trilogy 0.0.1
This gem version has been yanked.
Yanked gem versions cannot be used or downloaded from RubyGems.
1 security vulnerability
found in version
0.0.1
Use of Uninitialized Variable in trilogy
medium severity CVE-2022-31026
medium severity
CVE-2022-31026
Patched versions:
>= 2.1.1
Impact
When authenticating, a malicious server could return a specially crafted authentication packet, causing the client to read and return up to 12 bytes of data from an uninitialized variable in stack memory.
Patches
Users of the trilogy gem should upgrade to version 2.1.1
Workarounds
This issue can be avoided by only connecting to trusted servers.
No officially reported memory leakage issues detected.
This gem version does not have any officially reported memory leaked issues.
Gem version without a license.
Unless a license that specifies otherwise is included, nobody can use, copy, distribute, or modify this library without being at risk of take-downs, shake-downs, or litigation.