{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-1934","assignerOrgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","state":"PUBLISHED","assignerShortName":"mozilla","dateReserved":"2025-03-04T12:29:35.333Z","datePublished":"2025-03-04T13:31:24.734Z","dateUpdated":"2026-04-13T14:27:40.069Z"},"containers":{"cna":{"affected":[{"product":"Firefox","vendor":"Mozilla","versions":[{"status":"unaffected","version":"128.8","lessThanOrEqual":"128.*","versionType":"rpm"},{"status":"unaffected","version":"136","lessThanOrEqual":"*","versionType":"rpm"}]},{"product":"Thunderbird","vendor":"Mozilla","versions":[{"status":"unaffected","version":"128.8","lessThanOrEqual":"128.*","versionType":"rpm"},{"status":"unaffected","version":"136","lessThanOrEqual":"*","versionType":"rpm"}]}],"descriptions":[{"lang":"en","value":"It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engine was not expecting it. This vulnerability was fixed in Firefox 136, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8.","supportingMedia":[{"type":"text/html","base64":false,"value":"It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engine was not expecting it. This vulnerability was fixed in Firefox 136, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8."}]}],"title":"Unexpected GC during RegExp bailout processing","references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1942881"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-14/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-16/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-17/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-18/"}],"credits":[{"lang":"en","value":"Nils Bars"}],"providerMetadata":{"orgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","shortName":"mozilla","dateUpdated":"2026-04-13T14:27:40.069Z"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-noinfo Not enough information"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":6.5,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","integrityImpact":"NONE","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-03-04T15:50:25.693188Z","id":"CVE-2025-1934","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-25T14:19:41.602Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00006.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T20:57:19.643Z"}}]}}