trilogy 2.1.0

1 security vulnerability found in version 2.1.0

Use of Uninitialized Variable in trilogy

medium severity CVE-2022-31026
medium severity CVE-2022-31026
Patched versions: >= 2.1.1

Impact

When authenticating, a malicious server could return a specially crafted authentication packet, causing the client to read and return up to 12 bytes of data from an uninitialized variable in stack memory.

Patches

Users of the trilogy gem should upgrade to version 2.1.1

Workarounds

This issue can be avoided by only connecting to trusted servers.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

No license issues detected.


This gem version has a license in the gemspec.

This gem version is available.


This gem version has not been yanked and is still available for usage.