Bug ID
int64 961
1.91M
| Comment ID
int64 3.98k
17.1M
| Author
stringlengths 8
48
| Comment Text
stringlengths 1
64.3k
⌀ |
---|---|---|---|
1,860,528 | 16,634,271 |
Created attachment 9359781
With `browser.urlbar.trimHttps`
Steps to reproduce:
1. Enable `browser.urlbar.trimHttps`
2. Visit https://googlesamples.github.io/web-fundamentals/fundamentals/security/prevent-mixed-content/active-mixed-content.html
3. Click Site Identity Button/Padlock > Connection secure > Disable protections for now
You can see that a line appears in front of the URL, which has previously striked through the https:// scheme, but now seems out of place.
|
|
1,860,791 | 16,636,172 |
Created attachment 9360009
non sponsored result cannot be dismissed.mp4
**[Notes]**
- The following error is displayed in the browser console: "TypeError: result.payload.sponsoredAdvertiser is undefined".
- The "Block" telemetry is correctly registered, but the non-sponsored result is not dismissed and also can be triggered again.
- If Rust is disabled the non-sponsored results from Remote Settings can be successfully dismissed.
**[Affected versions]**
- Firefox Beta 120.0b1 (Build ID: 20231023135443)
- Firefox Nightly 121.0a1 (Build ID: 20231023215318)
**[Affected platforms]**
- Windows 10 x64
- macOS 13.5
- Ubuntu 22.04
**[Prerequisites]**
Have the following prefs set:
- browser.search.region set to "US"
- browser.urlbar.quicksuggest.rustEnabled set to true.
**[Steps to reproduce]**
1. Open the Firefox build with the prefs mentioned in the prerequisites.
2. Type a keyword that would trigger a non-sponsored suggestion (wikipedia), eg: "music".
3. Hover the non-sponsored result.
4. Click the "..." menu button.
5. Click the "Dismiss this suggestion" button.
6. Observe the behavior.
**[Expected results]**
- The non-sponsored result is dismissed and is no longer triggered.
**[Actual results]**
- The non-sponsored result is not dismissed.
**[Additional Notes]**
- Attached is a screen recording of the issue.
|
|
1,860,885 | 16,636,850 |
Created attachment 9360091
tb119.console.log
Steps to reproduce:
Upgraded from 118b6 to 119. (b3, b4, and b6 all the same so far)
Actual results:
Nothing appears inside the folder and message panes, no calendar entries show (local or Google), even in Troubleshooting Mode. The only hint that the profile is actually loading is the Calendars are all listed, without the entries. Downgrading to 118 with the profile downgrade switch restores full functionality.
I've attached a console log and screenshots, in case that helps.
Expected results:
Everything appears as normal.
|
|
1,860,977 | 16,637,393 |
Created attachment 9360189
pics.zip
User Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/118.0
Steps to reproduce:
Send 2 E-Mails to myself.
E-Mail A with no encryption
E-Mail B with PGP encryption and 5 MB
Open E-Mail B
While Thunderbird is loading/decrypting click to open E-Mail A
Actual results:
After E-Mail B is encrypted the subject of E-Mail A is permanently changed to the subject of E-Mail B, restarting Thunderbird does not resolve this bug.
Expected results:
Subject of E-Mail A should not change.
|
|
1,861,988 | 16,645,459 |
Created attachment 9360999
Video of the issue.mp4
**[Prerequisites]:**
- A new profile is used.
**[Steps to reproduce]:**
1. Set “app.normandy.user_id” to “4d03162f-ae8c-42ad-8620-ef1bb65cfea5”;
2. Set “messaging-system.rsexperimentloader.collection_id” to “nimbus-preview”;
3. Set “browser.search.region” to “US”;
4. Restart the browser;
5. Navigate to “about:studies”;
6. Observe the list of active experiments.
**[Expected result]:**
- User should be enrolled in either the “Fox Doodle” or “Review Checker” experiment, but not both.
**[Actual result]:**
- User is enrolled in both experiments.
**[Notes]:**
- This happens because [“Fox Doodle”](https://experimenter.services.mozilla.com/nimbus/fox-doodle-set-to-default-early-day-user/summary) was the first one to be received by the browser and at that moment the condition that the user is not enrolled in the [“Review Checker 119 new profiles”](https://experimenter.services.mozilla.com/nimbus/review-checker-119-new-profiles/summary) experiment was true.
- If both experiments are enrolling at the same time this is a situation that can occur for users that never interacted with either experiment. In order to avoid this situation, both experiments should exclude each other.
|
|
1,862,074 | 16,646,183 |
Firefox for Android
Steps to reproduce:
I installed Firefox 118.1.1 on my Android phone (HTC Desire 22 Pro, Android 12, arm64-v8a). I downloaded a file from any website. The app doesn't crash, the full phone crashes and goes directly to the boot screen animation, so a full automatic reboot.
Actual results:
Since I installed Firefox 118.1.1 on my Android phone via the Play Store, my phone crashes when I download any file from any website. My phone doesn't show any dialog with information that the app crashed, it directly goes to the boot screen and bootanimation. This problem occurs on 118.1.1, 118.2.0, 119.0.
When I downgrade to 118.1.0 everything works as expected.
Expected results:
The file should be stored in the Downloads folder and the phone shouldn't crash
|
|
1,862,089 | 16,646,284 |
The test case is:
```
gczeal(10);
var ins = new WebAssembly.Instance(new WebAssembly.Module(wasmTextToBinary(`
(module
(type $t (func (param i64 funcref)))
(func (export "test") (param i64 funcref) (result i64)
local.get 0
local.get 1
local.get 1
ref.cast (ref $t)
call_ref $t
local.get 0
)
)`)));
var vis = ins.exports.test;
while (1) {
const visFn = new WebAssembly.Function({
parameters: ["i64", "funcref"],
results: []
}, ()=>{});
vis(1n, visFn);
}
```
and crashes with
```
Assertion failure: this->flags() == 0, at /Users/yury/Work/mozilla-unified/js/src/gc/Cell.h:832
#01: JSObject::getClass() const[/Users/yury/Work/mozilla-unified/obj-aarch64-apple-darwin22.5.0/dist/bin/js +0x1a8dc]
#02: bool ToJSValue_funcref<js::wasm::NoDebug>(JSContext*, void*, JS::MutableHandle<JS::Value>)[/Users/yury/Work/mozilla-unified/obj-aarch64-apple-darwin22.5.0/dist/bin/js +0x138ce10]
#03: bool js::wasm::ToJSValue<js::wasm::NoDebug>(JSContext*, void const*, js::wasm::PackedType<js::wasm::FieldTypeTraits>, JS::MutableHandle<JS::Value>, js::wasm::CoercionLevel)[/Users/yury/Work/mozilla-unified/obj-aarch64-apple-darwin22.5.0/dist/bin/js +0x138b678]
#04: js::wasm::Instance::callImport(JSContext*, unsigned int, unsigned int, unsigned long long*)[/Users/yury/Work/mozilla-unified/obj-aarch64-apple-darwin22.5.0/dist/bin/js +0x128f6f4]
#05: js::wasm::Instance::callImport_general(js::wasm::Instance*, int, int, unsigned long long*)[/Users/yury/Work/mozilla-unified/obj-aarch64-apple-darwin22.5.0/dist/bin/js +0x1290cc0]
zsh: segmentation fault ~/Work/mozilla-unified/obj-aarch64-apple-darwin22.5.0/dist/bin/js 5.js
```
Looking at rr session (different/non-reduces test though): earlier, `Instance::callImport` https://searchfox.org/mozilla-central/source/js/src/wasm/WasmInstance.cpp#253 starts GC and relocates the function object.
The test is reduced from failures at bug 1861981 and 1854714
|
|
1,856,959 | 16,607,016 |
Created attachment 9356615
Screenrecorder-2023-10-04-16-29-20-243.mp4
### Preconditions
Make sure you have VPN connected to US.
Make sure you have developer's option enabled, and the "Shopping experience" toggle is ON.
Enroll in the Fakespot shopping experience.
### Steps to reproduce
1. Go to a gift card, streaming video, music or games product detailed page from amazon.com, bestbuy.com, or walmart.com.
2. Tap the price tag icon in the URL.
3. Observe the bottom sheet.
### Expected behavior
The "We can't check these reviews" error message is displayed for these types of products.
### Actual behavior
The user is prompted to start the analysis, after which the "No info available" error message is displayed.
### Device information
* Firefox version: Nightly 120.0a1 from 10/04
* Android device: any device
### Any additional information?
After analyzing the product once and closing the bottom sheet, the next time the bottom sheet is opened, the error message would persists (the user is not prompted to analyze the product again).
This issue could be related to https://bugzilla.mozilla.org/show_bug.cgi?id=1856797, however, we receive the same incorrect error message on older Nightly builds as well.
|
|
1,856,972 | 16,607,111 |
Steps to reproduce:
We try to load the CPS PKCS#11 library manually :
1°) Open firefox 114 beta 4
2°) Go to Settings > Privacy & Security
3°) In the 'Security' section, click the button 'Security devices'
4° ) In the security modules dialog, click the button 'Load module'
5°) In the 'Load module' dialog, browse to location where resides the CPS PKCS#11 module (cps3_pkcs11_osx.dylib) in /usr/local/lib
6°) Validate the 'Load module' dialog
=================================
The same library is loaded without any problem in Firefox 118 release.
Actual results:
An error message is displayed saying that the module couldn't be loaded
Expected results:
The CPS module should have been loaded without any error messages
The CPS module should have been listed in the security modules dialog as a new module
|
|
1,857,118 | 16,607,912 |
STR:
- Open 1113 tabs
- Switch Firefox View to the Open Tabs view
- Close one of the tabs
- The browser hangs for about 2 seconds
Here's the profile: https://share.firefox.dev/3ROuzdw
|
|
1,857,430 | 16,609,850 |
Created attachment 9357003
video_2023-10-06_15-08-06.mp4
i found a vulnerability where user can fall for clickjacking to allow location permission
I tested on Firefox version 118.0.1 (64-bit)
steps to reproduce:
1. Open lock2-1-firefox.html
2. fastly move to the "do many clicks here" button.
3. Quickly click the "do many clicks here" button 6-7 times without moving the mouse then the location permission will be allowed
references : https://bugzilla.mozilla.org/show_bug.cgi?id=1826116
|
|
1,857,450 | 16,610,057 |
Steps to reproduce:
Yesterday I upgraded thunderbird from 102ESR to 115.3.1-1~deb12u1 from Debian bookworm (stable) repository.
Actual results:
Today I noticed mess in a NNTP newsgroup. It looks like concurrent writes to the offline cache file:
`News/news.gmane.org/gmane.emacs.orgmode` (actually currently the server is news.gmane.io)
```
From - Thu Oct 5 23:49:55 2023
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
From - Thu Oct 5 23:49:55 2023
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Path: news.gmane.io!.POSTED.blaine.gmane.org!not-for-mail
From: Eli Zaretskii <[email protected]>
Newsgroups: gmane.emacs.orgmode,gmane.emacs.devel
Subject: Re: Completion of links to man pages
Date: Thu, 05 Oct 2023 18:52:36 +0300
Approved: [email protected]
Message-ID: <[email protected]>
References: <[email protected]> <87sf6pi9fn.fsf@localhost>
```
You see that it is a cross-post and before I notice these jammed messages in gmane.emacs.orgmode having offline cache enabled, I noticed no issues with same messages in gmane.emacs.devel where I have not enabled offline cache.
Expected results:
Messages are written to cache strictly sequentially.
In this particular newsgroup I enabled offline storage due to other thunderbird bugs related to opening messages read earlier and to mitigate lags due to intermittent network issues.
|
|
1,857,903 | 16,614,676 |
Created attachment 9357388
Video of the issue.mp4
**[Prerequisites]:**
- “browser.search.region” config is set to any of the following regions: "as,at,be,ch,es,fi,gg,ie,im,io,it,je,mp,nl,pr,se,uk,um,vg,vi".
**[Steps to reproduce]:**
1. Open the browser;
2. Navigate to “about:preferences#moreFromMozilla”;
3. Observe the behavior.
**[Expected result]:**
- Mozilla VPN should be recommended to users and be displayed in the More from Mozilla section since the regions from prerequisites all have Mozilla VPN available as a service.
**[Actual result]:**
- Mozilla VPN product promo is not displayed. Only other products such as Firefox Mobile and Firefox Relay are present.
**[Notes]:**
- Issue does not reproduce for the following regions: "us,ca,nz,sg,my,gb,de,fr" and Mozilla VPN is correctly being displayed in More from Mozilla. Due to this we believe that [this](https://searchfox.org/mozilla-central/rev/3d0b07f5a3c7b8d9955fb8e8acaaf582b1e33bb6/toolkit/modules/BrowserUtils.sys.mjs#505) list of regions is being used instead of the intended one, which should be [this](https://searchfox.org/mozilla-central/source/browser/app/profile/firefox.js#2040) one. As it can be seen, the full list of regions contains the ones that are currently functional, but it also contains the ones from prerequisites that are not working.
|
|
1,858,144 | 16,616,535 |
**Found in**
* Nightly 120.0a1
**Affected versions**
* Nightly 120.0a1
**Tested platforms**
* Affected platforms: macOS 12, Ubuntu 22.04, Windows 11
**Steps to reproduce**
1. Launch a private window.
2. Browse various websites.
3. Delete the session by clicking on the "End Private Session" button.
4. Press the Ctrl+Shift+T keys.
**Expected result**
* After deleting the session data the closed tabs should not be restored.
**Actual result**
* All tabs opened during step 2 are restored even after ending the private session.
**Regression range**
Not a regression.
**Additional notes**
* Setting the severity of this issue to S2 - as it should not be possible to recover deleted browsing history after ending the private session.
|
|
1,858,183 | 16,616,749 |
**Found in**
* Nightly 120.0a1
**Affected versions**
* Nightly 120.0a1
**Tested platforms**
* Affected platforms: macOS 11.7, Ubuntu 22.04 x64, Windows 10 x64.
**Preconditions**
* Open the Screenreader before opening Firefox:
- on Windows 10 - NVDA
- on macOS - Voice Over
- on Ubuntu - integrated screen reader.
**Steps to reproduce**
1. Open a private window.
2. Use the screen reader to reach the "End Private Session" button and open the Confirmation panel.
**Expected result**
* The button and the information from the Confirmation panel (including the check box and buttons) should be read by the screen reader.
**Actual result**
* While the screen reader successfully reads the "Always ask me" checkbox and the buttons, it does not read the text within the Confirmation dialog: "End your private session? Close all private tabs and delete history, cookies, and all other site data."
**Regression range**
* Not a regression.
**Additional notes**
* When using VoiceOver on Mac OS, I could access the text, but it was part of a different group, necessitating navigation through the Extensions and Open App Menu buttons before reaching the text, which might be confusing for the users.
|
|
1,858,371 | 16,617,827 |
**[Affected versions]:**
- Firefox Release 115.0 and above
**[Affected Platforms]:**
- Windows 10 x64
- macOS 13.4.1
- Ubuntu 22.04 x64
**[Steps to reproduce]:**
1. Navigate to the "https://experimenter.services.mozilla.com/nimbus/vpn-moments-page-october-new-users/summary" experiment.
2. Scroll down to the "Audience" section and observe the "Full targeting expression".
**[Expected result]:**
- According to the received [documentation](https://docs.google.com/document/d/1OvWvJ6azwOoSmMqAKqDj1mn8_UsoZa_M53_PNROb0-c/edit#heading=h.hwmok2nif0hz) the "VPN moments page October (New Users)" experiment should target profiles younger than 28 days.
**[Actual result]:**
- The "(currentDate|date - profileAgeCreated|date) / 86400000 >= 28" targeting expression is displayed.
**[Notes]:**
- Based on the actual targeting users with Firefox profiles younger than 28 days will not be enrolled in the experiment.
|
|
1,849,685 | 16,547,396 |
Created attachment 9349840
FakespotIconAddressBar.mp4
**Found in**
* Nightly 118.0a1 (2023-08-22)
**Affected versions**
* Nightly 118.0a1 (2023-08-22)
**Affected platforms**
* ALL
**Preconditions:**
Set the browser.shopping.experience2023.enabled - TRUE
Set the browser.shopping.experience2023.optedIn - 1
**Steps to reproduce**
1. Reach amazon.com
2. Search for Standing desk.
3. Use the Mouse wheel to open a product in a new tab. (Right click open in a new tab also works.)
**Expected result**
* The Fakespot shopping address bar icon should not be displayed on the search results page.
**Actual result**
* The Fakespot address bar icon shows up if the user opens a product details page in a separate tab
**Regression range**
Not Applicable
|
|
1,849,958 | 16,549,211 |
Perfherder has detected a browsertime performance regression from push [29c39113c4bfbf17193d9ca9a756482de04da3af](https://hg.mozilla.org/integration/autoland/pushloghtml?changeset=29c39113c4bfbf17193d9ca9a756482de04da3af). As author of one of the patches included in that push, we need your help to address this regression.
### Regressions:
| **Ratio** | **Test** | **Platform** | **Options** | **Absolute values (old vs new)** | **Performance Profiles** |
|--|--|--|--|--|--|
| [18%](https://treeherder.mozilla.org/perfherder/graphs?timerange=1209600&series=autoland,3913745,1,13) | [welcome](https://firefox-source-docs.mozilla.org/testing/perfdocs/raptor.html#welcome-c) fcp | windows10-64-shippable-qr | fission warm webrender | [41.50](https://firefox-ci-tc.services.mozilla.com/api/queue/v1/task/ADqWbgZZSf-U2LLAgTrXrw/runs/0/artifacts/public/test_info/browsertime-results.tgz) -> [48.89](https://firefox-ci-tc.services.mozilla.com/api/queue/v1/task/LQ6k1BmETECNjK-SpzK3AQ/runs/0/artifacts/public/test_info/browsertime-results.tgz) | [Before](https://profiler.firefox.com/from-url/https%3A%2F%2Ffirefox-ci-tc.services.mozilla.com%2Fapi%2Fqueue%2Fv1%2Ftask%2FADqWbgZZSf-U2LLAgTrXrw%2Fruns%2F0%2Fartifacts%2Fpublic%2Ftest_info%2Fprofile_welcome.zip)/[After](https://profiler.firefox.com/from-url/https%3A%2F%2Ffirefox-ci-tc.services.mozilla.com%2Fapi%2Fqueue%2Fv1%2Ftask%2FLQ6k1BmETECNjK-SpzK3AQ%2Fruns%2F0%2Fartifacts%2Fpublic%2Ftest_info%2Fprofile_welcome.zip) |
| [13%](https://treeherder.mozilla.org/perfherder/graphs?timerange=1209600&series=autoland,3913745,1,13) | [welcome](https://firefox-source-docs.mozilla.org/testing/perfdocs/raptor.html#welcome-c) fcp | windows10-64-shippable-qr | fission warm webrender | 41.75 -> 47.27 | |
Details of the alert can be found in the [alert summary](https://treeherder.mozilla.org/perfherder/alerts?id=39377), including links to graphs and comparisons for each of the affected tests. Please follow our [guide to handling regression bugs](https://wiki.mozilla.org/TestEngineering/Performance/Handling_regression_bugs) and **let us know your plans within 3 business days, or the offending patch(es) may be backed out** in accordance with our [regression policy](https://www.mozilla.org/en-US/about/governance/policies/regressions/).
If you need the profiling jobs you can trigger them yourself from treeherder job view or ask a sheriff to do that for you.
For more information on performance sheriffing please see our [FAQ](https://wiki.mozilla.org/TestEngineering/Performance/FAQ).
|
|
1,850,337 | 16,553,314 |
**[Affected versions]:**
- Firefox RC 117.0, en-US locale (Build ID: 20230824132758)
**[Affected Platforms]:**
- Windows 10 x64
- macOS 13.1
- Linux Mint 20.2
**[Prerequisites]:**
- Have the Firefox browser installed on your computer.
- Have this “times.json” file downloaded to your computer.
**[Steps to reproduce]:**
1. Create a new profile but do not open it.
2. Paste the “times.json” file to the Profile Folder.
3. Open the Firefox profile newly created.
4. Navigate to the “about:config” page
5. Set the “nimbus.debug” pref to true and the “browser.search.region” set to AT/BE/CA/CH/DE/GB/IE/IN/US.
6. Navigate to "about:studies?optin_slug=newtab-csat-microsurvey&optin_branch=treatment-a&optin_collection=nimbus-preview" to enroll in the Treatment branch of the experiment.
7. Open a new tab and observe the behavior.
**[Expected result]:**
- The “Help Firefox improve this page” microsurvey is correctly displayed according to the [documentation](https://docs.google.com/document/d/1OtvgLfqstCxOUNYXzNKG_98W1R59jPmBU6jaUMqWCs0/edit).
**[Actual result]:**
- The [Microsurvey](https://docs.google.com/document/d/1j6AMusH8XD2MLBnLtpgkzufgwDGxRbQKiADSrlAElZQ/edit) from the Treatment A of the "Microsurvey MVP" experiment is displayed instead.
**[Notes]:**
- Attaching a screen recording of the issue [here](https://drive.google.com/file/d/135FrCb9ZQlz_mSL1TUm3D88ff54OilWA/view?usp=sharing).
|
|
1,850,524 | 16,554,716 |
**[Affected versions]:**
- Firefox RC 117.0 - Build ID: 20230824132758
**[Affected Platforms]:**
- Windows 10 x64
- macOS 13.4.1
- Ubuntu 22.04 x64
**[Prerequisites]:**
- Have the following [User.js](https://drive.google.com/file/d/1p-Ojr-ub3YRzymgnAyEECxXvz6f6sADs/view?usp=sharing) saved to your PC.
- Have a Firefox profile older than 28 days with 21 days of activity.
**[Steps to reproduce]:**
1. Navigate to the profile folder from the prerequisites and paste the "user.js" file.
2. Open the browser using the profile from prerequisites.
3. Navigate the the "about:studies" page and observe the displayed studies.
**[Expected result]:**
- The "Newtab Pocket Topics Microsurvey" experiment is not displayed in the "about:studies" page.
**[Actual result]:**
- The "Newtab Pocket Topics Microsurvey" experiment is displayed as active.
**[Notes]:**
- The [received documentation](https://docs.google.com/document/d/1j6AMusH8XD2MLBnLtpgkzufgwDGxRbQKiADSrlAElZQ/edit#heading=h.gzh3ljgkgxch) states in the "Target Audience Details" section that user should have at least 28 days of activity in order to enroll in the study.
|
|
1,850,732 | 16,556,253 |
Created attachment 9350850
baebb25c-94f2-4c06-a307-1ca5092cb635.ics
Steps to reproduce:
Opened the Calendar window -> Menu -> Open From File -> Calendar -> here I choose the attached .ics file.
Actual results:
The Calendar (and Thunderbird) is not responding and the only thing one can do is forcing close of the program.
Using Thunderbird now becomes impossible since opening it once again results in a immediately freezed program.
Expected results:
The calendar should be imported.
|
|
1,850,938 | 16,557,367 |
6 crashes from 3 installations of Firefox 118.0 Nightly and Developer Edition (diagnostic assert). Same signature had been fixed in bug 1414762 several years ago.
Crash report: https://crash-stats.mozilla.org/report/index/94d17df9-1d8c-4e86-8d2e-e73360230830
MOZ_CRASH Reason: ```MOZ_DIAGNOSTIC_ASSERT(!inUnsafeRegion) ([AutoAssertNoGC] possible GC in GC-unsafe region)```
Top 10 frames of crashing thread:
```
0 XUL JSContext::verifyIsSafeToGC js/src/vm/JSContext.h:518
0 XUL js::RunScript js/src/vm/Interpreter.cpp:419
0 XUL js::InternalCallOrConstruct js/src/vm/Interpreter.cpp:612
0 XUL InternalCall js/src/vm/Interpreter.cpp:647
0 XUL js::Call js/src/vm/Interpreter.cpp:679
1 XUL JS_CallFunctionValue js/src/vm/CallAndConstruct.cpp:55
1 XUL nsXPCWrappedJS::CallMethod js/xpconnect/src/XPCWrappedJSClass.cpp:918
2 XUL PrepareAndDispatch xpcom/reflect/xptcall/md/unix/xptcstubs_x86_64_darwin.cpp:117
3 XUL SharedStub
4 ? @0x000000012705135f
```
|
|
1,851,468 | 16,562,635 |
Steps to reproduce:
1. Go on https://www.bandlab.com/
2. In the console:
(new AudioContext()).audioWorklet.addModule('https://www.bandlab.com/web-app/common/workers/libaudioengine-837fbc5d51.js')
Actual results:
CompileError: at offset 7983: exceptions not enabled
Expected results:
I expect the WASM module to be initialized without any error.
The error started to occur over the weekend, with many BandLab users reporting the same problem. I have switched back to a WASM module compiled without the support for exceptions for now.
I re-installed Firefox 116 on macOS, and it seems to work fine using that version. Is there any changes related to WASM and WASM exception in Firefox 117 that could cause this problem?
|
|
1,851,594 | 16,563,597 |
### Preconditions
- Have the [nimbus-cli](https://experimenter.info/nimbus-cli/install/) tool installed.
- Have [adb](https://developer.android.com/tools/releases/platform-tools) (cli) installed on your device.
- Have an Android 13 device with USB or Wifi debugging enabled and connected to the device on which you installed nimbus-cli.
### Steps to reproduce
1. Install the [latest Firefox Beta](https://github.com/mozilla-mobile/firefox-android/releases/tag/fenix-v118.0b4) on an Android 13 device.
2. Open a terminal window on your workstation.
3. Enter the following command in the terminal window `nimbus-cli -a fenix -c beta enroll release-android-onboarding-redesign-treatment-a-rollout --branch treatment-a`
4. Skip the first onboarding card.
5. Sign into Sync using any method on the second card.
6. Tap the `Turn on notifications` button on the third card and observe the behavior.
### Expected behaviour
- A system dialog is triggered prompting the user to Allow or Not Allow the app to send notifications.
### Actual behaviour
- No system dialog is triggered and notifications are disabled.
### Additional information
- I've used a Samsung Galaxy A32 with Android 13 to reproduce the issue.
- The issue is reproducible on the following fenix versions:
- 117.0b9
- 117.0
- 118.0b4
- The issue is not reproducible on 116.2.0 or 115.2.0.
- The issue is not reproducible if the users skips the Sign In card.
- Attached a screen recording:
- [Link](https://drive.google.com/file/d/1ZVlzyhVil04h3NCVDiejvcvxzjLcT4Om/view?usp=sharing)
@Rahul, could you please take a look at this issue?
|
|
1,851,599 | 16,563,647 |
Steps to reproduce:
On git commit 3279ccb472284368de49190d73acb13926a757ec I observed an assertion violation in the js-shell. Unfortunately, reproduction this assertion is a bit convoluted.
The 6 input files are provided via the reprl/fuzzing interface, hence the attached python script instead of a simple js file.
Furthermore, reproduction works in 10% of trials only. The script's `SPIDERMONKEY` must be adapted to point to the js-shell.
Precautiously marking as s-s.
I uploaded a pernosco session here but the source seems to missing, not sure what I did wrong there.
https://pernos.co/debug/5z_QVrXs3ZkRL1NaiXTQfg/index.html
```
#0 js::jit::AttachBaselineCacheIRStub (cx=cx@entry=0x7ffff662e100, writer=..., kind=<optimized out>,
outerScript=0x382c863a1330, icScript=icScript@entry=0x7ffff549e400, stub=stub@entry=0x7ffff549ea70,
name=0x555555a30c8a "GetProp.TypedElement")
at js/src/jit/BaselineCacheIRCompiler.cpp:2602
#1 0x0000555557cdd497 in js::jit::TryAttachStub<js::jit::GetPropIRGenerator, js::jit::CacheKind, JS::Handle<JS::Value>&, JS::Handle<JS::Value>&> (name=0x5555559d70d6 "GetElem", cx=cx@entry=0x7ffff662e100, frame=<optimized out>,
stub=stub@entry=0x7ffff549ea70, args=..., args=..., args=...)
at js/src/jit/BaselineIC.cpp:497
#2 0x0000555557cdca6b in js::jit::DoGetElemFallback (cx=0x7ffff662e100, frame=0x7fffffffbea0,
stub=0x7ffff549ea70, lhs=..., rhs=..., res=...) at js/src/jit/BaselineIC.cpp:708
#3 0x000035c7531ab627 in ?? ()
#4 0x0000000000000101 in ?? ()
#5 0x00007fffffffbb18 in ?? ()
#6 0x0000000000000000 in ?? ()
```
|
|
1,865,617 | 16,675,191 |
Crash report: https://crash-stats.mozilla.org/report/index/1dd7f326-9819-4295-89c9-302200231120
Java stack trace:
```
java.lang.OutOfMemoryError
```
It seems to be `jni::ByteBuffer::New` causes OOM exception. This method can return error, so we need to consider fallible version of `jni::ByteBuffer::New` .
|
|
1,865,620 | 16,675,308 |
Created attachment 9364460
Error of 'export RNP_LOG_CONSOLE=1'
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36 OPR/104.0.0.0
Steps to reproduce:
- create a PGP key in thunderbird < 115 (exact version: 115.4.3)
- used this key with another product to send an encrypted message to my mailbox
- opened the message in thunderbird
Actual results:
The message cannot be opened because 'There are unkonwn problems with this encrypted message'.
Expected results:
The message should have been decrypted and displayed like it was done before the upgrade to 115.
|
|
1,865,625 | 16,675,377 |
Created attachment 9364469
Video showing the issue
**Found in**
* Nightly 121.0a1
**Affected versions**
* Nightly 121.0a1
**Tested platforms**
* Affected platforms: macOS 13.6 and macOS 14
* Unaffected platforms: Windows 10 and Ubuntu 22.04
**Preconditions**
* Have a valid google account
**Steps to reproduce**
1. Login to google account
2. Go to Manage your Google Account > Security
3. Click `Passkey` and then Click on `Create a passkey`
4. Click on `Continue` or use another device and select `Use security key`
**Expected result**
* A new passkey is successfully created
**Actual result**
* Something went wrong dialog is displayed and the passkey is not created
**Regression range**
* Not a regression since this is a new feature and it also reproduces in the same day the feature was added in Nightly 121.
**Additional notes**
* Passkeys can be added to the google account using Safari browser but not Firefox.
* Marking this as S2 severity because users who use Google will not be able to use this feature in Firefox.
* I only get an error inside the Web Console when choosing the `Use security key` option. This is the output from the console:
```c
Uncaught (in promise)
Object { stack: "_.ja@https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountSettingsStrongauthUi.en.ehny_KKREzE.es5.O/am=EEa2_ZJF1gJCAIAI/d=1/excm=_b,_tp,passkeysview/ed=1/dg=0/wt=2/ujg=1/rs=AOaEmlH7sKxUqOaguTfj5eRa-82QnclLAg/m=_b,_tp:26:361\n_.se@https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountSettingsStrongauthUi.en.ehny_KKREzE.es5.O/am=EEa2_ZJF1gJCAIAI/d=1/excm=_b,_tp,passkeysview/ed=1/dg=0/wt=2/ujg=1/rs=AOaEmlH7sKxUqOaguTfj5eRa-82QnclLAg/m=_b,_tp:280:337\n_.YR.prototype.Aa@https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountSettingsStrongauthUi.en.ehny_KKREzE.es5.O/ck=boq-identity.AccountSettingsStrongauthUi.0kGCf5wlYQw.L.F4.O/am=EEa2_ZJF1gJCAIAI/d=1/exm=LEikZe,_b,_tp,byfTOb,lsjVmc/excm=_b,_tp,passkeysview/ed=1/wt=2/ujg=1/rs=AOaEmlHsWfdhqombindHKhvWC95hStGyDA/ee=BcQPH:zw1Icf;EVNhjf:pw70Gc;EmZ2Bf:zr1jrb;Erl4fe:FloWmf;JsbNhc:Xd8iUd;LBgRLc:SdcwHb;Me32dd:MEeYgc;NPKaK:SdcwHb;NSEoX:lazG7b;Oj465e:KG2eXe;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:qfTGrb;SNUn3:Zw…", ha: false, status: {…} }
```
|
|
1,865,747 | 16,676,174 |
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/119.0
Steps to reproduce:
I'm running the latest version of Firefox on Linux (Arch), with the Hyprland tiling manager, and trying to access https://www.google.com/maps.
Actual results:
Firefox crashes. If I comment out the "env = GBM_BACKEND,nvidia-drm" line in the config (as suggested here https://wiki.hyprland.org/Nvidia/) it fixes it.
However, my understanding is that by commenting the line I'm basically blocking Firefox from using the GPU (Nvidia), which in turn makes sites such as chess.com sluggish for some reason.
Expected results:
Google Maps should load with no issue, as it does (for example) on Chromium.
|
|
1,865,914 | 16,677,517 |
Created attachment 9364822
test.html
By combining techniques from https://bugzilla.mozilla.org/show_bug.cgi?id=1839073 and https://bugzilla.mozilla.org/show_bug.cgi?id=1857430, possible to bypass fullscreen.
STR
0. For better verification, increase security.notification_enable_delay in about:config to 1000.
1. Open test.html
2. Hover over button and spam click.
3. The prompt is accepted instantaneously after a fullscreen transition without enablement delay of 1000ms
Hypothesis: In this patch we reset the timeShown of https://hg.mozilla.org/mozilla-central/rev/75b8d8d5ea21 when window containing prompt gains focus. Therefore, I think any modifications to the timeShown variable in the fullscreen patch can be reset though this.
|
|
1,865,973 | 16,677,851 |
Created attachment 9364876
Untitled.png
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:122.0) Gecko/20100101 Firefox/122.0
Steps to reproduce:
1. use firefox with build id 20231121045833
2. goto https://bitbucket.org/fargo3d/public/src/ae0fcdc67bb7c83aed85fc9a4d4a2d5061324597/Makefile
Actual results:
in Makefile code font not render correctly
Expected results:
font should render correctly.
after update it work properly i think it already backout in new version.
but i want to let you known
|
|
1,866,006 | 16,678,019 |
The attached testcase crashes on mozilla-central revision 20231122-ef0b50d89a7f (build with (metadatabuildFlags not available)).
For detailed crash information, see attachment.
To reproduce the issue, perform the following steps:
1. Download the attached testcase, save as "test.bin".
2a. Build with `--enable-fuzzing` (requires Clang and ASan, also build gtests using `./mach gtest dontruntests`).
2b. Alternatively you can download builds from TC using `python -mfuzzfetch -a --fuzzing --target firefox gtest` (see https://github.com/MozillaSecurity/fuzzfetch).
3. Run `FUZZER=NetworkHttp objdir/dist/bin/firefox test.bin`
|
|
1,866,025 | 16,678,367 |
Created attachment 9364941
firefox.strace
Steps to reproduce:
Running on ArchLinux ARM (in case it's a packaging issue) on Sway 1.8.1 + wlroots 0.16.2 (in case it's a Wayland issue), I got the upgrade from `firefox-119.0.1-1-aarch64` to `firefox-120.0-1-aarch64`; upon restarting Firefox, I got met with a segfault (see strace attached) right at startup, before any window opens. Downgrading back to 119.0.1 fixes the issue (but I have now lost access to my normal profile since Firefox has a new check preventing downgrades; I understand why that check was added, but it's still annoying...)
On the environment side, I have `MOZ_DBUS_REMOTE=1` & `MOZ_ENABLE_WAYLAND=1` (not sure if it's relevant, I'll try changing these once I've posted this issue since I can't run both versions in parallel. I don't need the dbus one anymore, it was for back when I was still running X sometimes, and I'll try removing the wayland one in case running through xwayland fixes the issue, as that would narrow down the problem.
Actual results:
Segfault (see strace attached)
Expected results:
Firefox starts :)
|
|
1,866,230 | 16,680,172 |
Created attachment 9365134
multiple impressions registered.mp4
**[Affected versions]:**
- Firefox Beta 121.0b2 - Build ID: 20231122091904
- Firefox Nightly 122.0a1 - Build ID: 20231121183118
**[Affected Platforms]:**
- Windows 10 x64
- Ubuntu 22.04 x64
- macOS 13.1
**[Prerequisites]:**
- Have a Firefox 121 or 122 en* build installed.
- Have the following prefs in the "about:config" page:
- browser.search.region set to US;
- browser.urlbar.quicksuggest.contextualOptIn set to true
- browser.urlbar.quicksuggest.contextualOptIn.topPosition set to false
- Have [Glean telemetry](https://testrail.stage.mozaws.net/index.php?/cases/view/2323256) configured.
**[Steps to reproduce]:**
1. Open the browser with the profile from the prerequisites.
2. Click on the Address Bar.
3. Click any of the displayed results while the Opt-In section is displayed.
4. Navigate to "about:glean" and click on the "Apply settings and submit ping".
4. Navigate to the Glean debug page: https://debug-ping-preview.firebaseapp.com/.
5. Select your tag and verify the last event registered.
**[Expected result]:**
- Only one impression for "quick_suggest_contextual_opt_in" is registered.
**[Actual result]:**
- Three impression telemetry are registered for "quick_suggest_contextual_opt_in".
**[Notes]:**
- The issue is NOT reproducible for the Opt-In section displayed at the top, only one impression is registered.
- This issue can affect the data collected for the experiment when it will be launched. Considering this I will mark this issue as an S2.
- Attached is a screen recording of the issue.
|
|
1,866,396 | 16,681,145 |
While investigating Bug 1866025 I ran into content process crashes on Linux on Apple Silicon. I don't have a backtrace yet.
|
|
1,866,545 | 16,681,869 |
The following testcase crashes on mozilla-central revision 20231124-dbd1a6aef0a7 (debug build, run with --fuzzing-safe --ion-offthread-compile=off):
See attachment.
Backtrace:
received signal SIGILL, Illegal instruction.
#0 0x33514063 in ?? ()
#1 0x335141e3 in ?? ()
#2 0xf3400708 in ?? ()
eax 0x0 0
ebx 0x0 0
ecx 0xf3400708 -213907704
edx 0x0 0
esi 0xf6ef8750 -152074416
edi 0xdeadbeef -559038737
ebp 0xffffbfa8 4294950824
esp 0xffffbf90 4294950800
eip 0x33514063 860962915
=> 0x33514063: ud2
0x33514065: mov 0x10(%ecx),%edx
This only reproduces on 32-bit.
|
|
1,866,614 | 16,682,357 |
2023-11-24T16:26:53.178000: DEBUG : Found commit message:
Bug 1858799 - expose an nsIWebAuthnService on Windows. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D190978
2023-11-24T16:26:53.178000: DEBUG : Did not find a branch, checking all integration branches
2023-11-24T16:26:53.182000: INFO : The bisection is done.
2023-11-24T16:26:53.185000: INFO : Stopped
|
|
1,867,006 | 16,687,081 |
It seems using HTTP2 websockets with a HTTP2 proxy can sometimes cause WS to not work, or even crashes.
We should disable this until we can fix it and get CI to test this exact scenario to avoid regressions.
|
|
1,867,057 | 16,687,370 |
Created attachment 9365862
2023-11-28_16h56_04.png
**Found in**
* Nightly 122.0a1 (2023-11-27)
**Affected versions**
* Nightly 122.0a1 (2023-11-27)
**Affected platforms**
* ALL
**Preconditions:**
browser.shopping.experience2023.enabled - true
browser.shopping.experience2023.optedIn = 0
**Steps to reproduce**
1. Reach https://www.amazon.de/Amazon-brand-Movian-computer-drawers/product-reviews/B07GFRCZWY/ref=cm_cr_arp_d_paging_btm_next_2?ie=UTF8&reviewerType=all_reviews&pageNumber=2
**Expected result**
* We should not get a product_id for unknown products : https://searchfox.org/mozilla-central/rev/9bc264fbc5d6e618d8f3b9677a8f5e8550b94dbc/browser/components/shopping/content/shopping-container.mjs#217,224-225
**Actual result**
* The Product page showed an unanalyzed card, after which the Not enough reviews message was displayed and finally after refresh the Adjusted card is displayed with 0 stars.
**Regression range**
Not Applicable
This is a new Feature that brings Shopping support to amazon.fr and amazon.de.
|
|
1,862,473 | 16,649,126 |
Created attachment 9361461
poc1101.js
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36
Steps to reproduce:
The vulnerability exists in the WASM compiler of JS engine. The configuration for building is as follows:
ac_add_options --enable-project=js
ac_add_options --disable-optimize
ac_add_options --disable-unified-build
ac_add_options --disable-debug
ac_add_options --enable-debug-symbols
ac_add_options --disable-jemalloc
ac_add_options --disable-tests
Actual results:
This is the full crash log:
```
gdb-peda$ bt
#0 0x000018a9cbba41c0 in ()
#1 0x000048840f012840 in ()
#2 0x0000555558c3cb50 in ()
#3 0x00007fffffff7360 in ()
#4 0x000018a9cbba418f in ()
#5 0x0000555558c3cb50 in ()
#6 0x00005555575c60e5 in mozilla::detail::MaybeStorageBase<js::wasm::TrapData, true>::MaybeStorageBase() (this=0x5555575c60e5 <mozilla::detail::MaybeStorageBase<js::wasm::TrapData, true>::MaybeStorageBase()+21>) at obj-x86_64-pc-linux-gnu/dist/include/mozilla/MaybeStorageBase.h:78
#7 0x000018a9cbba46a9 in ()
#8 0x0000555558c3cb50 in ()
#9 0x0000555558bec588 in ()
#10 0x00007fffffff7658 in ()
#11 0x00007fffffff7658 in ()
#12 0x00007fffffff7400 in ()
#13 0x00005555575c3454 in js::jit::JitActivation::JitActivation(JSContext*)
(this=0x7fffffff7400, cx=0x7fffffff7658)
at js/src/vm/JitActivation.cpp:42
#14 0x0000555558314fab in js::wasm::Instance::callExport(JSContext*, unsigned int, JS::CallArgs, js::wasm::CoercionLevel)
(this=0x555558c3cb50, cx=0x555558bec4a0, funcIndex=0x0, args=..., level=js::wasm::CoercionLevel::Spec) at js/src/wasm/WasmInstance.cpp:2851
#15 0x000055555836de24 in WasmCall(JSContext*, unsigned int, JS::Value*)
(cx=0x555558bec4a0, argc=0x0, vp=0x555558d05670)
at js/src/wasm/WasmJS.cpp:1808
#16 0x000055555713748c in CallJSNative(JSContext*, bool (*)(JSContext*, unsigned int, JS::Value*), js::CallReason, JS::CallArgs const&)
(cx=0x555558bec4a0, native=0x55555836dd00 <WasmCall(JSContext*, unsigned int, JS::Value*)>, reason=js::CallReason::Call, args=...) at js/src/vm/Interpreter.cpp:472
#17 js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct, js::CallReason)
(cx=0x555558bec4a0, args=..., construct=js::NO_CONSTRUCT, reason=js::CallReason::Call)
at js/src/vm/Interpreter.cpp:566
#18 0x0000555557137b0a in InternalCall(JSContext*, js::AnyInvokeArgs const&, js::CallReason)
(cx=0x555558bec4a0, args=..., reason=js::CallReason::Call)
at js/src/vm/Interpreter.cpp:633
#19 0x0000555557137ad3 in js::CallFromStack(JSContext*, JS::CallArgs const&, js::CallReason)
(cx=0x555558bec4a0, args=..., reason=js::CallReason::Call)
at js/src/vm/Interpreter.cpp:638
#20 0x000055555714baa3 in js::Interpret(JSContext*, js::RunState&) (cx=0x555558bec4a0, state=...)
at js/src/vm/Interpreter.cpp:3053
#21 0x000055555713676d in MaybeEnterInterpreterTrampoline(JSContext*, js::RunState&)
(cx=0x555558bec4a0, state=...) at js/src/vm/Interpreter.cpp:386
#22 js::RunScript(JSContext*, js::RunState&) (cx=0x555558bec4a0, state=...)
at js/src/vm/Interpreter.cpp:444
#23 0x0000555557138f3e in js::ExecuteKernel(JSContext*, JS::Handle<JSScript*>, JS::Handle<JSObject*>, js::AbstractFramePtr, JS::MutableHandle<JS::Value>)
(cx=0x555558bec4a0, script=0x31f9a964060, envChainArg=(JSObject * const) 0x31f9a93e038 [object LexicalEnvironment], evalInFrame=AbstractFramePtr ((js::InterpreterFrame *) 0x0) = {...}, result=$JS::UndefinedValue()) at js/src/vm/Interpreter.cpp:831
#24 0x0000555557139152 in js::Execute(JSContext*, JS::Handle<JSScript*>, JS::Handle<JSObject*>, JS::MutableHandle<JS::Value>)
(cx=0x555558bec4a0, script=0x31f9a964060, envChain=(JSObject * const) 0x31f9a93e038 [object LexicalEnvironment], rval=$JS::UndefinedValue()) at js/src/vm/Interpreter.cpp:863
#25 0x0000555557423d6f in ExecuteScript(JSContext*, JS::Handle<JSObject*>, JS::Handle<JSScript*>, JS::MutableHandle<JS::Value>)
(cx=0x555558bec4a0, envChain=(JSObject * const) 0x31f9a93e038 [object LexicalEnvironment], script=0x31f9a964060, rval=$JS::UndefinedValue())
at js/src/vm/CompilationAndEvaluation.cpp:494
#26 0x0000555557423e5f in JS_ExecuteScript(JSContext*, JS::Handle<JSScript*>)
(cx=0x555558bec4a0, scriptArg=0x31f9a964060)
at js/src/vm/CompilationAndEvaluation.cpp:518
#27 0x000055555701cb6b in RunFile(JSContext*, char const*, _IO_FILE*, CompileUtf8, bool, bool)
(cx=0x555558bec4a0, filename=0x555558d01a10 "../AFL-WASM-v2/Workspace-SPM/test.js", file=0x555558d01bb0, compileMethod=CompileUtf8::DontInflate, compileOnly=0x0, fullParse=0x0)
at js/src/shell/js.cpp:1217
#28 0x000055555701c4af in Process(JSContext*, char const*, bool, FileKind)
(cx=0x555558bec4a0, filename=0x555558d01a10 "../AFL-WASM-v2/Workspace-SPM/test.js", forceTTY=0x0, kind=FileScript) at js/src/shell/js.cpp:1797
#29 0x0000555556ff975f in ProcessArgs(JSContext*, js::cli::OptionParser*)
(cx=0x555558bec4a0, op=0x7fffffffdfa0) at js/src/shell/js.cpp:10871
#30 0x0000555556ff37b2 in Shell(JSContext*, js::cli::OptionParser*)
(cx=0x555558bec4a0, op=0x7fffffffdfa0) at js/src/shell/js.cpp:11133
#31 0x0000555556feec17 in main(int, char**) (argc=0x3, argv=0x7fffffffe1b8)
at js/src/shell/js.cpp:11537
#32 0x00007ffff7a48083 in __libc_start_main () at /lib/x86_64-linux-gnu/libc.so.6
#33 0x0000555556fc9d39 in _start ()
```
```
gdb-peda$ i registers
rax 0x555558cea5d0 0x555558cea5d0
rbx 0x48840f012840 0x48840f012840
rcx 0xd0574928 0xd0574928
rdx 0x3cd53d2c 0x3cd53d2c
rsi 0xc27f2164 0xc27f2164
rdi 0x5ebae657 0x5ebae657
rbp 0x7fffffff7360 0x7fffffff7360
rsp 0x7fffffff7330 0x7fffffff7330
r8 0xb3f6cad3 0xb3f6cad3
r9 0x9fac1b66 0x9fac1b66
r10 0x555558cea5d0 0x555558cea5d0
r11 0x7ffff7c10be0 0x7ffff7c10be0
r12 0x5555575c60e5 0x5555575c60e5
r13 0x7fffffffe1b0 0x7fffffffe1b0
r14 0x48840f012840 0x48840f012840
r15 0x7ffeedff0000 0x7ffeedff0000
rip 0x18a9cbba41c0 0x18a9cbba41c0
eflags 0x10202 [ IF RF ]
cs 0x33 0x33
ss 0x2b 0x2b
ds 0x0 0x0
es 0x0 0x0
fs 0x0 0x0
gs 0x0 0x0
gdb-peda$ x/20i 0x18a9cbba41c0-0x50
0x18a9cbba4170: xchg edi,eax
0x18a9cbba4171: lods al,BYTE PTR ds:[rsi]
0x18a9cbba4172: mov ecx,0xd0574928
0x18a9cbba4177: mov r8d,0xb3f6cad3
0x18a9cbba417d: mov r9d,0x9fac1b66
0x18a9cbba4183: mov rsi,QWORD PTR [rbp-0x8]
0x18a9cbba4187: mov rdx,rsi
0x18a9cbba418a: call 0x18a9cbba4520
0x18a9cbba418f: lea rsp,[rbp-0x30]
0x18a9cbba4193: mov edi,0x5ebae657
0x18a9cbba4198: mov esi,0xc27f2164
0x18a9cbba419d: mov edx,0x3cd53d2c
0x18a9cbba41a2: mov r12,QWORD PTR [rbp-0x8]
0x18a9cbba41a6: mov rbx,QWORD PTR [r12+0x40]
0x18a9cbba41ab: cmp r14,rbx
0x18a9cbba41ae: je 0x18a9cbba41f9
0x18a9cbba41b4: mov QWORD PTR [rsp+0x8],r14
0x18a9cbba41b9: mov r14,rbx
0x18a9cbba41bc: mov QWORD PTR [rsp],r14
=> 0x18a9cbba41c0: mov r15,QWORD PTR [r14]
gdb-peda$
0x18a9cbba41c3: mov rax,QWORD PTR [r14+0x20]
0x18a9cbba41c7: mov rbx,QWORD PTR [r14+0x18]
0x18a9cbba41cb: mov QWORD PTR [rax+0xb0],rbx
0x18a9cbba41d2: mov rax,QWORD PTR [r12+0x38]
0x18a9cbba41d7: call rax
0x18a9cbba41d9: or r14,0x0
0x18a9cbba41dd: mov r14,QWORD PTR [rsp+0x8]
0x18a9cbba41e2: mov r15,QWORD PTR [r14]
0x18a9cbba41e5: mov r10,QWORD PTR [r14+0x20]
0x18a9cbba41e9: mov r12,QWORD PTR [r14+0x18]
0x18a9cbba41ed: mov QWORD PTR [r10+0xb0],r12
0x18a9cbba41f4: jmp 0x18a9cbba4200
0x18a9cbba41f9: mov rax,QWORD PTR [r12+0x38]
0x18a9cbba41fe: call rax
0x18a9cbba4200: lea rsp,[rbp-0x30]
0x18a9cbba4204: mov eax,eax
0x18a9cbba4206: mov esi,0xc8f3826d
0x18a9cbba420b: mov edx,0x4fdc6d2c
0x18a9cbba4210: mov edi,eax
0x18a9cbba4212: call 0x18a9cbba4030
```
The reason seems to be that the assembly code, compiled from the wasm module, caused a crash during its execution. The root cause is not clear now, but this OOB bug resulted in registers pollution and a direct overwrite of the call stack, making it exploitable.
