Bug ID
int64 961
1.91M
| Comment ID
int64 3.98k
17.1M
| Author
stringlengths 8
48
| Comment Text
stringlengths 1
64.3k
⌀ |
---|---|---|---|
1,767,589 | 15,883,994 |
121 crashes from 44 installations of 101.0a1 and 101.0b1 and b2, most on Windows 8.1, some on Windows 7. First affected build is 101.0a1 20220427094429 which points to bug 1763573 as regressing change.
Crash report: https://crash-stats.mozilla.org/report/index/dd2c0779-d048-4eb4-8263-563a40220428
Reason: ```EXCEPTION_ACCESS_VIOLATION_READ```
Top 10 frames of crashing thread:
```
0 xul.dll PinCurrentAppToTaskbarImpl browser/components/shell/nsWindowsShellService.cpp:1346
1 xul.dll XPTC__InvokebyIndex
2 xul.dll _tailMerge_d3dcompiler_47.dll
3 xul.dll static XPCWrappedNative::CallMethod js/xpconnect/src/XPCWrappedNative.cpp:1125
4 xul.dll XPC_WN_CallMethod js/xpconnect/src/XPCWrappedNativeJSOps.cpp:963
5 xul.dll Interpret js/src/vm/Interpreter.cpp:3314
6 xul.dll js::CallGetter js/src/vm/Interpreter.cpp:731
7 xul.dll js::NativeGetProperty js/src/vm/NativeObject.cpp:2172
8 xul.dll js::jit::DoGetElemFallback js/src/jit/BaselineIC.cpp:648
9 None @0x00000094fe9176ae
```
|
|
1,767,600 | 15,884,082 |
Created attachment 9274940
PBM_TCP_Spotlight.gif
**[Notes]:**
- Since the TCP is enabled by default in PBM, we should not show the TCP Spotlight (the “network.cookie.cookieBehavior.pbmode” pref is set to “5” in the “about:config” page).
**[Affected versions]:**
- Firefox Release 100.0 (Build ID: 20220428192727)
**[Affected Platforms]:**
- Windows 10 x64
- Windows 11 x64
- macOS 12.3.1
- Ubuntu 20.04 x64
**[Prerequisites]:**
- Have the Firefox Release 100.0 browser installed/extracted.
- Have the "set MOZ_REMOTE_SETTINGS_DEVTOOLS=1" syntax ran into a terminal.
- Have the [user.js](https://drive.google.com/file/d/1s-jq35a313yWo3-seOYI7VmlPwalIKBT/view?usp=sharing) file saved on a new Firefox profile.
- Have the [Remote Settings Devtools](https://github.com/mozilla-extensions/remote-settings-devtools/releases) addon installed.
**[Steps to reproduce]:**
1. Open the Firefox browser with the profile from prerequisites.
2. Navigate to the “about:config” page and change the “browser.privatebrowsing.autostart” pref set to true.
3. Change the Prod environment to the Stage Preview using the Remote Settings Devtools add-on.
4. Restart the browser and observe the behavior.
**[Expected result]:**
- The TCP spotlight is not displayed.
**[Actual result]:**
- The TCP spotlight is displayed.
**[Additional notes]:**
- We also observed that the “network.cookie.cookieBehavior.pbmode” pref is missing from the rollout’s targeting.
- Attached is a screen recording of the issue.
|
|
1,767,938 | 15,885,477 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0
Steps to reproduce:
1) open:
https://juraj.w3spaces.com/firefox_101_bug-drag_and_drop.html
2) try to drag the green image to the box above
Actual results:
Nothing, you can't.
Expected results:
It should be able to drag the image even with `draggable` attribute set to false, because parent container is draggable.
This is a regression in Firefox 101.
It works in Firefox 100, Firefox ESR, Chrome.
|
|
1,767,953 | 15,885,651 |
Created attachment 9275175
Browser Console.png
**Affected versions**
- 102.0a1
- 101.0b2
- 100.0
**Affected platforms**
- Windows 10
- macOS 11
- Ubuntu 20
**Steps to reproduce**
1. Launch Firefox using a new profile
2. Go to Add-ons Manager → Plugins tab
3. Wait several minutes for plugin installation
4. Try to play any streaming service (eg. Netflix)
**Expected result**
- The plugin is properly downloaded
- The message is no longer displayed
- The streaming service works
**Actual result:**
- The plugin is not installed
- The yellow warning is still display
- No streaming services seams to work
**Regression range**
- N/A
**Other notes**
- Forcing the Widevine update, browser restart, waiting a significant amount of time (~1h 30m), trying to play different content, toggling the “Play DRM-controlled content” checkbox, nothing seems to work once I am reproducing this issue.
- Not every test machine is affected after double checking with my colleagues. Personally, I’m reproducing the issue across platforms (Windows, Mac, Ubuntu) on all the channels.
- What seems odd is that my college reproduces the issue only on Nightly and Beta channel on Ubuntu 20 (RC is not affected), and using the same test machine, Win 10 has no problem. Moreover that specific Ubuntu 20 was used last week for the Nightly testing and everything worked fine.
|
|
1,767,993 | 15,886,074 |
69 crashes with Firefox 100.0. There are 50+ different install times - does it crash only once per install?
Crash report: https://crash-stats.mozilla.org/report/index/c1ca39e3-6b99-4412-a9f3-fc4080220505
Reason: ```EXCEPTION_STACK_OVERFLOW```
Top 10 frames of crashing thread:
```
0 qipcap64.dll qipcap64.dll@0x000000000002e38b
1 qipcap64.dll qipcap64.dll@0x000000000002e469
2 qipcap64.dll qipcap64.dll@0x000000000002e469
3 qipcap64.dll qipcap64.dll@0x000000000002e469
4 qipcap64.dll qipcap64.dll@0x000000000002e469
5 qipcap64.dll qipcap64.dll@0x000000000002e469
6 qipcap64.dll qipcap64.dll@0x000000000002e469
7 qipcap64.dll qipcap64.dll@0x000000000002e469
8 qipcap64.dll qipcap64.dll@0x000000000002e469
9 qipcap64.dll qipcap64.dll@0x000000000002e469
```
|
|
1,768,251 | 15,887,896 |
Testcase found while fuzzing mozilla-central rev fe0b18ac5fe1 (built with: --enable-address-sanitizer --enable-fuzzing).
Testcase can be reproduced using the following commands:
```
$ pip install fuzzfetch grizzly-framework
$ python -m fuzzfetch --build fe0b18ac5fe1 --asan --fuzzing -n firefox
$ python -m grizzly.replay ./firefox/firefox testcase.html
```
```
AddressSanitizer: heap-use-after-free [@ get] with READ of size 8
=================================================================
==1314891==ERROR: AddressSanitizer: heap-use-after-free on address 0x607000069de8 at pc 0x7fb7602a90eb bp 0x7ffd9451d2b0 sp 0x7ffd9451d2a8
READ of size 8 at 0x607000069de8 thread T0 (Isolated Web Co)
