CVE-2025-1934
Description
It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engine was not expecting it. This vulnerability was fixed in Firefox 136, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2025-1934 is a race condition in Firefox's RegExp bailout handling that can trigger unexpected garbage collection, leading to a potentially exploitable crash.
Root
Cause Analysis
CVE-2025-1934 stems from a race condition in how the JavaScript engine handles RegExp bailout processing. The bug allows an attacker to interrupt this processing and execute additional JavaScript code, which can in turn trigger garbage collection at an unexpected time. This violates the engine's internal invariants, leading to an assertion failure as shown in the attached crash report [1]. The crash occurs in js/src/vm/Interpreter.cpp at line 463, with the assertion !cx->suppressGC [1].
Exploitation
Exploitation requires the ability to execute arbitrary JavaScript in the browser or Thunderbird context. A crafted script can force a RegExp bailout and, through a carefully designed interrupt callback, trigger garbage collection during the bailout path [1]. The included test case demonstrates the technique using setInterruptCallback and repeated RegExp matching [1]. The vulnerability can be triggered without any additional user interaction beyond visiting a malicious page or opening a crafted email with scripting enabled [2][3].
Impact
Successful exploitation can cause a denial of service via a browser crash. Under certain conditions, an attacker might be able to achieve memory corruption, potentially leading to arbitrary code execution. Mozilla classified the impact as "high" [2]. In Thunderbird, the risk is lower because scripting is disabled by default when reading mail, but it could be exploited in browser-like contexts [3][4].
Mitigation
Mozilla has fixed this vulnerability in Firefox 136, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8 [2][3][4]. Users are strongly advised to update to these versions or later. No workarounds are available.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
30cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*range: <136.0
- cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*range: <128.8.0
- (no CPE)range: <136
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*range: <128.8.0
- (no CPE)
- Range: <128.8
- osv-coords24 versionspkg:rpm/almalinux/firefoxpkg:rpm/almalinux/firefox-x11pkg:rpm/opensuse/firefox-esr&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/MozillaFirefox&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/MozillaFirefox&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/MozillaThunderbird&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/MozillaThunderbird&distro=openSUSE%20Tumbleweedpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP6pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5pkg:rpm/suse/MozillaThunderbird&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP6pkg:rpm/suse/MozillaThunderbird&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP6
< 128.8.0-1.el9_5+ 23 more
- (no CPE)range: < 128.8.0-1.el9_5
- (no CPE)range: < 128.8.0-1.el9_5
- (no CPE)range: < 128.8.0-1.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 136.0-1.1
- (no CPE)range: < 128.8.0-150200.8.203.1
- (no CPE)range: < 128.8.0-1.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-112.249.3
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-112.249.3
- (no CPE)range: < 128.8.0-150200.8.203.1
- (no CPE)range: < 128.8.0-150200.8.203.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- www.mozilla.org/security/advisories/mfsa2025-14/nvdVendor Advisory
- www.mozilla.org/security/advisories/mfsa2025-16/nvdVendor Advisory
- www.mozilla.org/security/advisories/mfsa2025-17/nvdVendor Advisory
- www.mozilla.org/security/advisories/mfsa2025-18/nvdVendor Advisory
- bugzilla.mozilla.org/show_bug.cginvdIssue TrackingPermissions Required
- lists.debian.org/debian-lts-announce/2025/03/msg00006.htmlnvd
News mentions
0No linked articles in our index yet.