An attacker could use a JavaScript Map/Set timing attack to determine whether an atom is used by another compartment/zone in specific contexts. This could be used to leak information, such as usernames embedded in JavaScript code, across websites. External Reference: https://www.mozilla.org/security/announce/2016/mfsa2016-95/#CVE-2016-9904 Acknowledgements: Name: the Mozilla project Upstream: Jann Horn
This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Via RHSA-2016:2946 https://rhn.redhat.com/errata/RHSA-2016-2946.html