Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#72965 - [v2ray] Please update the v4.44.0 version to fix the DoS attack.
Attached to Project:
Community Packages
Opened by Ariel AxionL (axionl) - Friday, 10 December 2021, 00:57 GMT
Last edited by Antonio Rojas (arojas) - Sunday, 19 December 2021, 10:03 GMT
Opened by Ariel AxionL (axionl) - Friday, 10 December 2021, 00:57 GMT
Last edited by Antonio Rojas (arojas) - Sunday, 19 December 2021, 10:03 GMT
|
DetailsDescription:
The upstream fixed a DoS vulnerability in V2Ray on v4.44.0. This vulnerability allows a VMess Server controlled by an attacker to crash a VMess Client by sending a specially crafted handshake response reply with an (optional) VMess SwitchAccount Command that is one byte shorter than expected. Additional info: * package version(s) * config and/or log files etc. * link to upstream bug report, if any Steps to reproduce: Release News: https://github.com/v2fly/v2ray-core/releases/tag/v4.44.0 |
This task depends upon