Under certain conditions, when checking the Resist Fingerprinting preference during device orientation checks, a race condition could have caused a use-after-free and a potentially exploitable crash. External Reference: https://www.mozilla.org/en-US/security/advisories/mfsa2019-37/#CVE-2019-17010
Acknowledgments: Name: the Mozilla project Upstream: Nils
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2019:4108 https://access.redhat.com/errata/RHSA-2019:4108
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:4107 https://access.redhat.com/errata/RHSA-2019:4107
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:4111 https://access.redhat.com/errata/RHSA-2019:4111
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-17010
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:4148 https://access.redhat.com/errata/RHSA-2019:4148
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:4195 https://access.redhat.com/errata/RHSA-2019:4195
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2019:4205 https://access.redhat.com/errata/RHSA-2019:4205
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:0292 https://access.redhat.com/errata/RHSA-2020:0292
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:0295 https://access.redhat.com/errata/RHSA-2020:0295