For example, the critical part of this assembly block is r14 which is used as a pointer to access certain memory locations. If we can control the r14 register to an arbitrary value, there are several potential attacks we might be able to perform:
1. Arbitrary Read: From the instruction mov r15,QWORD PTR [r14], we can see that r14 is used as a pointer to read a value from memory. If we can control r14 to any arbitrary value, this potentially allows us to read data from any memory location in the process's address space.
2. Arbitrary Write: Similar to the previous point, the code contains the instruction mov QWORD PTR [rax+0xb0],rbx where rax is loaded from [r14+0x20]. If we can control r14 to point to a location of our choice, we can change the value of rax and thus control the destination of the write operation (i.e., rax+0xb0), leading to an arbitrary write vulnerability.
3. Arbitrary Function Call: The instruction call rax, where rax is loaded from [r12+0x38], implies that an arbitrary function pointed to by rax can be called. If we control r14 to a controlled memory location where we have written a crafted r12 structure, we can induce the program to call an arbitrary function, potentially leading to code execution.
This issue can be reproduced on the gecko-dev at the GIT commit 11d085b63cf74b using the --wasm-tail-calls running flag. It's worth noting that this flag is enabled by default in the Nightly version of Firefox(121.0a1 2023-11-01).
|
|
1,862,983 | 16,651,637 |
**[Affected versions]:**
- Firefox Release 119.0 (Build ID: 20231019122658)
- Firefox Beta 120.0b5 (Build ID: 20231101092803)
- Firefox Nightly 121.0a1 (Build ID: 20231103093836)
**[Affected Platforms]:**
- Windows 10 x64
- macOS Ventura 13.5.1
- Linux Mint 21.1
**[Prerequisites]:**
- Have a Nimbus experiment with the “feltPrivacy” feature configuration set (e.g.: [Feature Configuration Testing for "feltPrivacy" experiment](https://stage.experimenter.nonprod.dataops.mozgcp.net/nimbus/feature-configuration-testing-for-feltprivacy/summary)).
- Have the following syntax pasted in the Command Prompt Window: set MOZ_REMOTE_SETTINGS_DEVTOOLS=1.
- Have created a new Firefox profile.
- Have this ["user.js"](https://drive.google.com/file/d/1EJM8H7un4rCUaum7QU62wfaGQJBEj2sH/view?usp=sharing) file saved to you computer.
**[Steps to reproduce]:**
1. Create a new profile but do not open it.
2. Paste the "user.js" file into the Profile Folder.
3. Open the Firefox profile newly created.
4. Open a new Private Browsing window.
5. Navigate to the "about:telemetry#events-tab" and search for the "expose" event.
**[Expected result]:**
- An "expose" event related to the experiment is displayed on the "about:telemetry#events-tab" page.
**[Actual result]:**
- No "expose" event related to the experiment is displayed on the "about:telemetry#events-tab" page.
**[Notes]:**
- According to the [“Feature Manifest”](https://searchfox.org/mozilla-central/source/toolkit/components/nimbus/FeatureManifest.yaml#1910) file there should be an exposure event after a Private Window is opened.
- Attaching a screen recording of the issue [here](https://drive.google.com/file/d/1J2vA9kDxv5abEIjO-73KsBe0hSZQoMB4/view?usp=sharing)
|
|
1,863,083 | 16,652,218 |
Created attachment 9361956
bandicam 2023-11-04 04-40-56-944.mp4
i found a vulnerability where user can fall for clickjacking to allow permission
I tested on Firefox version 120.0b4 (64-bit)
steps to reproduce:
1. open clickjacknew.html then click open button
2. Click the "click 3 fastly" button fastly.
|
|
1,863,491 | 16,657,164 |
Created attachment 9362301
about.support.txt
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Steps to reproduce:
Browsing Twitter (any of my accounts in their container).
Actual results:
Within a few minutes on the last few Nightly updates Twitter grinds to a halt. Everything loads glacially, including likeing or retweeting. After scrolling clicking on tweet loads the wrong tweet, presumably the scroll hasn't caught up. Happens after disabling Ublock Origin, even in troubleshooting mode. Other websites however seem to be unaffected.
Expected results:
Should be at least as fast as before. Downgrading to Nightly 2023-10-30-16-49-30 (the only old version I tried) restores the usable performance.
|
|
1,863,863 | 16,659,815 |
Created attachment 9362754
bandicam 2023-11-09 10-07-43-779.mp4
i found a vulnerability where user can fall for clickjacking to allow permission
I tested on Firefox dev version 120.0b3 (64-bit)
steps to reproduce:
1. open clickjack0.html then click open button
2. Click the "click 5 fastly" button fastly.
|
|
1,864,123 | 16,661,428 |
EncryptingOutputStream can write random contents of memory to its base stream. This can happen when original data is smaller than 4K. The stream encrypts only actual payload, but data is written to the base stream in whole 4K blocks. EncryptingOutputStream is used by IndexedDB and CacheAPI to store data on disk for private browsing, so the base stream in that case is quota::FileOutputStream, so random contents of memory can end up being stored on disk.
We have a fix for this which fills unused payload with random values.
We suggest to treat this as sec-other since Cache API in private browsing is still gated by a pref and it' still disabled by default. The issue is more serious in the Cache API case, because files stored on disk are fundamental part of the implementation. IndexedDB stores data in separate files only to support storing of DOM Blobs/Files which is not used so often.
IndexedDB in private browsing shipped in FF 115, so the fix might need to be uplifted even to ESR 115.
|
|
1,864,350 | 16,662,718 |
Steps to reproduce:
1. Revoke the camera and microphone permission for Firefox
2. Visit links that have a upload button such as:
https://vocaroo.com/upload
https://postimages.org
and tap the button
3. Deny both permission requests
Actual results:
Nothing
Expected results:
System file picker should pop out because it does not require any permission. This is also what happens on Chrome.
|
|
1,864,478 | 16,665,506 |
Created attachment 9363306
Comparison with the Search icon on the black theme vs white theme
**Found in**
* Nightly 121.0a1
**Affected versions**
* Firefox 120 beta
* Nightly 121.0a1
**Tested platforms**
* Affected platforms: Windows 10
* Unaffected platforms: Ubuntu 22.04, macOS 11.7
**Preconditions**
* In about:config, set "browser.privatebrowsing.felt-privacy-v1" to true
* Enable High Contrast Mode - set the High Contrast Black Theme.
**Steps to reproduce**
1. Open a private window.
2. Observe the in-content Search field.
**Expected result**
* A generic search icon should be displayed on the left side of the "Search with Google or enter address" text.
**Actual result**
* On Windows 10 with a black theme selected, the generic search icon is not visible.
**Regression range**
* Not a regression.
**Additional notes**
* The old search icon is visible with a high contrast black theme when the pref "browser.privatebrowsing.felt-privacy-v1" is set to false.
* This issue is not reproducible on macOS X or Ubuntu when high contrast + black themes are enabled.
|
|
1,864,972 | 16,669,494 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/119.0
Steps to reproduce:
Login using the Danish national eID ("MitID") using the FIDO U2F chip as 2. factor.
This functions correctly on Win10/11 with all versions (at least from v82) to 118.02.
It also works correctly on Google Chrome.
The government agency has been contacted, but was not interested in looking into the matter - referred to using Google Chrome from now on.
Actual results:
Everything in the process works up until the key on the U2F key has been pressed. But then the following error message is displayed:
An error has occurred (my translation of the DA header)
{"timestamp":1700043870123,"correlationId":"dcd2197d-25dd-4654-ac5e-7bddd769ab45","errorId":"AUTHU2F0004","error":{"headers":{"normalizedNames":{},"lazyUpdate":null},"status":500,"statusText":"Internal Server Error","url":"https://www.mitid.dk/mitid-u2f-auth/v1/authenticator-sessions/3efc7c1e-db56-4f85-98a2-5ebf5e02d21e/assertion-response","ok":false,"name":"HttpErrorResponse","message":"Http failure response for https://www.mitid.dk/mitid-u2f-auth/v1/authenticator-sessions/3efc7c1e-db56-4f85-98a2-5ebf5e02d21e/assertion-response: 500 Internal Server Error","error":{"errorCode":"auth.u2f.technical_error","message":"Data could not be converted to json","path":"/v1/authenticator-sessions/3efc7c1e-db56-4f85-98a2-5ebf5e02d21e/assertion-response","timestamp":"2023-11-15T10:18:06.703262Z"}}}
Expected results:
Completion of the login as for all previous versions of Firefox.
Unfortunately I do not know whether this is a bug in Firefox 119.01 or a new intended security feature that is not supported by the Danish eID MitID
The problem has been repeated on 3 different PCs, one of which with a clean install of Firefox 119.01
|
|
1,852,749 | 16,573,918 |
Created attachment 9352676
clusterfuzz-testcase-minimized-advanced_api_fuzzer-4854691663839232
Filing this to track https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=62136
|
|
1,852,812 | 16,574,400 |
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/117.0
Steps to reproduce:
1. Login into my pypi.org account and go to 2FA configuration
2. Try to add a nitrokey 3 mini or nitrokey 3a security USB key as 2FA mecanism
Actual results:
The website raise the following error: `Unsupported credential public key type "OKP"`
Expected results:
The key can be registered without any issue as it does with Chromium.
Notes:
0. It works with Chromium Version 117.0.5938.48 (Official Build) Arch Linux (64-bit). I haven't tested other browsers.
1. After the key is registered from Chromium, I'm able to login using 2FA and the security key with Firefox.
2. The security key works without problem with Firefox on Github, Google or Microsoft accounts.
3. I've also filled a bug on PyPi: https://github.com/pypi/warehouse/issues/14520 and the PyPi team filled an issue on py_webauthn library (used by pypi to auth with security keys): https://github.com/duo-labs/py_webauthn/issues/175
|
|
1,852,948 | 16,575,761 |
Created attachment 9352882
blank_sidebar.gif
**Found in**
* 119.0a1 (2023-09-12)
**Affected versions**
* 119.0a1 (2023-09-12)
**Tested platforms**
* Affected platforms: Ubuntu 20, macOS 12, Windows 10x64
* Unaffected platforms: none
**Preconditions**
* browser.shopping.experience2023.enabled:true
* browser.shopping.experience2023.optedIn:1
**Steps to reproduce**
1. Open multiple Amazon products in different tabs.
2. Close the sidebar by clicking the `X` button or the URL icon button.
3. Switch to other tabs.
**Expected result**
* No sidebar transition is displayed.
**Actual result**
* A blank sidebar is displayed for a split second when switching to other tabs.
**Regression**
* Not a regression.
**Additional notes**
* Attached a screen recording.
|
|
1,852,982 | 16,575,964 |
While going through the telemetry data with Erik, we found a few clients that had spurious es -> es translations. We dug into it, and it was all related to a combination of using the auto-translation feature, changing language packs, and removing your web content languages. I don't have a precise STR for it.
The fix for it is to treat the stored preferences for auto translate as an untrusted list of languages, and validating them during the `maybeOfferTranslate`.
As a bonus, I'll add logic to ensure when we call `TranslationParent.translate` we will check that valid language pairs are received in case there are other regressions in the future.
|
|
1,853,428 | 16,579,418 |
Created attachment 9353446
Screenshot 2023-09-13 205115.png
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36
Steps to reproduce:
Install 115 (and 116b) from 112. Trying clean install.
Actual results:
Everything looks okay, all folder are displayed, but on the right side no emails appear. Error:
Uncaught TypeError: gFolder is undefined
_onContextMenu chrome://messenger/content/about3Pane.js:2549
handleEvent chrome://messenger/content/about3Pane.js:1512
|
|
1,853,908 | 16,584,519 |
Created attachment 9353882
In this zip file there are 2 png images. One is called conf_interval_plot_median_before_K_generation and the other conf_interval_plot_median_K_generation
Steps to reproduce:
My team and I have tested NSS and we found that it is vulnerable to the Minerva attack and we have now identified the first piece of code that contributes to the side channel.
The test scenario is that we are signing random messages using the SEC_SignData API and then using the private key to extract the K value from the signatures. Then based on the bit size of the extracted nonce we compare full-sized nonces to smaller ones and use the statistical tests to compare the signature times.
Actual results:
Now we have executed the test to verify that all the code from SEC_SignData up to line https://github.com/nss-dev/nss/blob/master/lib/freebl/ec.c#L978 is not leaky and then we have verified that the code in lines https://github.com/nss-dev/nss/blob/master/lib/freebl/ec.c#L979-L986 does leak. We suspect that the side channel is caused by the fact that K is an MPI object, and thus subject to normalization (automatic memory management based on bit size). You can see the results of the analysis below.
For testing, we built nss statically from hg and used the master checkout from 2023-09-14 for both nss and nspr.
The result in the attachment namedconf_interval_plot_median_before_K_generation.png represents code from SEC_SignData up to line 978 of file lib/freebl/ec.c and as you can see in this code there is no leak found. The sample tested has 102,723,896 observations.
The result in the attachment named conf_interval_plot_median_K_generation.png represents code from line 979 to line 986 in file lib/freebl/ec.c and we can clearly see that there is a leak: there is a clear dependency between the bit size of K and the size of the side channel. The sample tested has 129,438,263 observations.
Because we have identified this piece of code as leaky we won't be able to exclude the possibility of a side-channel in the subsequent code. We will need to run the test again after the leaking piece of code is fixed to be able to verify that NSS is not valuable to Minerva anymore (overall we have found a side-channel of ~50 ns and in the k-generating piece of code is only ~45 ns, although the extra 5 ns could be the effect of this piece of code not being side-channel free on the subsequent signature code).
