Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token sequences for a CANVAS element.
https://bugzilla.mozilla.org/show_bug.cgi?id=1175278
https://bugzilla.mozilla.org/show_bug.cgi?id=1164766
http://www.zerodayinitiative.com/advisories/ZDI-15-406
http://www.ubuntu.com/usn/USN-2723-1
http://www.securitytracker.com/id/1033397
http://www.securityfocus.com/bid/76502
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.mozilla.org/security/announce/2015/mfsa2015-94.html
http://www.debian.org/security/2015/dsa-3345
http://rhn.redhat.com/errata/RHSA-2015-1693.html
http://lists.opensuse.org/opensuse-updates/2015-09/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00013.html