#0 0x7fb7602a90ea in get /builds/worker/workspace/obj-build/dist/include/mozilla/RefPtr.h:286:27
#1 0x7fb7602a90ea in operator mozilla::dom::WritableStream * /builds/worker/workspace/obj-build/dist/include/mozilla/RefPtr.h:299:12
#2 0x7fb7602a90ea in GetStream /builds/worker/workspace/obj-build/dist/include/mozilla/dom/WritableStreamDefaultWriter.h:39:46
#3 0x7fb7602a90ea in mozilla::dom::WritableStreamDefaultWriterWrite(JSContext*, mozilla::dom::WritableStreamDefaultWriter*, JS::Handle<JS::Value>, mozilla::ErrorResult&) /dom/streams/WritableStreamDefaultWriter.cpp:296:26
#4 0x7fb760272629 in mozilla::dom::PipeToPump::OnReadFulfilled(JSContext*, JS::Handle<JS::Value>, mozilla::ErrorResult&) /dom/streams/ReadableStreamPipeTo.cpp:605:23
#5 0x7fb760282448 in mozilla::dom::PipeToReadRequest::ChunkSteps(JSContext*, JS::Handle<JS::Value>, mozilla::ErrorResult&) /dom/streams/ReadableStreamPipeTo.cpp:638:17
#6 0x7fb76024f5d4 in mozilla::dom::ReadableStreamFulfillReadRequest(JSContext*, mozilla::dom::ReadableStream*, JS::Handle<JS::Value>, bool, mozilla::ErrorResult&) /dom/streams/ReadableStream.cpp:650:16
#7 0x7fb760251c52 in mozilla::dom::ReadableByteStreamControllerEnqueue(JSContext*, mozilla::dom::ReadableByteStreamController*, JS::Handle<JSObject*>, mozilla::ErrorResult&) /dom/streams/ReadableByteStreamController.cpp:891:7
#8 0x7fb75b4f43b7 in mozilla::dom::BodyStream::EnqueueChunkWithSizeIntoStream(JSContext*, mozilla::dom::ReadableStream*, unsigned long, mozilla::ErrorResult&) /dom/base/BodyStream.cpp:420:3
#9 0x7fb75b4f4baf in mozilla::dom::BodyStream::OnInputStreamReady(nsIAsyncInputStream*) /dom/base/BodyStream.cpp:485:3
#10 0x7fb75850ddad in mozilla::NonBlockingAsyncInputStream::RunAsyncWaitCallback(mozilla::NonBlockingAsyncInputStream::AsyncWaitRunnable*, already_AddRefed<nsIInputStreamCallback>) /xpcom/io/NonBlockingAsyncInputStream.cpp:398:13
#11 0x7fb75850c73e in mozilla::NonBlockingAsyncInputStream::AsyncWaitRunnable::Run() /xpcom/io/NonBlockingAsyncInputStream.cpp:33:14
#12 0x7fb7585e53ff in mozilla::SchedulerGroup::Runnable::Run() /xpcom/threads/SchedulerGroup.cpp:140:20
#13 0x7fb758632172 in mozilla::RunnableTask::Run() /xpcom/threads/TaskController.cpp:467:16
#14 0x7fb7585f81c5 in mozilla::TaskController::DoExecuteNextTaskOnlyMainThreadInternal(mozilla::detail::BaseAutoLock<mozilla::Mutex&> const&) /xpcom/threads/TaskController.cpp:780:26
#15 0x7fb7585f5378 in mozilla::TaskController::ExecuteNextTaskOnlyMainThreadInternal(mozilla::detail::BaseAutoLock<mozilla::Mutex&> const&) /xpcom/threads/TaskController.cpp:612:15
#16 0x7fb7585f5aa0 in mozilla::TaskController::ProcessPendingMTTask(bool) /xpcom/threads/TaskController.cpp:390:36
#17 0x7fb75863acc1 in operator() /xpcom/threads/TaskController.cpp:124:37
#18 0x7fb75863acc1 in mozilla::detail::RunnableFunction<mozilla::TaskController::InitializeInternal()::$_0>::Run() /builds/worker/workspace/obj-build/dist/include/nsThreadUtils.h:531:5
#19 0x7fb758618b37 in nsThread::ProcessNextEvent(bool, bool*) /xpcom/threads/nsThread.cpp:1180:16
#20 0x7fb758622c9c in NS_ProcessNextEvent(nsIThread*, bool) /xpcom/threads/nsThreadUtils.cpp:465:10
#21 0x7fb759d205ef in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /ipc/glue/MessagePump.cpp:85:21
#22 0x7fb759b980d1 in RunInternal /ipc/chromium/src/base/message_loop.cc:380:10
#23 0x7fb759b980d1 in RunHandler /ipc/chromium/src/base/message_loop.cc:373:3
#24 0x7fb759b980d1 in MessageLoop::Run() /ipc/chromium/src/base/message_loop.cc:355:3
#25 0x7fb7609f5d47 in nsBaseAppShell::Run() /widget/nsBaseAppShell.cpp:137:27
#26 0x7fb7658ae1ef in XRE_RunAppShell() /toolkit/xre/nsEmbedFunctions.cpp:874:20
#27 0x7fb759b980d1 in RunInternal /ipc/chromium/src/base/message_loop.cc:380:10
#28 0x7fb759b980d1 in RunHandler /ipc/chromium/src/base/message_loop.cc:373:3
#29 0x7fb759b980d1 in MessageLoop::Run() /ipc/chromium/src/base/message_loop.cc:355:3
#30 0x7fb7658ad39b in XRE_InitChildProcess(int, char**, XREChildData const*) /toolkit/xre/nsEmbedFunctions.cpp:733:34
#31 0x562a5d76cb9d in content_process_main(mozilla::Bootstrap*, int, char**) /browser/app/../../ipc/contentproc/plugin-container.cpp:57:28
#32 0x562a5d76cfd0 in main /browser/app/nsBrowserApp.cpp:327:18
#33 0x7fb77e2000b2 in __libc_start_main /build/glibc-sMfBJT/glibc-2.31/csu/../csu/libc-start.c:308:16
#34 0x562a5d6acfe9 in _start (/home/jkratzer/builds/mc-asan/firefox+0x5efe9) (BuildId: 46d88e4a8666787a164e87a6b4fb84c15945a760)
0x607000069de8 is located 56 bytes inside of 80-byte region [0x607000069db0,0x607000069e00)
freed by thread T0 (Isolated Web Co) here:
#0 0x562a5d72f262 in __interceptor_free /builds/worker/fetches/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:52:3
#1 0x7fb758458fa5 in SnowWhiteKiller::Visit(nsPurpleBuffer&, nsPurpleBufferEntry*) /xpcom/base/nsCycleCollector.cpp:2444:9
#2 0x7fb758436946 in void nsPurpleBuffer::VisitEntries<SnowWhiteKiller>(SnowWhiteKiller&) /xpcom/base/nsCycleCollector.cpp:939:23
#3 0x7fb7584371e2 in nsCycleCollector::FreeSnowWhiteWithBudget(js::SliceBudget&) /xpcom/base/nsCycleCollector.cpp:2612:14
#4 0x7fb75a0432fc in AsyncFreeSnowWhite::Run() /js/xpconnect/src/XPCJSRuntime.cpp:150:9
#5 0x7fb758630d49 in IdleRunnableWrapper::Run() /xpcom/threads/nsThreadUtils.cpp:309:22
#6 0x7fb758632172 in mozilla::RunnableTask::Run() /xpcom/threads/TaskController.cpp:467:16
#7 0x7fb7585f81c5 in mozilla::TaskController::DoExecuteNextTaskOnlyMainThreadInternal(mozilla::detail::BaseAutoLock<mozilla::Mutex&> const&) /xpcom/threads/TaskController.cpp:780:26
#8 0x7fb7585f5695 in mozilla::TaskController::ExecuteNextTaskOnlyMainThreadInternal(mozilla::detail::BaseAutoLock<mozilla::Mutex&> const&) /xpcom/threads/TaskController.cpp:654:15
#9 0x7fb7585f5aa0 in mozilla::TaskController::ProcessPendingMTTask(bool) /xpcom/threads/TaskController.cpp:390:36
#10 0x7fb75863acf4 in operator() /xpcom/threads/TaskController.cpp:127:37
#11 0x7fb75863acf4 in mozilla::detail::RunnableFunction<mozilla::TaskController::InitializeInternal()::$_1>::Run() /builds/worker/workspace/obj-build/dist/include/nsThreadUtils.h:531:5
#12 0x7fb758618b37 in nsThread::ProcessNextEvent(bool, bool*) /xpcom/threads/nsThread.cpp:1180:16
#13 0x7fb758622c9c in NS_ProcessNextEvent(nsIThread*, bool) /xpcom/threads/nsThreadUtils.cpp:465:10
#14 0x7fb75fc1e9af in bool mozilla::SpinEventLoopUntil<(mozilla::ProcessFailureBehavior)1, mozilla::dom::ContentChild::ProvideWindowCommon(mozilla::dom::BrowserChild*, nsIOpenWindowInfo*, unsigned int, bool, nsIURI*, nsTSubstring<char16_t> const&, nsTSubstring<char> const&, bool, bool, bool, nsDocShellLoadState*, bool*, mozilla::dom::BrowsingContext**)::$_9>(nsTSubstring<char> const&, mozilla::dom::ContentChild::ProvideWindowCommon(mozilla::dom::BrowserChild*, nsIOpenWindowInfo*, unsigned int, bool, nsIURI*, nsTSubstring<char16_t> const&, nsTSubstring<char> const&, bool, bool, bool, nsDocShellLoadState*, bool*, mozilla::dom::BrowsingContext**)::$_9&&, nsIThread*) /builds/worker/workspace/obj-build/dist/include/mozilla/SpinEventLoopUntil.h:176:25
#15 0x7fb75fc1b3b6 in mozilla::dom::ContentChild::ProvideWindowCommon(mozilla::dom::BrowserChild*, nsIOpenWindowInfo*, unsigned int, bool, nsIURI*, nsTSubstring<char16_t> const&, nsTSubstring<char> const&, bool, bool, bool, nsDocShellLoadState*, bool*, mozilla::dom::BrowsingContext**) /dom/ipc/ContentChild.cpp:1257:5
#16 0x7fb75fc7f7a5 in mozilla::dom::BrowserChild::ProvideWindow(nsIOpenWindowInfo*, unsigned int, bool, nsIURI*, nsTSubstring<char16_t> const&, nsTSubstring<char> const&, bool, bool, bool, nsDocShellLoadState*, bool*, mozilla::dom::BrowsingContext**) /dom/ipc/BrowserChild.cpp:816:14
#17 0x7fb7657f76ab in nsWindowWatcher::OpenWindowInternal(mozIDOMWindowProxy*, nsTSubstring<char> const&, nsTSubstring<char> const&, nsTSubstring<char> const&, bool, bool, bool, nsIArray*, bool, bool, bool, nsPIWindowWatcher::PrintKind, nsDocShellLoadState*, mozilla::dom::BrowsingContext**) /toolkit/components/windowwatcher/nsWindowWatcher.cpp:876:24
#18 0x7fb7657fc328 in nsWindowWatcher::OpenWindow2(mozIDOMWindowProxy*, nsTSubstring<char> const&, nsTSubstring<char> const&, nsTSubstring<char> const&, bool, bool, bool, nsISupports*, bool, bool, bool, nsPIWindowWatcher::PrintKind, nsDocShellLoadState*, mozilla::dom::BrowsingContext**) /toolkit/components/windowwatcher/nsWindowWatcher.cpp:387:10
#19 0x7fb75b4806d6 in nsGlobalWindowOuter::OpenInternal(nsTSubstring<char16_t> const&, nsTSubstring<char16_t> const&, nsTSubstring<char16_t> const&, bool, bool, bool, bool, bool, nsIArray*, nsISupports*, nsDocShellLoadState*, bool, nsGlobalWindowOuter::PrintKind, mozilla::dom::BrowsingContext**) /dom/base/nsGlobalWindowOuter.cpp:7059:21
#20 0x7fb75b486597 in nsGlobalWindowOuter::OpenJS(nsTSubstring<char16_t> const&, nsTSubstring<char16_t> const&, nsTSubstring<char16_t> const&, mozilla::dom::BrowsingContext**) /dom/base/nsGlobalWindowOuter.cpp:5687:10