Expected results:
The code should have no side-channels.
|
|
1,854,064 | 16,585,573 |
Created attachment 9354050
Captura de la consola de errores al hacer click en la opcion
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36
Steps to reproduce:
Opción Ver > carpetas > todas las carpetas
Actual results:
Cuando activo la opción esta se vuelve a desactivar sola
Expected results:
Debería de mostrarse toda la lista de correos que tengo instalada y estas no aparecen.
|
|
1,854,068 | 16,585,598 |
The following testcase crashes on mozilla-central revision 20230920-f90822eea608 (debug build, run with --fuzzing-safe --cpu-count=2 --ion-offthread-compile=off --ion-warmup-threshold=10 --baseline-eager):
gczeal(19, 1);
function wasmEvalText(str, imports) {
let binary = wasmTextToBinary(str);
try {
m = new WebAssembly.Module(binary);
} catch(e) {}
return new WebAssembly.Instance(m, imports);
}
let WasmNonAnyrefValues = [];
let {ifNull} = wasmEvalText(`(module
(func (export "ifNull") (param externref externref) (result externref)
local.get 0
)
)`).exports;
evaluate(`
for (let i = 0; i < 10; ++i)
ifNull(()=>{})
`);
Backtrace:
received signal SIGSEGV, Segmentation fault.
#0 0x000012e4e25dc5ba in ?? ()
#1 0x00007ffff3898180 in ?? ()
#2 0xfff9800000000000 in ?? ()
#3 0x0000000000000008 in ?? ()
#4 0x00007fffffffc010 in ?? ()
#5 0x000012e4e25dc4e9 in ?? ()
#6 0x0000000000000000 in ?? ()
rax 0x3aa13de00048 64464202235976
rbx 0xfffe2f2f2f2f2f2f -511070251831505
rcx 0xfffe3aa13de00048 -498485751185336
rdx 0x2622dccea040 41931175272512
rsi 0x3aa13de00018 64464202235928
rdi 0x3aa13de00048 64464202235976
rbp 0x7fffffffbfd8 140737488338904
rsp 0x7fffffffbfc0 140737488338880
r8 0x7fffffffbfc0 140737488338880
r9 0x0 0
r10 0x0 0
r11 0x7ffff3e0dfb8 140737284988856
r12 0x0 0
r13 0x0 0
r14 0x7ffff3898180 140737279263104
r15 0x0 0
rip 0x12e4e25dc5ba 20774259639738
=> 0x12e4e25dc5ba: mov (%rbx),%rbx
0x12e4e25dc5bd: mov (%rbx),%rbx
Marking s-s due to poison values involved.
|
|
1,889,341 | 16,873,867 |
Created attachment 9394723
image_2024_04_03T09_00_29_332Z.png
**[Affected versions]:**
- Firefox Beta, 125.0b7, BUILD ID: 20240401091600
- Firefox Release, 124.0.2, BUILD ID: 20240401114208
**[Affected Platforms]:**
- Windows 11 x64
- Windows 10 x64
**[Prerequisites]:**
- Have the [“user.js”](https://drive.google.com/file/d/1zJJUXs2r1yA8-iCyGBML4aCBqRvnWRgs/view?usp=sharing) downloaded on your computer.
- Have a Firefox IT locale installed.
- Have a Firefox profile younger than 28 days.
**[Steps to reproduce]:**
1. Navigate to the profile folder and paste the user.js from the prerequisites.
2. Open Firefox using the profile from the prerequisites.
3. Open a new tab.
4. Observe the “CSAT Microsurvey” cards in the bottom right part of the page.
**[Expected results]:**
- The title of the “CSAT Microsurvey” cards is not cut by the “X” button.
**[Actual results]:**
- The title of the “CSAT Microsurvey” cards is cut by the “X” button on the “IT” locale.
**[Notes]:**
- This issue is also reproducible on the Treatment B branch of the experiment.
- When hovering over the “X” button the missing text is displayed.
- This issue is also reproducible on the second card of the “CSAT Microsurvey”.
- This issue is not reproducible on the MacOS 14.3 and Ubuntu 22.04 platforms.
- Attached a screenshot of the issue.
|
|
1,889,360 | 16,874,038 |
Created attachment 9394753
image_2024_04_03T09_11_55_340Z.png
**[Notes]:**
- On Windows 11 x64 the text on the “Thank you” card is not correctly displayed, and the elements on the survey are not aligned.
**[Affected versions]:**
- Firefox Beta, 125.0b7, BUILD ID: 20240401091600
- Firefox Release, 124.0.2, BUILD ID: 20240401114208
- Firefox Release 123.0.1, BUILD ID: 20240304104836
**[Affected Platforms]:**
- Windows 11 x64
- Windows 10 x64
- MacOS 14.3
- Ubuntu 22.04
**[Prerequisites]:**
- Have the [“user.js”](https://drive.google.com/file/d/1zJJUXs2r1yA8-iCyGBML4aCBqRvnWRgs/view?usp=sharing) downloaded on your computer.
- Have a Firefox IT locale installed.
- Have a Firefox profile younger than 28 days.
**[Steps to reproduce]:**
1. Navigate to the profile folder and paste the user.js from the prerequisites.
2. Open Firefox using the profile from the prerequisites.
3. Open a new tab.
4. Navigate through the “CSAT Microsurvey” until the “Thank you” card is displayed.
**[Expected results]:**
- The text on the “Thank you” card is not cut by the “X” button and the elements displayed on the survey are aligned.
**[Actual results]:**
- The text on the “Thank you” card is cut by the “X” button and the survey elements are not aligned.
**[Additional Notes]:**
- This issue is also reproducible on the Treatment B branch of the experiment.
- When hovering over the “X” button the missing text is displayed.
- Attached a screenshot of the issue.
|
|
1,890,367 | 16,882,299 |
STR:
- open a pdf;
- click on the ink button (button with the pen icon);
- draw something without release the mouse button;
- release the button;
- draw something else.
The second draw isn't possible.
This is a regression from bug 1866850 and especially from:
https://github.com/mozilla/pdf.js/pull/17823
|
|
1,890,764 | 16,885,112 |
**Found in**
* Beta/RC 125
**Affected versions**
* macOS
**Tested platforms**
* Affected platforms: all macOS
* Unaffected platforms: Windows, Ubuntu
**Steps to reproduce**
1. Install a .pkg beta version from 125 of Firefox (e.g 125.0b1)
2. Start Firefox and visit About Firefox to trigger the update & restart the browser
3. Select Restart Firefox from macOS prompt and input the password
4. Firefox is restarted and prompts to manually download the newest build
**Expected result**
* Firefox should be updated to latest 125 RC version
**Actual result**
* Firefox is not updated, and will ask the user to manually download the newest build
**Additional notes**
* The issue can be seen in the [following attachment](https://drive.google.com/file/d/1bmWo83JI3F1H5FhWE2cyRSnDNOEGWzi1/view?usp=sharing)
* Downloading the update again will result in a successful update
|
|
1,891,322 | 16,888,528 |
Created attachment 9396501
testcase.html
Found while fuzzing m-c 20240412-be4463b26a49 (--enable-debug --enable-fuzzing)
To reproduce via Grizzly Replay:
```
$ pip install fuzzfetch grizzly-framework
$ python -m fuzzfetch -d --fuzzing -n firefox
$ python -m grizzly.replay.bugzilla ./firefox/firefox <bugid>
```
Hit MOZ_CRASH(assertion failed: !(first.offset > last.offset)) at gfx/wr/webrender_api/src/gradient_builder.rs:137
```
#0 0x719780833d85 in MOZ_Crash /builds/worker/workspace/obj-build/dist/include/mozilla/Assertions.h:317:3
#1 0x719780833d85 in RustMozCrash /builds/worker/checkouts/gecko/mozglue/static/rust/wrappers.cpp:18:3
#2 0x71978083323d in mozglue_static::panic_hook::h43eaefe9eb9c21c7 /builds/worker/checkouts/gecko/mozglue/static/rust/lib.rs:98:9
#3 0x71978083323d in core::ops::function::Fn::call::h428b5e23b1db83db /rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04/library/core/src/ops/function.rs:79:5
#4 0x7197819211a5 in _$LT$alloc..boxed..Box$LT$F$C$A$GT$$u20$as$u20$core..ops..function..Fn$LT$Args$GT$$GT$::call::h4dd5cc3b5605ae1a /rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04/library/alloc/src/boxed.rs:2029:9
#5 0x7197819211a5 in std::panicking::rust_panic_with_hook::hb164d19c0c1e71d4 /rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04/library/std/src/panicking.rs:785:13
#6 0x719781920eb8 in std::panicking::begin_panic_handler::_$u7b$$u7b$closure$u7d$$u7d$::h0369088c533c20e9 /rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04/library/std/src/panicking.rs:651:13
#7 0x71978191e3e5 in std::sys_common::backtrace::__rust_end_short_backtrace::hc11d910daf35ac2e /rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04/library/std/src/sys_common/backtrace.rs:171:18
#8 0x719781920c43 in rust_begin_unwind /rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04/library/std/src/panicking.rs:647:5
#9 0x71978196ce54 in core::panicking::panic_fmt::ha6effc2775a0749c /rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04/library/core/src/panicking.rs:72:14
#10 0x71978196cf12 in core::panicking::panic::h44790a89027c670f /rustc/25ef9e3d85d934b27d9dada2f9dd52b1dc63bb04/library/core/src/panicking.rs:144:5
#11 0x719780558fe3 in webrender_api::gradient_builder::GradientBuilder::normalize::he7c6ad6d8268af6f /builds/worker/checkouts/gecko/gfx/wr/webrender_api/src/gradient_builder.rs:137:9
#12 0x719780558962 in webrender_api::gradient_builder::GradientBuilder::radial_gradient::h574f1573485c8162 /builds/worker/checkouts/gecko/gfx/wr/webrender_api/src/gradient_builder.rs:91:13
#13 0x719780552cc3 in webrender_api::display_list::DisplayListBuilder::create_radial_gradient::h117d937a913e316d /builds/worker/checkouts/gecko/gfx/wr/webrender_api/src/display_list.rs:1524:24
#14 0x71978007b056 in wr_dp_push_radial_gradient /builds/worker/checkouts/gecko/gfx/webrender_bindings/src/bindings.rs:3702:20
#15 0x71977c45ad52 in mozilla::nsCSSGradientRenderer::BuildWebRenderDisplayItems(mozilla::wr::DisplayListBuilder&, mozilla::layers::StackingContextHelper const&, nsRect const&, nsRect const&, nsSize const&, mozilla::gfx::IntRectTyped<mozilla::CSSPixel> const&, bool, float) /builds/worker/checkouts/gecko/layout/painting/nsCSSRenderingGradients.cpp:1360:14
#16 0x71977c48936a in mozilla::nsImageRenderer::BuildWebRenderDisplayItems(nsPresContext*, mozilla::wr::DisplayListBuilder&, mozilla::wr::IpcResourceUpdateQueue&, mozilla::layers::StackingContextHelper const&, mozilla::layers::RenderRootStateManager*, mozilla::nsDisplayItem*, nsRect const&, nsRect const&, nsRect const&, nsPoint const&, nsSize const&, mozilla::gfx::IntRectTyped<mozilla::CSSPixel> const&, float) /builds/worker/checkouts/gecko/layout/painting/nsImageRenderer.cpp:584:16
#17 0x71977c4460c3 in mozilla::nsImageRenderer::BuildWebRenderDisplayItemsForLayer(nsPresContext*, mozilla::wr::DisplayListBuilder&, mozilla::wr::IpcResourceUpdateQueue&, mozilla::layers::StackingContextHelper const&, mozilla::layers::RenderRootStateManager*, mozilla::nsDisplayItem*, nsRect const&, nsRect const&, nsPoint const&, nsRect const&, nsSize const&, float) /builds/worker/checkouts/gecko/layout/painting/nsImageRenderer.cpp:775:10
#18 0x71977c443677 in nsCSSRendering::BuildWebRenderDisplayItemsForStyleImageLayerWithSC(nsCSSRendering::PaintBGParams const&, mozilla::wr::DisplayListBuilder&, mozilla::wr::IpcResourceUpdateQueue&, mozilla::layers::StackingContextHelper const&, mozilla::layers::RenderRootStateManager*, mozilla::nsDisplayItem*, mozilla::ComputedStyle*, nsStyleBorder const&) /builds/worker/checkouts/gecko/layout/painting/nsCSSRendering.cpp:2729:36
#19 0x71977c4431ef in nsCSSRendering::BuildWebRenderDisplayItemsForStyleImageLayer(nsCSSRendering::PaintBGParams const&, mozilla::wr::DisplayListBuilder&, mozilla::wr::IpcResourceUpdateQueue&, mozilla::layers::StackingContextHelper const&, mozilla::layers::RenderRootStateManager*, mozilla::nsDisplayItem*) /builds/worker/checkouts/gecko/layout/painting/nsCSSRendering.cpp:1958:10
#20 0x71977c469c55 in mozilla::nsDisplayBackgroundImage::CreateWebRenderCommands(mozilla::wr::DisplayListBuilder&, mozilla::wr::IpcResourceUpdateQueue&, mozilla::layers::StackingContextHelper const&, mozilla::layers::RenderRootStateManager*, mozilla::nsDisplayListBuilder*) /builds/worker/checkouts/gecko/layout/painting/nsDisplayList.cpp:3413:7
#21 0x719777b34ac6 in mozilla::layers::WebRenderCommandBuilder::CreateWebRenderCommands(mozilla::nsDisplayItem*, mozilla::wr::DisplayListBuilder&, mozilla::wr::IpcResourceUpdateQueue&, mozilla::layers::StackingContextHelper const&, mozilla::nsDisplayListBuilder*) /builds/worker/checkouts/gecko/gfx/layers/wr/WebRenderCommandBuilder.cpp:1864:41
#22 0x719777b33282 in mozilla::layers::WebRenderCommandBuilder::CreateWebRenderCommandsFromDisplayList(mozilla::nsDisplayList*, mozilla::nsDisplayItem*, mozilla::nsDisplayListBuilder*, mozilla::layers::StackingContextHelper const&, mozilla::wr::DisplayListBuilder&, mozilla::wr::IpcResourceUpdateQueue&, bool) /builds/worker/checkouts/gecko/gfx/layers/wr/WebRenderCommandBuilder.cpp:2130:7
#23 0x71977c4744b2 in CreateWebRenderCommandsNewClipListOption /builds/worker/checkouts/gecko/layout/painting/nsDisplayList.cpp:4620:30
#24 0x71977c4744b2 in CreateWebRenderCommands /builds/worker/checkouts/gecko/layout/painting/nsDisplayList.h:4959:12
#25 0x71977c4744b2 in mozilla::nsDisplayOwnLayer::CreateWebRenderCommands(mozilla::wr::DisplayListBuilder&, mozilla::wr::IpcResourceUpdateQueue&, mozilla::layers::StackingContextHelper const&, mozilla::layers::RenderRootStateManager*, mozilla::nsDisplayListBuilder*) /builds/worker/checkouts/gecko/layout/painting/nsDisplayList.cpp:5246:22
#26 0x719777b34ac6 in mozilla::layers::WebRenderCommandBuilder::CreateWebRenderCommands(mozilla::nsDisplayItem*, mozilla::wr::DisplayListBuilder&, mozilla::wr::IpcResourceUpdateQueue&, mozilla::layers::StackingContextHelper const&, mozilla::nsDisplayListBuilder*) /builds/worker/checkouts/gecko/gfx/layers/wr/WebRenderCommandBuilder.cpp:1864:41
#27 0x719777b33282 in mozilla::layers::WebRenderCommandBuilder::CreateWebRenderCommandsFromDisplayList(mozilla::nsDisplayList*, mozilla::nsDisplayItem*, mozilla::nsDisplayListBuilder*, mozilla::layers::StackingContextHelper const&, mozilla::wr::DisplayListBuilder&, mozilla::wr::IpcResourceUpdateQueue&, bool) /builds/worker/checkouts/gecko/gfx/layers/wr/WebRenderCommandBuilder.cpp:2130:7
#28 0x719777b3180a in mozilla::layers::WebRenderCommandBuilder::BuildWebRenderCommands(mozilla::wr::DisplayListBuilder&, mozilla::wr::IpcResourceUpdateQueue&, mozilla::nsDisplayList*, mozilla::nsDisplayListBuilder*, mozilla::layers::WebRenderScrollData&, WrFiltersHolder&&) /builds/worker/checkouts/gecko/gfx/layers/wr/WebRenderCommandBuilder.cpp:1785:5
#29 0x719777b474b8 in mozilla::layers::WebRenderLayerManager::EndTransactionWithoutLayer(mozilla::nsDisplayList*, mozilla::nsDisplayListBuilder*, WrFiltersHolder&&, mozilla::layers::WebRenderBackgroundData*, double) /builds/worker/checkouts/gecko/gfx/layers/wr/WebRenderLayerManager.cpp:365:30
#30 0x71977c462f87 in mozilla::nsDisplayList::PaintRoot(mozilla::nsDisplayListBuilder*, gfxContext*, unsigned int, mozilla::Maybe<double>) /builds/worker/checkouts/gecko/layout/painting/nsDisplayList.cpp:2305:18
#31 0x71977c0d3761 in nsLayoutUtils::PaintFrame(gfxContext*, nsIFrame*, nsRegion const&, unsigned int, mozilla::nsDisplayListBuilderMode, nsLayoutUtils::PaintFrameFlags) /builds/worker/checkouts/gecko/layout/base/nsLayoutUtils.cpp:3312:9
#32 0x71977c03ce9f in mozilla::PresShell::PaintInternal(nsView*, mozilla::PaintInternalFlags) /builds/worker/checkouts/gecko/layout/base/PresShell.cpp:6578:5
#33 0x71977bbb6d62 in nsViewManager::ProcessPendingUpdatesPaint(nsIWidget*) /builds/worker/checkouts/gecko/view/nsViewManager.cpp:408:18
