Trilogy is a client library for MySQL. When authenticating, a malicious server could return a specially crafted authentication packet, causing the client to read and return up to 12 bytes of data from an uninitialized variable in stack memory. Users of the trilogy gem should upgrade to version 2.1.1 This issue can be avoided by only connecting to trusted servers.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5938 | Trilogy is a client library for MySQL. When authenticating, a malicious server could return a specially crafted authentication packet, causing the client to read and return up to 12 bytes of data from an uninitialized variable in stack memory. Users of the trilogy gem should upgrade to version 2.1.1 This issue can be avoided by only connecting to trusted servers. |
Github GHSA |
GHSA-5g4r-2qhx-vqfm | Use of Uninitialized Variable in trilogy |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 23 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-23T18:18:51.825Z
Reserved: 2022-05-18T00:00:00.000Z
Link: CVE-2022-31026
Updated: 2024-08-03T07:03:40.297Z
Status : Modified
Published: 2022-06-09T13:15:08.457
Modified: 2024-11-21T07:03:44.403
Link: CVE-2022-31026
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA