Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2v62-qxwf-qh42

Опубликовано: 01 апр. 2026
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

A regression in the way hashes were calculated caused rules containing the address range syntax (x.x.x.x - y.y.y.y) that only differ in the address range(s) involved to be silently dropped as duplicates. Only the first of such rules is actually loaded into pf. Ranges expressed using the address[/mask-bits] syntax were not affected.

Some keywords representing actions taken on a packet-matching rule, such as 'log', 'return tll', or 'dnpipe', may suffer from the same issue. It is unlikely that users have such configurations, as these rules would always be redundant.

Affected rules are silently ignored, which can lead to unexpected behaviour including over- and underblocking.

A regression in the way hashes were calculated caused rules containing the address range syntax (x.x.x.x - y.y.y.y) that only differ in the address range(s) involved to be silently dropped as duplicates. Only the first of such rules is actually loaded into pf. Ranges expressed using the address[/mask-bits] syntax were not affected.

Some keywords representing actions taken on a packet-matching rule, such as 'log', 'return tll', or 'dnpipe', may suffer from the same issue. It is unlikely that users have such configurations, as these rules would always be redundant.

Affected rules are silently ignored, which can lead to unexpected behaviour including over- and underblocking.

EPSS

Процентиль: 13%
0.00043
Низкий

7.5 High

CVSS3

Дефекты

CWE-480

Связанные уязвимости

CVSS3: 7.5
nvd
8 дней назад

A regression in the way hashes were calculated caused rules containing the address range syntax (x.x.x.x - y.y.y.y) that only differ in the address range(s) involved to be silently dropped as duplicates. Only the first of such rules is actually loaded into pf. Ranges expressed using the address[/mask-bits] syntax were not affected. Some keywords representing actions taken on a packet-matching rule, such as 'log', 'return tll', or 'dnpipe', may suffer from the same issue. It is unlikely that users have such configurations, as these rules would always be redundant. Affected rules are silently ignored, which can lead to unexpected behaviour including over- and underblocking.

CVSS3: 7.5
fstec
15 дней назад

Уязвимость ядра операционных систем FreeBSD, связанная с применением ошибочного оператора, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 13%
0.00043
Низкий

7.5 High

CVSS3

Дефекты

CWE-480