#34 0x71977bbb67ee in nsViewManager::ProcessPendingUpdatesForView(nsView*, bool) /builds/worker/checkouts/gecko/view/nsViewManager.cpp:343:22
#35 0x71977bbb7e4d in nsViewManager::ProcessPendingUpdates() /builds/worker/checkouts/gecko/view/nsViewManager.cpp:916:5
#36 0x71977bff11e5 in nsRefreshDriver::Tick(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp, nsRefreshDriver::IsExtraTick) /builds/worker/checkouts/gecko/layout/base/nsRefreshDriver.cpp:2841:11
#37 0x71977bffa621 in TickDriver /builds/worker/checkouts/gecko/layout/base/nsRefreshDriver.cpp:367:13
#38 0x71977bffa621 in mozilla::RefreshDriverTimer::TickRefreshDrivers(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp, nsTArray<RefPtr<nsRefreshDriver>>&) /builds/worker/checkouts/gecko/layout/base/nsRefreshDriver.cpp:345:7
#39 0x71977bffa520 in mozilla::RefreshDriverTimer::Tick(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp) /builds/worker/checkouts/gecko/layout/base/nsRefreshDriver.cpp:361:5
#40 0x71977bffa3bd in mozilla::VsyncRefreshDriverTimer::RunRefreshDrivers(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp) /builds/worker/checkouts/gecko/layout/base/nsRefreshDriver.cpp:951:5
#41 0x71977bff965c in mozilla::VsyncRefreshDriverTimer::TickRefreshDriver(mozilla::layers::BaseTransactionId<mozilla::VsyncIdType>, mozilla::TimeStamp) /builds/worker/checkouts/gecko/layout/base/nsRefreshDriver.cpp:861:5
#42 0x71977bff88c9 in mozilla::VsyncRefreshDriverTimer::RefreshDriverVsyncObserver::NotifyVsyncTimerOnMainThread() /builds/worker/checkouts/gecko/layout/base/nsRefreshDriver.cpp:592:14
#43 0x71977b3090fb in mozilla::dom::VsyncMainChild::RecvNotify(mozilla::VsyncEvent const&, float const&) /builds/worker/checkouts/gecko/dom/ipc/VsyncMainChild.cpp:66:15
#44 0x71977b5fb905 in mozilla::dom::PVsyncChild::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/obj-build/ipc/ipdl/PVsyncChild.cpp:237:78
#45 0x71977b4e3ae0 in mozilla::dom::PContentChild::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/obj-build/ipc/ipdl/PContentChild.cpp:8282:32
#46 0x719777250bbf in mozilla::ipc::MessageChannel::DispatchAsyncMessage(mozilla::ipc::ActorLifecycleProxy*, IPC::Message const&) /builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp:1818:25
#47 0x71977724d912 in mozilla::ipc::MessageChannel::DispatchMessage(mozilla::ipc::ActorLifecycleProxy*, mozilla::UniquePtr<IPC::Message, mozilla::DefaultDelete<IPC::Message>>) /builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp:1737:9
#48 0x71977724e592 in mozilla::ipc::MessageChannel::RunMessage(mozilla::ipc::ActorLifecycleProxy*, mozilla::ipc::MessageChannel::MessageTask&) /builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp:1530:3
#49 0x71977724f6df in mozilla::ipc::MessageChannel::MessageTask::Run() /builds/worker/checkouts/gecko/ipc/glue/MessageChannel.cpp:1628:14
#50 0x71977652e097 in mozilla::RunnableTask::Run() /builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp:578:16
#51 0x719776523706 in mozilla::TaskController::DoExecuteNextTaskOnlyMainThreadInternal(mozilla::detail::BaseAutoLock<mozilla::Mutex&> const&) /builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp:905:26
#52 0x719776521ee7 in mozilla::TaskController::ExecuteNextTaskOnlyMainThreadInternal(mozilla::detail::BaseAutoLock<mozilla::Mutex&> const&) /builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp:728:15
#53 0x719776522365 in mozilla::TaskController::ProcessPendingMTTask(bool) /builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp:514:36
#54 0x719776532036 in operator() /builds/worker/checkouts/gecko/xpcom/threads/TaskController.cpp:232:37
#55 0x719776532036 in mozilla::detail::RunnableFunction<mozilla::TaskController::TaskController()::$_0>::Run() /builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.h:548:5
#56 0x719776547362 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/checkouts/gecko/xpcom/threads/nsThread.cpp:1199:16
#57 0x71977654e4ad in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/checkouts/gecko/xpcom/threads/nsThreadUtils.cpp:480:10
#58 0x719777256b05 in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/checkouts/gecko/ipc/glue/MessagePump.cpp:85:21
#59 0x71977716ca61 in RunHandler /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:363:3
#60 0x71977716ca61 in MessageLoop::Run() /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:345:3
#61 0x71977bc22168 in nsBaseAppShell::Run() /builds/worker/checkouts/gecko/widget/nsBaseAppShell.cpp:148:27
#62 0x71977bce5e18 in nsAppShell::Run() /builds/worker/checkouts/gecko/widget/gtk/nsAppShell.cpp:470:33
#63 0x71977db31c8b in XRE_RunAppShell() /builds/worker/checkouts/gecko/toolkit/xre/nsEmbedFunctions.cpp:712:20
#64 0x7197772579e6 in mozilla::ipc::MessagePumpForChildProcess::Run(base::MessagePump::Delegate*) /builds/worker/checkouts/gecko/ipc/glue/MessagePump.cpp:235:9
#65 0x71977716ca61 in RunHandler /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:363:3
#66 0x71977716ca61 in MessageLoop::Run() /builds/worker/checkouts/gecko/ipc/chromium/src/base/message_loop.cc:345:3
#67 0x71977db314b2 in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/checkouts/gecko/toolkit/xre/nsEmbedFunctions.cpp:647:34
#68 0x58b3882ba5c6 in content_process_main /builds/worker/checkouts/gecko/browser/app/../../ipc/contentproc/plugin-container.cpp:57:28
#69 0x58b3882ba5c6 in main /builds/worker/checkouts/gecko/browser/app/nsBrowserApp.cpp:375:18
#70 0x71978c429d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
#71 0x71978c429e3f in __libc_start_main csu/../csu/libc-start.c:392:3
#72 0x58b3882902f8 in _start (/home/user/workspace/browsers/m-c-20240413085157-fuzzing-debug/firefox-bin+0x592f8) (BuildId: 8553aaf648eb5b578f899bbf9a05117a2b83de03)
```
|
|
1,895,707 | 16,926,547 |
Seeing a lot of crash reports on Sentry on nightly.
|
|
1,895,711 | 16,926,575 |
### Steps to reproduce
1. Browse to a site in Fenix nightly
2. Select share from the options menu
3. Select a device from SEND TO DEVICE
### Expected behavior
The site should open on the device you selected
### Actual behavior
An error is displayed `Unable to send`
### Device information
* Firefox version: 127.0a1
* Android device model: Samsung S24+
* Android OS version: Android 14
### Any additional information?
This is not reproducible in 125 release or 126 beta
|
|
1,895,865 | 16,927,806 |
Created attachment 9400893
rec of the issue.gif
**[Affected versions]:**
- Firefox RC 126.0 - Build ID: 20240506203248
**[Affected Platforms]:**
- Windows 10 x64
- Windows 11 x64
**[Prerequisites]:**
- Have the following prefs in the "about:config" page:
- `nimbus.debug` set to `true`
- `messaging-system.log` set to `all`
- Have the "Browser Console" opened.
**[Steps to reproduce]:**
1. Open the browser using the profile from the prerequisites.
2. Navigate to "about:studies?optin_slug=embedded-import-spotlight-existing-users&optin_branch=treatment-a&optin_collection=nimbus-preview".
3. Restart the browser and observe the behavior.
4. Focus the "Browser Console" and observe the content.
**[Expected result]:**
- Step 3: The "Embedded Import Spotlight" is successfully triggered.
- Step 4: No errors related to the "EMBEDDED_IMPORT_SPOTLIGHT" are displayed.
**[Actual result]:**
- Step 3: The "Embedded Import Spotlight" is not triggered
- Step 4: A "TARGETING_EXPRESSION_ERROR" related to the "EMBEDDED_IMPORT_SPOTLIGHT" is displayed.
**[Additional Notes]:**
- This issue is reproducible on all the branches of both "[Early Day User](https://experimenter.services.mozilla.com/nimbus/embedded-import-spotlight/summary)" and "[Existing Users](https://experimenter.services.mozilla.com/nimbus/embedded-import-spotlight-existing-users/summary)" experiments.
- Attached a screen recording of the issue.
|
|
1,895,866 | 16,927,808 |
**[Affected versions]:**
- Firefox RC 126.0 - Build ID: 20240506203248
**[Affected Platforms]:**
- Windows 10 x64
- Windows 11 x64
**[Steps to reproduce]:**
1. Open the browser and navigate to the "https://experimenter.services.mozilla.com/nimbus/embedded-import-spotlight/summary" page.
2. Scroll down to any treatment branches and observe the message targeting.
**[Expected result]:**
- The message targets profiles younger than 28 days.
**[Actual result]:**
- The message targets profiles older than 28 days: `!((currentDate|date - profileAgeCreated|date) / 86400000 < 28)`.
**[Additional Notes]:**
- This issue is reproducible on all the branches of the "[Early Day User](https://experimenter.services.mozilla.com/nimbus/embedded-import-spotlight/summary)" experiment.
|
|
1,896,090 | 16,929,136 |
Created attachment 9401075
rec of the issue.gif
**[Affected versions]:**
- Firefox RC 126.0 - Build ID: 20240509170740
**[Affected Platforms]:**
- Windows 10 x64
- Windows 11 x64
**[Prerequisites]:**
- Have the following prefs in the "about:config" page:
- `nimbus.debug` set to `true`
**[Steps to reproduce]:**
1. Open the browser using the profile from the prerequisites.
2. Navigate to "about:studies?optin_slug=embedded-import-spotlight-existing-users&optin_branch=treatment-a&optin_collection=nimbus-preview".
3. Restart the browser and observe the spotlight's "X" button placement.
**[Expected result]:**
- The "X" button is displayed in the top-right part of the "Embedded Import Spotlight".
**[Actual result]:**
- The "X" button is displayed in the top-right part of the browser.
**[Additional Notes]:**
- This issue is reproducible on all the branches of both "[Early Day User](https://experimenter.services.mozilla.com/nimbus/embedded-import-spotlight/summary)" and "[Existing Users](https://experimenter.services.mozilla.com/nimbus/embedded-import-spotlight-existing-users/summary)" experiments.
- Attached a screen recording of the issue.
|
|
1,896,339 | 16,932,473 |
Created attachment 9401356
Screen_recording_20240513_113953.mp4
### Steps to reproduce
1. Create a new collection with multiple tabs
2. Go back to home screen
3. Swipe to delete last tab from collection
### Expected behavior
The last element from the collection is simply deleted, without the rest of the collection being affected.
### Actual behavior
The whole collection is deleted. Undoing the deletion restores the collection with only one element.
### Device information
* Firefox version: Nightly 127.0a1
* Android device model: Pixel 7
* Android OS version: Android 13
### Any additional information?
|
|
1,896,364 | 16,932,606 |
Created attachment 9401384
rec of the issue.gif
**[Affected versions]:**
- Firefox RC 126.0 - Build ID: 20240509170740
**[Affected Platforms]:**
- Windows 10 x64
- Windows 11 x64
**[Prerequisites]:**
- Have the following prefs in the "about:config" page:
- `nimbus.debug` set to `true`
- Have the "Browser Console" opened.
**[Steps to reproduce]:**
1. Open the browser using the profile from the prerequisites.
2. Navigate to "about:studies?optin_slug=embedded-import-spotlight&optin_branch=control&optin_collection=nimbus-preview".
3. Restart the browser and observe the behavior.
4. Focus the "Browser Cosole" and observe the displayed telemetry events.
**[Expected result]:**
- Step 3: The "EMBEDDED_IMPORT_SPOTLIGHT" is not triggered.
- Step 4: No telemetry events related to the "EMBEDDED_IMPORT_SPOTLIGHT" are generated.
**[Actual result]:**
- Step 3: An overlay is displayed on the opened tab and an "IMPRESSION" telemetry event related to the "EMBEDDED_IMPORT_SPOTLIGHT" is generated.
- Step 4: An "IMPRESSION" telemetry event related to the "EMBEDDED_IMPORT_SPOTLIGHT" is generated.
**[Additional Notes]:**
- This issue is reproducible on the "Control" branch of both "[Early Day User](https://experimenter.services.mozilla.com/nimbus/embedded-import-spotlight/summary)" and "[Existing Users](https://experimenter.services.mozilla.com/nimbus/embedded-import-spotlight-existing-users/summary)" experiments.
- Attached a screen recording of the issue.
|
|
1,896,597 | 16,934,258 |
Created attachment 9401621
extensions links not working.mp4
**[Affected versions]:**
- Firefox Release 126.0 (Build ID: 20240509170740)
**[Affected Platforms]:**
- Windows 10
- Windows 11
[Prerequisites]:
- Have a non Firefox browser installed and make sure that you have at least one compatible add-on installed.
- Have the following prefs in the "about:config" page:
- nimbus.debug set to true
**[Steps to reproduce]:**
1. Open the browser using the profile from the prerequisites.
2. Navigate to "about:studies?optin_slug=embedded-import-spotlight-existing-users&optin_branch=treatment-a&optin_collection=nimbus-preview".
3. Restart the browser.
4. From the "Embedded Import Spotlight" select the browser and the profile that has a compatible add-on installed.
5. Click the "Import to Firefox" button.
6. Click any of the links displayed under "Extensions" category.
7. Observe the behavior.
**[Expected result]:**
- The link is correctly opened in the background.
**[Actual result]:**
- Nothing happens.
**[ Notes]:**
- The issue is NOT reproducible if the Import modal is triggered from "about:preferences#general" or "about:logins" page.
- Attached is a screen recording with the issue.
|
|
1,897,653 | 16,941,403 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:126.0) Gecko/20100101 Firefox/126.0
Steps to reproduce:
1) Visit https://www.bitstamp.net/market/tradeview/
Actual results:
The TradeView component on the page does not load after the update to Firefox 126.0 on all of my devices.
Expected results:
The Tradeview component should have loaded like it did in previous versions and other browsers.
|
|
1,897,775 | 16,944,256 |
Created attachment 9402757
20240520_152922.mp4
**Environment:**
Operating system: Android 12/ Android 13
Firefox version: Firefox Nightly 128.0a1 (2016021279-🦎128.0a1-20240516214828🦎)
**Preconditions:**
Clean profile
**Steps to reproduce:**
1. Navigate to: https://www.dropbox.com/home
2. Perform account login
3. Tap inside the search field located in the page header and observe the result
**Expected Behavior:**
The search page is opened
**Actual Behavior:**
Nothing happens
**Notes:**
- Reproducible regardless of the status of ETP
- Reproducible on the latest build of Firefox Nightly and Release
- Works as expected using Chrome
- Attachment provided
- Issue found during WebCompat team [Top100] websites testing
|
|
1,899,029 | 16,952,784 |
User Agent: Mozilla/5.0 (Android 10; Mobile; rv:128.0) Gecko/128.0 Firefox/128.0
Steps to reproduce:
While downloading a file, pressing: Pause, Cancel (it will delete the file from the download, but in the phone storage it will still be available) or switching from Wifi connection to Mobile Data during the download, will show the button: Resume download and will resume downloading, but even if the file will be downloaded, in the phone storage the file will be unusable, for example an .apk file cannot be installed.
