{"id":"CVE-2025-1930","details":"On Windows, a compromised content process could use bad StreamData sent over AudioIPC to trigger a use-after-free in the Browser process. This could have led to a sandbox escape. This vulnerability affects Firefox \u003c 136, Firefox ESR \u003c 115.21, Firefox ESR \u003c 128.8, Thunderbird \u003c 136, and Thunderbird \u003c 128.8.","modified":"2026-05-04T08:49:05.575029Z","published":"2025-03-04T14:15:37.850Z","withdrawn":"2026-05-04T08:49:05.575029Z","related":["ALSA-2025:2359","ALSA-2025:2452","SUSE-SU-2025:0783-1","SUSE-SU-2025:0788-1","SUSE-SU-2025:0849-1","openSUSE-SU-2025:14852-1","openSUSE-SU-2025:14853-1","openSUSE-SU-2025:14861-1"],"references":[{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2025-14/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2025-15/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2025-16/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2025-17/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2025-18/"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1902309"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-1930.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"115.21.0"}]},{"events":[{"introduced":"0"},{"fixed":"136.0"}]},{"events":[{"introduced":"116.0"},{"fixed":"128.8.0"}]},{"events":[{"introduced":"0"},{"fixed":"128.8"}]},{"events":[{"introduced":"0"},{"fixed":"136.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}