This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate blightmud

Dependencies

(33 total, 2 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 libmudtelnet^2.0.12.0.1up to date
 termion^33.0.0up to date
 log^0.4.210.4.21up to date
 simple-logging^2.0.22.0.2up to date
 chrono^0.4.380.4.38up to date
 signal-hook^0.3.170.3.17up to date
 mlua^0.9.70.9.7up to date
 regex^1.10.41.10.4up to date
 strip-ansi-escapes^0.2.00.2.0up to date
 vte^0.13.00.13.0up to date
 timer^0.2.00.2.0up to date
 flate2^1.0.281.0.28up to date
 pulldown-cmark-mdcat^2.1.22.1.2up to date
 pulldown-cmark^0.9.60.10.3out of date
 syntect^5.2.05.2.0up to date
 serde^1.0.1981.0.198up to date
 ron^0.8.10.8.1up to date
 anyhow^1.0.821.0.82up to date
 lazy_static^1.4.01.4.0up to date
 rs-complete^1.3.11.3.1up to date
 getopts^0.2.210.2.21up to date
 human-panic^2.0.02.0.0up to date
 tts^0.26.10.26.1up to date
 serde_json^1.0.1161.0.116up to date
 git2^0.18.30.18.3up to date
 rodio^0.17.30.17.3up to date
 notify-debouncer-mini^0.4.10.4.1up to date
 hunspell-rs^0.4.00.4.0up to date
 hunspell-sys^0.3.00.3.1up to date
 rustls ⚠️^0.220.23.5out of date
 webpki-roots^0.260.26.1up to date
 reqwest^0.12.40.12.4up to date
 socket2^0.5.60.5.6up to date

Dev dependencies

(4 total, 1 outdated)

CrateRequiredLatestStatus
 mockall^0.12.10.12.1up to date
 mockall_double^0.3.10.3.1up to date
 rustls-pemfile^2.12.1.2up to date
 env_logger^0.10.20.11.3out of date

Security Vulnerabilities

rustls: `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network input

RUSTSEC-2024-0336

If a close_notify alert is received during a handshake, complete_io does not terminate.

Callers which do not call complete_io are not affected.

rustls-tokio and rustls-ffi do not call complete_io and are not affected.

rustls::Stream and rustls::StreamOwned types use complete_io and are affected.