Actual results:
Hitting the break buttons and switching from one connection to another causes the file to appear wrong.
Expected results:
The filer must follow each action separately so that the file is available correctly.
|
|
1,899,757 | 16,960,131 |
Created attachment 9404776
vmplayer_6pfNgooQrX.mp4
**[Affected versions]:**
- Firefox Nightly 128.0a1 - Build ID: 20240529214854
- Firefox Beta 127.0b8 - Build ID: 20240529091551
- Firefox Release 126.0.1 - Build ID: 20240526221752
**[Affected Platforms]:**
- Windows 10
- macOS 14
- Ubuntu 22.04
**[Prerequisites]:**
- Have a Firefox build installed and use a new profile.
- Be enrolled in any branch (except control) of the Pin Email and Calendar experiment ([early day](https://experimenter.services.mozilla.com/nimbus/pin-email-and-calendar-tabs-early-day-user/summary) / [existing](https://experimenter.services.mozilla.com/nimbus/pin-email-and-calendar-tabs-existing-user/summary)) through forced enrollment.
- Unenroll from any experiment or rollout that the profile might be in using the about:studies page.
**[Steps to reproduce]:**
1. Open the browser with the profile from prerequisites and open a new tab.
2. Right click the `reddit` Top Site and choose the `Open Link in a New Tab`.
3. Repeat step 2.
4. Repeat step 2 and observe the current tab.
**[Expected result]:**
- No message is displayed.
**[Actual result]:**
- The "Pin" message is displayed.
**[Notes]:**
- Attached a screen recording of the issue.
|
|
1,900,191 | 16,962,706 |
Steps to reproduce:
1. Open and play Live video (Not all but several live. It seems low latency live stream)
e.g. https://www.youtube.com/watch?v=jQaDDtiu05E w/ 1080p. Or other low latency video streams.
Actual Results:
Video stops after for a while. But audio is playing.
Profiler log: https://share.firefox.dev/4aEXK8R
When the buffer length reaches 0s, the image seems to stop without recovery.
|
|
1,900,423 | 16,966,385 |
[Figma](https://www.figma.com/design/5hUBRTrDG3iWwi26KyLhtz/New-Tab?node-id=6510-70042&t=ZbwDxaSiCdEMAO5c-0)
Clean up layout styles for wallpaper v2.
|
|
1,900,486 | 16,966,710 |
Created attachment 9405403
Screenshot 2024-06-03 at 3.23.39 PM.png
STEPS TO REPLICATE
1) You will need to use Review Checker by going to an Amazon, Best Buy, or Walmart PDP
2) Opt in when you see the opt-in screen by hitting "Yes, try it"
3) You'll need to fill out the Satisfaction microsurvey, which is triggered by being at least on your 2nd session and having already visited 5 PDPs that have available Fakespot Reviews Analyses on them. You can also simulate this experience by manually setting these preferences in about:config while testing:
browser.shopping.experience2023.survey.enabled must be true (experiment does this)
browser.shopping.experience2023.survey.optedInTime must be 24 hours ago (try 1696550403)
browser.shopping.experience2023.survey.hasSeen must be false
browser.shopping.experience2023.survey.pdpVisits must be 5
browser.shopping.experience2023.optedIn must be 1
4) Complete the Satisfaction Microsurvey - you should be asked 2 questions, then you'll see a green confirmation message.
5) Hit "Turn off Review Checker" to disable the feature (at any point after having filled out the survey)
6) Navigate to another PDP
7) Manually turn on Review Checker again from the Shopping Icon
EXPECTED:
- Review Checker should work as expected, you should be able to see an opt-in screen telling you about using the Review Checker
ACTUAL RESULTS
- See a blank Review Checker sidebar with only "Thank you for the feedback" in green, or if you dismissed that, then you should only see a blank screen in that sidebar where there normally would be content, with Review Checker as a title
ADDITIONAL NOTES
- The blank screen doesn't seem to happen if you hit X, the Shopping icon, or turn off Auto-Open to temporarily close out the Review Checker. It seems to only happen after you fill out the Microsurvey, and, at any point after filling out the Microsurvey, disable the Review Checker feature by clicking "Turn off Review Checker"
|
|
1,901,057 | 16,970,513 |
It appears that with the v2 search rollout, we are not sending the clickUrl to Admarketplace
https://searchfox.org/mozilla-central/source/browser/components/search/BrowserSearchTelemetry.sys.mjs#185
|
|
1,901,325 | 16,972,274 |
Created attachment 9406192
Solarwinds_Papertrail_dashboard_organization_selection_dropdown.png
**User Agent**: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
**Steps to reproduce**
1. Have access to at least two different SolarWinds Papertrail organizations (Mozilla has 4 that I'm aware of).
2. Log into Solarwinds Papertrail.
3. Navigate to https://papertrailapp.com/
4. Take note of what the current dashboard looks like.
5. In the top right corner, click the current organization name (Mozilla Marketing in the attached screenshot) and select a different organization from the dropdown.
**Expected results**
* The organization listed in the top right corner changes to the newly selected, different organization.
* The dashboard for the newly selected organization is displayed.
**Actual results**
* The organization listed in the top right corner does not change.
* The dashboard for the previously selected organization is displayed.
**Notes**
* Two other teammates were also able to reproduce this in Nightly 128.0a1.
* I do not see this bug in release Firefox 126.0.1.
|
|
1,901,497 | 16,974,874 |
**Environment:**
Operating system: Windows 10
Firefox version: Firefox 126.0/Firefox 128.0a1
**Steps to reproduce:**
1. Navigate to: https://fairfaxmedia.pressreader.com/the-dominion-post
2. Zoom in and out inside the article using the mouse wheel
3. Observe
**Expected Behavior:**
Zooming is smooth
**Actual Behavior:**
Zooming presents issues
**Notes:**
- Reproduces regardless of the status of ETP
- Reproduces in Firefox Nightly, Firefox Release
- Does not reproduce in Chrome
- Performance profile: https://share.firefox.dev/3yPrvq2
- About:memory report and troubleshooting info are attached
Created from https://github.com/webcompat/web-bugs/issues/137959
|
|
1,901,979 | 16,978,134 |
Created attachment 9406948
Window2.mp4
**Found in**
* Nightly 129.0a1 (2024-06-11)
**Affected versions**
* Nightly 129.0a1 (2024-06-11)
* Beta 128
* Release 127.0 (64-bit)
**Affected platforms**
* All
**Preconditions**
* browser.shopping.experience2023.enabled - true
browser.shopping.experience2023.optedIn - 1
**Steps to reproduce**
1. Open a Private Window.
2. Reach any product details page on Amazon.
3. Click inside the Normal window and Open a new Tab. (If youre on a product details page in the normal window Simply open the Review Checker.)
4. Go back to the Private window and Hit the Back button.
**Expected result**
* The Review Checker should not be displayed at all in a Private window.
Going back to the Search results should close the Private Window automatically.
**Actual result**
* The Review Checker is opened when the user interacts with the Normal Window.
Going back from the Product Details page in the Private window will keep the Sidebar open.
**Regression range**
Not a regression.
|
|
1,902,267 | 16,980,035 |
Created attachment 9407208
DownloadCompleteUnactionable.mp4
### Steps to reproduce
1. Have the new toolbar enabled and set to be shown on top (issue does not reproduce when the toolbar is at bottom)
2. Download a file (can use https://www.thinkbroadband.com/download for test downloads)
3. Check the "download complete" dialog
### Expected behavior
The "download complete" dialog is shown fully and the user can easily interact with.
### Actual behavior
The main action - the "Open" button of the "download complete" dialog is obstructed by the navigation bar.
|
|
1,902,313 | 16,980,248 |
From bug 1882040
When trying to swipe back a short (swiping from top to bottom), the website refreshs and does not go back to the last short video.
Steps to Reproduce:
When trying to swipe back a short (swiping from top to bottom), the website refreshs and does not go back to the last short video.
See bug 1882040 comment 9 for some more details about what's going on.
|
|
1,902,761 | 16,982,593 |
### Steps to reproduce
1. Ensure a TalkBack is running
1. Open Firefox and confirm the a tab is opened
1. If this is a New Tab:
1. dismiss the keyboard (until the bug 1902757 is resolved) and, if opened, any OMC onboarding notifications or type in any URL
1. open any tab, i.e. `wikipedia` from tiles
1. With TalkBack, navigate to the open tab in the tabstrip and observe the TB announcement
### Expected behavior
1. The selected or current state of the tab is announced by TB, i.e. for Wikipedia: `Wikipedia, selected, tab, Double-tap to activate` (it may include additional list announcements like `In list` that are not in the scope of this bug, a role `tab` is covered in the bug 1902760)
### Actual behavior
1. No state is announced for the current tab, the user would not know which tab is, in fact, opened at the moment. This would be especially severe for multiple opened tab and/or for users with cognitive disabilities.
### Device information
* Firefox version: Nightly 129.0a1 (build #2016026447)
* Android device model: Samsung Galaxy Tab S7+
* Android OS version: 13
### Any additional information?
Another major browser on the same device does announce the state as `Selected tab` (which, testing shows, is a part of the accessible name/`contentDescription` of the control).
|
|
1,902,801 | 16,982,893 |
Crash report: https://crash-stats.mozilla.org/report/index/7f8fae61-15b1-4dfa-9252-8ade80240610
MOZ_CRASH Reason: ```assertion `left != right` failed
left: 0
right: 0```
Top 10 frames of crashing thread:
```
0 XUL MOZ_Crash mfbt/Assertions.h:317
0 XUL RustMozCrash mozglue/static/rust/wrappers.cpp:18
1 XUL mozglue_static::panic_hook mozglue/static/rust/lib.rs:98
2 XUL core::ops::function::Fn::call library/core/src/ops/function.rs:79
3 XUL <alloc::boxed::Box<F, A> as core::ops::function::Fn<Args>>::call library/alloc/src/boxed.rs:2034
3 XUL std::panicking::rust_panic_with_hook library/std/src/panicking.rs:783
4 XUL std::panicking::begin_panic_handler::{{closure}} library/std/src/panicking.rs:657
5 XUL std::sys_common::backtrace::__rust_end_short_backtrace library/std/src/sys_common/backtrace.rs:171
6 XUL rust_begin_unwind library/std/src/panicking.rs:645
7 XUL core::panicking::panic_fmt library/core/src/panicking.rs:72
```
By querying Nightly crashes reported within the last 2 months, here are some insights about the signature:
- **First crash report:** 2024-06-10
- **Process type:** Parent
- **Is startup crash:** No
- **Has user comments:** No
- **Is null crash:** Yes - all crashes happened on null or near null memory address
By analyzing the backtrace, the regression may have been introduced by a patch [1] to fix Bug 1890186.
[1] https://hg.mozilla.org/mozilla-central/rev?node=ad954710c53f
:pehrsons, since you are the author of the potential regressor, could you please take a look?
|
|
1,902,989 | 16,985,833 |
This macOS crash signature saw an increase in volume compared to a low base.
Crash report: https://crash-stats.mozilla.org/report/index/3aa02c0e-d301-473d-8680-507820240617
MOZ_CRASH Reason: ```assertion failed: input_nbytes > 0```
Top 10 frames:
```
0 XUL MOZ_Crash(char const*, int, char const*) mfbt/Assertions.h:317
0 XUL RustMozCrash mozglue/static/rust/wrappers.cpp:18
1 XUL mozglue_static::panic_hook mozglue/static/rust/lib.rs:98
2 XUL core::ops::function::Fn::call library/core/src/ops/function.rs:79
3 XUL <alloc::boxed::Box<F, A> as core::ops::function::Fn<Args>>::call library/alloc/src/boxed.rs:2034
3 XUL std::panicking::rust_panic_with_hook library/std/src/panicking.rs:783
4 XUL std::panicking::begin_panic_handler::{{closure}} library/std/src/panicking.rs:649
5 XUL std::sys_common::backtrace::__rust_end_short_backtrace library/std/src/sys_common/backtrace.rs:171
6 XUL rust_begin_unwind library/std/src/panicking.rs:645
7 XUL core::panicking::panic_fmt library/core/src/panicking.rs:72
```
|
|
1,903,027 | 16,986,173 |
When not using VPIO we set up an aggregate device containing both the input and the output device. We have a bug in reading the input channel count out of the HAL unit on top of the aggregate device, because it behaves differently than the VPIO unit. If the output channel count is higher than the input channel count, we mix them up and get stuck in a reinit-loop because we try to over-render in the input callback.
I hit this when using Apple Studio Display for both input and output because that configuration is blocklisted for VPIO, and has 1 input channel and 2 output channels.
[Tracking Requested - why for this release]: Audio input cannot be captured for some devices and constraints combinations on macOS.
|
|
1,903,827 | 16,991,699 |
### Steps to reproduce
1. Ensure a TalkBack is running
1. Open Firefox and confirm the a tab is opened
1. If this is a New Tab:
1. dismiss the keyboard (until the bug 1902757 is resolved) and, if opened, any OMC onboarding notifications or type in any URL
1. open any tab, i.e. wikipedia from tiles
1. Open another tab (repeating step 3)
1. With TalkBack, navigate to the first open tab in the tabstrip
1. Using a navigational gesture of TalkBack (swiping left-to-right with one finger, in LTR/English, for instance), navigate to the `Close tab` button within this tab and observe the TB announcement
1. Repeat steps 5-6 for the second tab and compare the TalkBack announcements for two `Close tab` buttons.
### Expected behavior
1. A context is provided and it is clear, which tab would be closed, when activated.
1. Navigation with TB shortcuts between buttons makes it clear, which tab's Close button is focused
### Actual behavior
1. Both buttons are announced the same - `Close tab` - and it is not clear, which tab would be, in fact, closed if one of them is activated.
1. While navigating with TB shortcuts between buttons, is not clear, which tab's Close button is focused.
### Device information
* Firefox version: Nightly 129.0a1 (build #2016026447)
* Android device model: Samsung Galaxy Tab S7+
* Android OS version: 13
### Any additional information?
1. The severity of this issue could've been access-S4 if Close buttons would've been hidden when multiple tabs are opened. In that case, i.e. as another major browser does, when only one tab has an on-screen Close button, there are less other options when guessing which tab would be, in fact, closed when this control is activated. But in the situation when there are multiple `Close tab` buttons present in the reading order, it is hard to navigate to the needed one and make a precise choice. Especially, with the selected/current state information being missed (addressed in bug 1902761)
1. Another major browser on the same device does announce the title of the tab, i.e. `Close Wikipedia tab`, but another remediation option could be grouping a tab view which currently includes both the tab and its Close button.
|
|
1,904,168 | 16,994,169 |
Created attachment 9409054
dns_over_https.jpg
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0
Steps to reproduce:
Set "DNS over HTTPS" to "Max Protection", using Cloudflare as a provider, then hard-refresh any video on youtube.
Sometimes it works with default or increased protection, but max protection is the only way it's 100% consistent
Actual results:
There's a consistent 10+ second delay compared to not using DNS over HTTPS. Sometimes it's 30 seconds, sometimes it's more.
In addition to that, the video will keep sometimes freeze at the 20 second mark for a while.
In the network monitor, I see a lot of "NS_Binding_Aborted" for "videoplayback?[...]" which are otherwise absent when DNS over HTTPS is disabled. (See attached screenshot)
Expected results:
The video loads nearly instantly and doesn't pause at the 20 second mark when DNS over HTTPS is completely disabled. This should be the normal behavior
|
|
1,892,487 | 16,899,557 |
Not totally sure why this doesn't just work. They are inputs, so should have default tabbing behaviour. However, it does not work.
[Tracking Requested - why for this release]: UX and possible a11y issue
|
|
1,892,612 | 16,900,331 |
Created attachment 9397751
screenshot of the opened tab
In the last 6 days, there have been reports from 13 different users in the German-speaking Firefox support forum, all reporting the same problem. Rarely has there been a problem with Firefox that has brought so many new users to our support forum, so the number of affected users may be much higher. However, it is unclear whether there is a cause in Firefox at all or whether Mozilla's solution may ultimately be a support article or something similar.
The reported issue is that Firefox always opens a tab with the address https://0.0.0.1 by itself. This can happen when following links, but also when opening new windows. All users report the first occurrence since Firefox 125.0.1, although it cannot be ruled out that this is only a coincidental temporal connection to the release of Firefox 125. So far, only one user has been able to run mozregression and all builds have been fine.
