I did not disable the whole feature but made sure that the fingerprinting risks that might be associated with it are neutered. This is mainly done by flipping reader.parse-on-load.enabled to false. Having it set to true would discriminate between users with low memory computers (probably only some mobile ones) and those who have Reader View capable ones.
The other code path that goes to _readerParse() (https://mxr.mozilla.org/mozilla-esr45/source/toolkit/components/reader/ReaderMode.jsm#351) comes from the about:reader URL which is called if one already has saved an item in one's reader list. This is okay I think. Content seems not be able to use about:reader URLs to mess with a user's browsing session, a security error is thrown.
Trac: Status: assigned to needs_review Keywords: TorBrowserTeam201605 deleted, TorBrowserTeam201605R added
Okay, thanks. Taking this for now, though. I revised the commit message a bit and fixed a typo in it. commit 1344de9d3c90e3eac02dd13433ef8412a450df5a on tor-browser-45.1.0esr-6.0-1 has the fixup.
Trac: Status: needs_review to closed Resolution: N/Ato fixed