#21 0x7fb75b485ff0 in nsGlobalWindowOuter::OpenOuter(nsTSubstring<char16_t> const&, nsTSubstring<char16_t> const&, nsTSubstring<char16_t> const&, mozilla::ErrorResult&) /dom/base/nsGlobalWindowOuter.cpp:5651:17
#22 0x7fb75b419e52 in nsGlobalWindowInner::Open(nsTSubstring<char16_t> const&, nsTSubstring<char16_t> const&, nsTSubstring<char16_t> const&, mozilla::ErrorResult&) /dom/base/nsGlobalWindowInner.cpp:4109:3
#23 0x7fb75cd76f09 in mozilla::dom::Window_Binding::open(JSContext*, JS::Handle<JSObject*>, void*, JSJitMethodCallArgs const&) /builds/worker/workspace/obj-build/dom/bindings/WindowBinding.cpp:2665:59
#24 0x7fb75d5c7a5b in bool mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::MaybeCrossOriginObjectThisPolicy, mozilla::dom::binding_detail::ThrowExceptions>(JSContext*, unsigned int, JS::Value*) /dom/bindings/BindingUtils.cpp:3271:13
#25 0x7fb7675c3d74 in CallJSNative /js/src/vm/Interpreter.cpp:420:13
#26 0x7fb7675c3d74 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct, js::CallReason) /js/src/vm/Interpreter.cpp:507:12
#27 0x7fb7675b105e in InternalCall /js/src/vm/Interpreter.cpp:574:10
#28 0x7fb7675b105e in CallFromStack /js/src/vm/Interpreter.cpp:578:10
#29 0x7fb7675b105e in Interpret(JSContext*, js::RunState&) /js/src/vm/Interpreter.cpp:3314:16
#30 0x7fb767595be1 in js::RunScript(JSContext*, js::RunState&) /js/src/vm/Interpreter.cpp:389:13
#31 0x7fb7675c3eaf in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct, js::CallReason) /js/src/vm/Interpreter.cpp:539:13
#32 0x7fb7675c5a3a in InternalCall /js/src/vm/Interpreter.cpp:574:10
#33 0x7fb7675c5a3a in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>, js::CallReason) /js/src/vm/Interpreter.cpp:605:8
#34 0x7fb765d0215d in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /js/src/vm/CallAndConstruct.cpp:117:10
previously allocated by thread T0 (Isolated Web Co) here:
#0 0x562a5d72f50e in __interceptor_malloc /builds/worker/fetches/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:69:3
#1 0x562a5d77328d in moz_xmalloc /memory/mozalloc/mozalloc.cpp:52:15
#2 0x7fb7602a1289 in operator new /builds/worker/workspace/obj-build/dist/include/mozilla/cxxalloc.h:33:10
#3 0x7fb7602a1289 in mozilla::dom::AcquireWritableStreamDefaultWriter(mozilla::dom::WritableStream*, mozilla::ErrorResult&) /dom/streams/WritableStream.cpp:689:7
#4 0x7fb76025cfe0 in mozilla::dom::ReadableStreamPipeTo(mozilla::dom::ReadableStream*, mozilla::dom::WritableStream*, bool, bool, bool, mozilla::dom::AbortSignal*, mozilla::ErrorResult&) /dom/streams/ReadableStreamPipeTo.cpp:941:7
#5 0x7fb76025edc6 in mozilla::dom::ReadableStream::PipeTo(mozilla::dom::WritableStream&, mozilla::dom::StreamPipeOptions const&, mozilla::ErrorResult&) /dom/streams/ReadableStream.cpp:812:10
#6 0x7fb75c591993 in pipeTo /builds/worker/workspace/obj-build/dom/bindings/ReadableStreamBinding.cpp:680:60
