Fedora 33 : 1:libuv (2020-8dd4252dbe)

high Nessus Plugin ID 141298
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote Fedora host is missing a security update.


2020.09.26, Version 1.40.0 (Stable)

Changes since version 1.39.0 :

- udp: add UV_UDP_MMSG_FREE recv_cb flag (Ryan Liptak)

- include: re-map UV__EPROTO from 4046 to -4046 (YuMeiJie)

- doc: correct UV_UDP_MMSG_FREE version added (cjihrig)

- doc: add uv_metrics_idle_time() version metadata (Ryan Liptak)

- win,tty: pass through utf-16 surrogate pairs (Mustafa M)

- unix: fix DragonFly BSD build (Aleksej Lebedev)

- win,udp: fix error code returned by connect() (Santiago Gimeno)

- src: suppress user_timeout maybe-uninitialized (Daniel Bevenius)

- test: fix compiler warning (Vladimír Čunát)

- build: fix the Haiku cmake build (David Carlier)

- linux: fix i386 sendmmsg/recvmmsg support (Ben Noordhuis)

- build: add libuv-static pkg-config file (Nikolay Mitev)

- unix,win: add uv_timer_get_due_in() (Ulrik Strid)

- build,unix: add QNX support (Elad Lahav)

- include: remove incorrect UV__ERR() for EPROTO (cjihrig)

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected 1:libuv package.

See Also


Plugin Details

Severity: High

ID: 141298

File Name: fedora_2020-8dd4252dbe.nasl

Version: 1.1

Type: local

Agent: unix

Published: 10/8/2020

Updated: 10/8/2020

Dependencies: ssh_get_info.nasl

Vulnerability Information

CPE: cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*, p-cpe:2.3:a:fedoraproject:fedora:1:libuv:*:*:*:*:*:*

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 10/2/2020

Vulnerability Publication Date: 10/2/2020

Reference Information