Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token sequences for a CANVAS element.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | 38.0 (including) | 38.0 (including) |
Firefox | Mozilla | 38.0.1 (including) | 38.0.1 (including) |
Firefox | Mozilla | 38.0.5 (including) | 38.0.5 (including) |
Firefox | Mozilla | 38.1.0 (including) | 38.1.0 (including) |
Firefox | Mozilla | 38.2.0 (including) | 38.2.0 (including) |
Firefox | Mozilla | 40.0.2 (including) | 40.0.2 (including) |
Red Hat Enterprise Linux 5 | RedHat | firefox-0:38.2.1-1.el5_11 | * |
Red Hat Enterprise Linux 6 | RedHat | firefox-0:38.2.1-1.el6_7 | * |
Red Hat Enterprise Linux 7 | RedHat | firefox-0:38.2.1-1.el7_1 | * |
Firefox | Ubuntu | devel | * |
Firefox | Ubuntu | precise | * |
Firefox | Ubuntu | trusty | * |
Firefox | Ubuntu | upstream | * |
Firefox | Ubuntu | vivid | * |