combinations of netblocks inserted into the IP-Only engine will lead to an incorrect radix tree being set up, leading to FN/FP.


Related issues 3 (0 open3 closed)

Related to Suricata - Bug #5081: detect/iponly: rule parsing does not always apply netmask correctlyClosedVictor JulienActions
Copied to Suricata - Bug #5116: detect/iponly: mixing netblocks can lead to FN/FPClosedVictor JulienActions
Copied to Suricata - Bug #5117: detect/iponly: mixing netblocks can lead to FN/FPClosedJeff LucovskyActions

VJ Updated by Victor Julien about 4 years ago Actions #1

  • Related to Bug #5081: detect/iponly: rule parsing does not always apply netmask correctly added

VJ Updated by Victor Julien about 4 years ago Actions #2

  • Status changed from In Progress to Closed

JL Updated by Jeff Lucovsky about 4 years ago Actions #3

  • Copied to Bug #5116: detect/iponly: mixing netblocks can lead to FN/FP added

JL Updated by Jeff Lucovsky about 4 years ago Actions #4

  • Copied to Bug #5117: detect/iponly: mixing netblocks can lead to FN/FP added
Actions

Also available in: PDF Atom