trilogy 2.1.0
1 security vulnerability
found in version
2.1.0
Use of Uninitialized Variable in trilogy
medium severity CVE-2022-31026
medium severity
CVE-2022-31026
Patched versions:
>= 2.1.1
Impact
When authenticating, a malicious server could return a specially crafted authentication packet, causing the client to read and return up to 12 bytes of data from an uninitialized variable in stack memory.
Patches
Users of the trilogy gem should upgrade to version 2.1.1
Workarounds
This issue can be avoided by only connecting to trusted servers.
No officially reported memory leakage issues detected.
This gem version does not have any officially reported memory leaked issues.
No license issues detected.
This gem version has a license in the gemspec.
This gem version is available.
This gem version has not been yanked and is still available for usage.