#7 0x7fb75c591993 in mozilla::dom::ReadableStream_Binding::pipeTo_promiseWrapper(JSContext*, JS::Handle<JSObject*>, void*, JSJitMethodCallArgs const&) /builds/worker/workspace/obj-build/dom/bindings/ReadableStreamBinding.cpp:696:13
#8 0x7fb75d5c498a in bool mozilla::dom::binding_detail::GenericMethod<mozilla::dom::binding_detail::NormalThisPolicy, mozilla::dom::binding_detail::ConvertExceptionsToPromises>(JSContext*, unsigned int, JS::Value*) /dom/bindings/BindingUtils.cpp:3271:13
#9 0x7fb7675c3d74 in CallJSNative /js/src/vm/Interpreter.cpp:420:13
#10 0x7fb7675c3d74 in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct, js::CallReason) /js/src/vm/Interpreter.cpp:507:12
#11 0x7fb7675b105e in InternalCall /js/src/vm/Interpreter.cpp:574:10
#12 0x7fb7675b105e in CallFromStack /js/src/vm/Interpreter.cpp:578:10
#13 0x7fb7675b105e in Interpret(JSContext*, js::RunState&) /js/src/vm/Interpreter.cpp:3314:16
#14 0x7fb767595be1 in js::RunScript(JSContext*, js::RunState&) /js/src/vm/Interpreter.cpp:389:13
#15 0x7fb7675c3eaf in js::InternalCallOrConstruct(JSContext*, JS::CallArgs const&, js::MaybeConstruct, js::CallReason) /js/src/vm/Interpreter.cpp:539:13
#16 0x7fb7675c5a3a in InternalCall /js/src/vm/Interpreter.cpp:574:10
#17 0x7fb7675c5a3a in js::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, js::AnyInvokeArgs const&, JS::MutableHandle<JS::Value>, js::CallReason) /js/src/vm/Interpreter.cpp:605:8
#18 0x7fb765d0215d in JS::Call(JSContext*, JS::Handle<JS::Value>, JS::Handle<JS::Value>, JS::HandleValueArray const&, JS::MutableHandle<JS::Value>) /js/src/vm/CallAndConstruct.cpp:117:10
#19 0x7fb75d1f1cb9 in mozilla::dom::EventListener::HandleEvent(mozilla::dom::BindingCallContext&, JS::Handle<JS::Value>, mozilla::dom::Event&, mozilla::ErrorResult&) /builds/worker/workspace/obj-build/dom/bindings/EventListenerBinding.cpp:62:8
#20 0x7fb75df7e3a4 in void mozilla::dom::EventListener::HandleEvent<mozilla::dom::EventTarget*>(mozilla::dom::EventTarget* const&, mozilla::dom::Event&, mozilla::ErrorResult&, char const*, mozilla::dom::CallbackObject::ExceptionHandling, JS::Realm*) /builds/worker/workspace/obj-build/dist/include/mozilla/dom/EventListenerBinding.h:65:12
#21 0x7fb75df7de60 in mozilla::EventListenerManager::HandleEventSubType(mozilla::EventListenerManager::Listener*, mozilla::dom::Event*, mozilla::dom::EventTarget*) /dom/events/EventListenerManager.cpp:1310:43
#22 0x7fb75df7f48f in mozilla::EventListenerManager::HandleEventInternal(nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event**, mozilla::dom::EventTarget*, nsEventStatus*, bool) /dom/events/EventListenerManager.cpp:1507:17
#23 0x7fb75df6d3be in mozilla::EventTargetChainItem::HandleEvent(mozilla::EventChainPostVisitor&, mozilla::ELMCreationDetector&) /dom/events/EventDispatcher.cpp:348:17
#24 0x7fb75df6bc31 in mozilla::EventTargetChainItem::HandleEventTargetChain(nsTArray<mozilla::EventTargetChainItem>&, mozilla::EventChainPostVisitor&, mozilla::EventDispatchingCallback*, mozilla::ELMCreationDetector&) /dom/events/EventDispatcher.cpp:550:16
