trilogy 0.0.1

This gem version has been yanked.


Yanked gem versions cannot be used or downloaded from RubyGems.

1 security vulnerability found in version 0.0.1

Use of Uninitialized Variable in trilogy

medium severity CVE-2022-31026
medium severity CVE-2022-31026
Patched versions: >= 2.1.1

Impact

When authenticating, a malicious server could return a specially crafted authentication packet, causing the client to read and return up to 12 bytes of data from an uninitialized variable in stack memory.

Patches

Users of the trilogy gem should upgrade to version 2.1.1

Workarounds

This issue can be avoided by only connecting to trusted servers.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

Gem version without a license.


Unless a license that specifies otherwise is included, nobody can use, copy, distribute, or modify this library without being at risk of take-downs, shake-downs, or litigation.