A use-after-free vulnerability during XSLT processing due to a failure to propagate error conditions during matching while evaluating context, leading to objects being used when they no longer exist. This results in a potentially exploitable crash. External Reference: https://www.mozilla.org/en-US/security/advisories/mfsa2017-11/#CVE-2017-5440 Acknowledgements: Name: the Mozilla project Upstream: Nicolas Grégoire
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:1104 https://access.redhat.com/errata/RHSA-2017:1104
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1106 https://access.redhat.com/errata/RHSA-2017:1106
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Via RHSA-2017:1201 https://access.redhat.com/errata/RHSA-2017:1201