One user reports that the problem does not occur on all websites. He was not able to reproduce on DeepL or ChatGPT, but on google.de, gmail.com and wikipedia.org.
One user has observed that whenever this happens, an unknown icon appears in the Windows taskbar at the same time, which disappears immediately.
An ADWcleaner scan from some users did show Malware and removing it solved it for some users.
What all users have in common is that they use Windows.
The following questions remain:
- Why is the problem suddenly occurring for so many users
- Why is only Firefox affected?
Let me know if there is specific information you would like me to request.
|
|
1,892,732 | 16,902,997 |
Created attachment 9397860
Learn more about Firefox Suggest not working.mp4
**[Affected versions]:**
- Firefox Release 125.0.2
- Firefox Release 125.0.1
**[Affected Platforms]:**
- Windows 10
- macOS 13.1
- Ubuntu 22.4
[Prerequisites]:
- Be enrolled in the Yelp experiment.
- Have the browser.search.region set to "US".
**[Steps to reproduce]:**
1. Open the Firefox browser using the profile from prerequisites.
2. In the urlbar type a keyword that triggers a Yelp suggestion (eg: restaurant).
3. Click the "Feedback" button of the Yelp result.
4. Click the "Learn more about Firefox Suggest" option.
5. Observe the behavior.
**[Expected result]:**
- The Firefox Suggest SUMO page is opened in a new tab.
**[Actual result]:**
- Nothing happens.
**[Regression]**
- The issue is NOT reproducible on Firefox 124 release, considering this using mozregression tools we have found the following pushlog: [Link](https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=4199577c0d6419bfad168375b8eb9f8b89df095a&tochange=77104ab988852b524803ce06c1b3d1cc3eabe952).
- Based on the Pushlog link, it seems that Bug 1883378 introduced this behavior.
**[ Notes]:**
- Due to the changes made starting with Firefox 126, the issue is not reproducible because the "Learn more about Firefox Suggest" option was changed to "Manage Firefox Suggest".
- This issue is also reproducible for MDN suggestions.
- The issue is NOT reproducible for Pocket, Weather, Navigational, Dynamic Wikipedia
- Attached is a screen recording of the issue.
|
|
1,893,106 | 16,905,599 |
See bug 1866595 comment 24 which can happen with a built-in mic because of the vpio force-list introduced in bug 1880244.
|
|
1,894,061 | 16,913,948 |
I've recently started seeing `Extra properties should have string values.` in my browser console after startup (on local nightly builds - possibly also distributed nightly builds but I can't recall off-hand).
That's coming from https://searchfox.org/mozilla-central/rev/2e7374599f4020d0490ec8c5e877c179c9e153c9/toolkit/components/telemetry/core/TelemetryEvent.cpp#848 so it's a telemetry event where some of the `extra` bits are invalid.
Standard8 did some digging on matrix:
> Gijs: I see it as well. I quickly added debug and the first three params to `RecordEvent` are `session_restore` `backup_can_be_loaded` `session_file`
> Gijs: https://searchfox.org/mozilla-central/rev/2e7374599f4020d0490ec8c5e877c179c9e153c9/browser/components/sessionstore/SessionFile.sys.mjs#358 maybe? That's a boolean, not a boolean string...
> Its definitely the `can_load` key
> Oh, that's subtle
Kelly, would you mind taking a look?
|
|
1,894,614 | 16,917,448 |
In Firefox 125 we enabled a new feature on release (bug 1882478) to present a suggestion on the address bar if the user has a url on their clipboard.
We have had a [couple of reports on Reddit](https://www.reddit.com/r/firefox/comments/1cgxysc/ever_since_update_the_second_i_press_the_search/) of users seeing long hangs when clicking on the address bar.
One user has been able to [capture a profile](https://share.firefox.dev/4dmjmZV), which shows a 75 second hang with this stack:
```
ZwUserGetClipboardData [win32u.dll]
GetClipboardData [user32.dll]
CClipDataObject::OleGetClipboardData(unsigned int, void**) [com\ole32\ole232\clipbrd\clipdata.cpp]
CClipDataObject::GetData(tagFORMATETC*, tagSTGMEDIUM*) [com\ole32\ole232\clipbrd\clipdata.cpp]
RepeatedlyTryGetData::<lambda_19>::operator()() const [widget/windows/nsClipboard.cpp]
RepeatedlyTry(RepeatedlyTryGetData::<lambda_19>, std::_Binder<std::_Unforced,void (&)(long, const nsTString<char> &),const std::_Ph<1> &,nsTLiteralString<char> >) [widget/windows/nsClipboard.cpp]
RepeatedlyTryGetData(IDataObject&, tagFORMATETC*, tagSTGMEDIUM*) [widget/windows/nsClipboard.cpp]
nsClipboard::FillSTGMedium(IDataObject*, unsigned int, tagFORMATETC*, tagSTGMEDIUM*, unsigned long) [widget/windows/nsClipboard.cpp]
nsClipboard::GetNativeDataOffClipboard(IDataObject*, unsigned int, unsigned int, char const*, void**, unsigned int*) [widget/windows/nsClipboard.cpp]
nsClipboard::GetDataFromDataObject(IDataObject*, unsigned int, nsIWidget*, nsITransferable*) [widget/windows/nsClipboard.cpp]
nsClipboard::GetNativeClipboardData(nsITransferable*, int) [widget/windows/nsClipboard.cpp]
nsBaseClipboard::GetData(nsITransferable*, int, mozilla::dom::WindowContext*) [widget/nsBaseClipboard.cpp]
...
readFromClipboard [chrome://browser/content/browser.js:3091:27]
isActive [resource:///modules/UrlbarProviderClipboard.sys.mjs:49:11]
js::RunScript
tryMethod [resource:///modules/UrlbarUtils.sys.mjs:2365:12]
start [resource:///modules/UrlbarProvidersManager.sys.mjs:405:14]
startQuery [resource:///modules/UrlbarProvidersManager.sys.mjs:215:19]
```
|
|
1,894,849 | 16,918,933 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:125.0) Gecko/20100101 Firefox/125.0
Steps to reproduce:
This bug is reproduceable in a new Firefox profile, though I do not know when it started. According to [this article though](https://blog.mozilla.org/attack-and-defense/2021/10/14/implementing-form-filling-and-accessibility-in-the-firefox-pdf-viewer/), Firefox's PDF viewers is supposed to render the tags in a PDF to screen readers.
1. With NVDA (Windows screen reader), open a tagged PDF in Firefox, e.g.:
https://www.ssa.gov/pubs/EN-05-10023.pdf
2. Press D to move to the first page, where the first piece of text should be "Social Security Numbers for Children".
Actual results:
This heading is broken into two elements, i.e.:
Social SecurityNumbers for
Children
Expected results:
NVDA should have announced that this was a level-one heading.
|
|
1,894,933 | 16,919,561 |
**STR:**
1. Open Nightly with a fresh profile
2. Go to about:preferences#privacy
3. Check "Delete cookies and site data when Firefox is closed"
**Expected:**
In the "History" section on the same `about:preferences` page the dropdown is switched to "Use custom settings for history". The "Clear history when Nightly closes" checkbox is checked.
The settings modal to the right of the checkbox shows "Cookies and site data", Temporary cached files and pages" selected. The items "history" and "site settings" are *not* checked.
History is not cleared on shutdown.
**Actual:**
The settings modal to the right of the checkbox shows "Cookies and site data", Temporary cached files and pages" selected. The item "history" is *also checked*.
History is cleared on shutdown.
[Tracking Requested - why for this release]:
Data loss bug, users that only want to clear site data will have their entire history cleared on shutdown too.
|
|
1,895,110 | 16,920,522 |
Crash report: https://crash-stats.mozilla.org/report/index/9a060de6-0aad-43e1-a28c-ba2c10240505
MOZ_CRASH Reason: ```Shutdown hanging at step XPCOMShutdownThreads. Something is blocking the main-thread.```
Top 9 frames:
```
0 xul.dll MOZ_Crash(char const*, int, char const*) mfbt/Assertions.h:317
0 xul.dll mozilla::(anonymous namespace)::RunWatchdog(void*) toolkit/components/terminator/nsTerminator.cpp:244
1 nss3.dll _PR_NativeRunThread(void*) nsprpub/pr/src/threads/combined/pruthr.c:399
2 nss3.dll pr_root(void*) nsprpub/pr/src/md/windows/w95thred.c:139
3 ucrtbase.dll thread_start<unsigned int (__cdecl*)(void*), 1>
4 kernel32.dll BaseThreadInitThunk
5 mozglue.dll mozilla::interceptor::FuncHook<mozilla::interceptor::WindowsDllInterceptor<mo... toolkit/xre/dllservices/mozglue/nsWindowsDllInterceptor.h:150
5 mozglue.dll patched_BaseThreadInitThunk(int, void*, void*) toolkit/xre/dllservices/mozglue/WindowsDllBlocklist.cpp:562
6 ntdll.dll RtlUserThreadStart
```
|
|
1,895,599 | 16,925,577 |
I had intended to explicitly test this behavior prior to merge, but in the many revisions and changes it slipped by. I have found that the `zip` crate is unable to read our omnijar files due to [the optimized layout](https://taras.glek.net/post/optimized-zip-format/).
This is a significant defect that should be fixed before the crash reporter gets to release.
|
|
1,905,505 | 17,005,121 |
The event page lifecycle is managed by a timer ([IdleManager](https://searchfox.org/mozilla-central/rev/cac3778e4407b9b6831326465d84e4f60648b912/toolkit/components/extensions/parent/ext-backgroundPage.js#988)) that terminates an event page as soon as there is no detected activity.
The timer starts when the event page wakes up ([resetTimer()](https://searchfox.org/mozilla-central/rev/cac3778e4407b9b6831326465d84e4f60648b912/toolkit/components/extensions/parent/ext-backgroundPage.js#801-803)), and is guaranteed to stop when the background stops for any reason (regular termination, process crash, extension unload) (by [calling `clearState()`](https://searchfox.org/mozilla-central/rev/cac3778e4407b9b6831326465d84e4f60648b912/toolkit/components/extensions/parent/ext-backgroundPage.js#500-501)).
Whenever any activity occurs, signaled through the internal "background-script-reset-idle" event, [resetTimer() is called](https://searchfox.org/mozilla-central/rev/cac3778e4407b9b6831326465d84e4f60648b912/toolkit/components/extensions/parent/ext-backgroundPage.js#774) again, which extends the lifetime by rescheduling the timer. This design assumes that `background-script-reset-idle` is only called when the background script exists. If the background is already stopped, calling `resetTimer()` will just schedule a [timer that eventually calls `terminateBackground()`](https://searchfox.org/mozilla-central/rev/cac3778e4407b9b6831326465d84e4f60648b912/toolkit/components/extensions/parent/ext-backgroundPage.js#1058).
The first step of `terminateBackground()` [is to `await bgStartupPromise`](https://searchfox.org/mozilla-central/rev/cac3778e4407b9b6831326465d84e4f60648b912/toolkit/components/extensions/parent/ext-backgroundPage.js#813,817), which means that if anything causes `terminateBackground()` to be called while the background is inactive, that it will immediately terminate the background script at the next startup of the event page.
I audited all entries that trigger "background-script-reset-idle":
- [ParentAPIManager.recvAPICall](https://searchfox.org/mozilla-central/rev/cac3778e4407b9b6831326465d84e4f60648b912/toolkit/components/extensions/ExtensionParent.sys.mjs#1208-1211) resets the timer before processing an API call. Before it gets there, it looks up the context via [`getContextById`](https://searchfox.org/mozilla-central/rev/cac3778e4407b9b6831326465d84e4f60648b912/toolkit/components/extensions/ExtensionParent.sys.mjs#1181), which throws if the context has already been unloaded. Experimentally I confirmed that unloading the background event browser [via `setBgStateStopped`](https://searchfox.org/mozilla-central/rev/cac3778e4407b9b6831326465d84e4f60648b912/toolkit/components/extensions/parent/ext-backgroundPage.js#508) triggers a synchronous `message-manager-close` notification that [erases the context](https://searchfox.org/mozilla-central/rev/cac3778e4407b9b6831326465d84e4f60648b912/toolkit/components/extensions/ExtensionParent.sys.mjs#997,1001). If we ever decide to drop the use of this notification in favor of [recvProxyClosed](https://searchfox.org/mozilla-central/rev/cac3778e4407b9b6831326465d84e4f60648b912/toolkit/components/extensions/ExtensionParent.sys.mjs#1131-1135) (which is tracked in bug 1595186), then we have to carefully examine that doing so will not cause bugs like this.
- [Various resets within `terminateBackground()`](https://searchfox.org/mozilla-central/rev/cac3778e4407b9b6831326465d84e4f60648b912/toolkit/components/extensions/parent/ext-backgroundPage.js#845,853,894) that ignore the termination request if there is another pending thing. This will never be called while the background page is stopped because there is an [earlier return if the background is not running](https://searchfox.org/mozilla-central/rev/cac3778e4407b9b6831326465d84e4f60648b912/toolkit/components/extensions/parent/ext-backgroundPage.js#822-824).
- [EventManager's resetIdle](https://searchfox.org/mozilla-central/rev/cac3778e4407b9b6831326465d84e4f60648b912/toolkit/components/extensions/ExtensionCommon.sys.mjs#2790,2792) may reset idle before dispatching an event. At the surface it seems to work all right: before calling `resetIdle()` there is always a `shouldFire()` call, which prevents the logic from running if the context has unloaded.
- HOWEVER, this logic can also run in the content process, AND [ExtensionChild's `emit` method forwards the message to the parent via the process message manager](https://searchfox.org/mozilla-central/rev/cac3778e4407b9b6831326465d84e4f60648b912/toolkit/components/extensions/ExtensionChild.sys.mjs#528). When the message is received in the parent, the event [is forwarded without further checks](https://searchfox.org/mozilla-central/rev/cac3778e4407b9b6831326465d84e4f60648b912/toolkit/components/extensions/Extension.sys.mjs#3096-3097), potentially after a context has unloaded.
- Moreover, the idle reset event is dispatched for EventManagers from any extension context, even non-background pages (a seen in the [resetIdleOnEvent definition in EventManager constructor](https://searchfox.org/mozilla-central/rev/cac3778e4407b9b6831326465d84e4f60648b912/toolkit/components/extensions/ExtensionCommon.sys.mjs#2327-2333)). This means that the bug can trivially be triggered, simply by triggering an event in a non-background extension context when the background is suspended.
- This "keep event page alive when an extension event is triggered in any extension document" logic seems bizarre, and I filed bug 1905504 to fix this.
This is not a theoretical problem, it has repeatedly been observed in the wild, e.g. at https://discourse.mozilla.org/t/one-of-my-manifest-v3-addons-is-not-waking-up-when-it-should/131349/36
|
|
1,905,771 | 17,008,771 |
Created attachment 9410702
Button with on-screen text AI Chatbot has accessible name Tree Style Tab in the Accessibility tree
### Found in:
* Nightly 129.0a1 (2024-07-01)
### STR:
1. Have a Fx sidebar opened, i.e. with `ctrl/cmd+B` open a Bookmarks sidebar. Or have `Tree Style Tabs` extension installed
1. Reach `about:preferences#experimental`
1. Enable the `AI Chatbot integration`
1. Select the ChatGPT AI provider (or any other)
1. Confirm the sidebar view is updated to the `AI Chatbot`
1. Using a screen reader, navigate to and observe the announcement of the `AI Chatbot` control at the top of the sidebar.
1. Alternatively, open a browser developer tools > Accessibility > and select the sidebar's title button via the `Pick accessible object from the page`
### Expected:
1. The on-screen name of the sidebar is serving as an accessible name of the button and is announced as `AI Chatbot` (which would be the `name` field value in the A11y dev tools)
### Actual:
1. The on-screen name of the sidebar is updated to `AI Chatbot` but the accessible name of the button remains as the previous sidebar view, i.e. `Tree Style Tabs` (which is also the `name` field value in the A11y dev tools)
### Note:
I have not noticed this behavior with the sidebar before, thus filing the bug in the GenAI sidebar's component. That's being said, if someone could confirm the behavior on their machines to confirm or close this bug, I'll appreciate it. Filing from macOS but both the Accessibility tree in Dev Tools and the MacOS Accessibility Inspector are confirming the name of the accessible is as described in "Actual" section above, thus other platforms should be affected too.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.