Hide Forgot
A malicious website could use a DNS rebinding attack to trick a web browser to bypass same-origin-policy checks and allow HTTP connections to localhost or to hosts on the local network, potentially to an open inspector port as a debugger, therefore gaining full code execution access. References: https://github.com/nodejs/node/blob/master/doc/changelogs/CHANGELOG_V8.md
Created nodejs tracking bugs for this issue: Affects: fedora-all [bug 1562027] Affects: epel-all [bug 1562026]
rh-nodejs4-nodejs is not affected since NodeJS 4 has no support for the inspector.
NodeJS is only packaged as an ImageStream in Openshift Enterprise 3.9, which is a container image from RH Software Collections. Marking Openshift Enterprise as not affected.
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2018:2949 https://access.redhat.com/errata/RHSA-2018:2949