A flaw was found in all versions of Node.js 8.x, 9.x, and 10.x. An attacker can cause a denial of service (DoS) by causing a node server providing an http2 server to crash. This can be accomplished by interacting with the http2 server in a manner that triggers a cleanup bug where objects are used in native code after they are no longer available. References: https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/
Created nodejs tracking bugs for this issue: Affects: epel-all [bug 1591015] Affects: fedora-all [bug 1591014]
Upstream fix: https://github.com/nodejs/node/commit/8bf213dbdc7e
RHOAR NodeJS 10.4.1, has already been released with a fix for this issue.
This issue doesn't affect NodeJS 6, or 0.10 used by openshift-enterprise-10/logging-kibana and logging-auth-proxy respectively.
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2018:2949 https://access.redhat.com/errata/RHSA-2018:2949