PT-2026-29476 · Pf+1 · Pf+1
Michael Gmelin
·
Published
2026-04-01
·
Updated
2026-04-01
·
CVE-2026-4748
CVSS v3.1
7.5
High
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
Name of the Vulnerable Software and Affected Versions
pf (affected versions not specified)
Description
A regression in hash calculation causes rules with the address range syntax (x.x.x.x - y.y.y.y) that only differ in the address range to be silently dropped as duplicates. Only the first such rule is loaded. Rules using the address[/mask-bits] syntax are not affected. Keywords representing actions like 'log', 'return tll', or 'dnpipe' may also be affected, but this is unlikely as such rules are typically redundant. Affected rules are silently ignored, potentially leading to unexpected behavior, including over- and underblocking.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Improper Check for Exceptional Conditions
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Freebsd
Pf