If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any `javascript:` URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. External Reference: https://www.mozilla.org/en-US/security/advisories/mfsa2019-26/#CVE-2019-11738
Acknowledgments: Name: the Mozilla project Upstream: Wladimir Palant
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:2663 https://access.redhat.com/errata/RHSA-2019:2663
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-11738