#25 0x7fb75df6fe23 in mozilla::EventDispatcher::Dispatch(nsISupports*, nsPresContext*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsEventStatus*, mozilla::EventDispatchingCallback*, nsTArray<mozilla::dom::EventTarget*>*) /dom/events/EventDispatcher.cpp:1119:11
#26 0x7fb75df75bf9 in mozilla::EventDispatcher::DispatchDOMEvent(nsISupports*, mozilla::WidgetEvent*, mozilla::dom::Event*, nsPresContext*, nsEventStatus*) /dom/events/EventDispatcher.cpp
#27 0x7fb75b9febf4 in nsINode::DispatchEvent(mozilla::dom::Event&, mozilla::dom::CallerType, mozilla::ErrorResult&) /dom/base/nsINode.cpp:1354:17
#28 0x7fb75b333de7 in nsContentUtils::DispatchEvent(mozilla::dom::Document*, nsISupports*, nsTSubstring<char16_t> const&, mozilla::CanBubble, mozilla::Cancelable, mozilla::Composed, mozilla::Trusted, bool*, mozilla::ChromeOnlyDispatch) /dom/base/nsContentUtils.cpp:4350:28
#29 0x7fb75b333aae in nsContentUtils::DispatchTrustedEvent(mozilla::dom::Document*, nsISupports*, nsTSubstring<char16_t> const&, mozilla::CanBubble, mozilla::Cancelable, mozilla::Composed, bool*) /dom/base/nsContentUtils.cpp:4320:10
#30 0x7fb75b670256 in mozilla::dom::Document::DispatchContentLoadedEvents() /dom/base/Document.cpp:8023:3
#31 0x7fb75b76287d in applyImpl<mozilla::dom::Document, void (mozilla::dom::Document::*)()> /builds/worker/workspace/obj-build/dist/include/nsThreadUtils.h:1147:12
#32 0x7fb75b76287d in apply<mozilla::dom::Document, void (mozilla::dom::Document::*)()> /builds/worker/workspace/obj-build/dist/include/nsThreadUtils.h:1153:12
#33 0x7fb75b76287d in mozilla::detail::RunnableMethodImpl<mozilla::dom::Document*, void (mozilla::dom::Document::*)(), true, (mozilla::RunnableKind)0>::Run() /builds/worker/workspace/obj-build/dist/include/nsThreadUtils.h:1200:13
#34 0x7fb7585e53ff in mozilla::SchedulerGroup::Runnable::Run() /xpcom/threads/SchedulerGroup.cpp:140:20
#35 0x7fb758632172 in mozilla::RunnableTask::Run() /xpcom/threads/TaskController.cpp:467:16
#36 0x7fb7585f81c5 in mozilla::TaskController::DoExecuteNextTaskOnlyMainThreadInternal(mozilla::detail::BaseAutoLock<mozilla::Mutex&> const&) /xpcom/threads/TaskController.cpp:780:26
#37 0x7fb7585f5378 in mozilla::TaskController::ExecuteNextTaskOnlyMainThreadInternal(mozilla::detail::BaseAutoLock<mozilla::Mutex&> const&) /xpcom/threads/TaskController.cpp:612:15
SUMMARY: AddressSanitizer: heap-use-after-free /builds/worker/workspace/obj-build/dist/include/mozilla/RefPtr.h:286:27 in get
Shadow bytes around the buggy address:
0x0c0e80005360: fa fa 00 00 00 00 00 00 00 00 00 00 fa fa fa fa
0x0c0e80005370: 00 00 00 00 00 00 00 00 00 00 fa fa fa fa fd fd
0x0c0e80005380: fd fd fd fd fd fd fd fd fa fa fa fa fd fd fd fd
0x0c0e80005390: fd fd fd fd fd fa fa fa fa fa fd fd fd fd fd fd
0x0c0e800053a0: fd fd fd fd fa fa fa fa fd fd fd fd fd fd fd fd
=>0x0c0e800053b0: fd fa fa fa fa fa fd fd fd fd fd fd fd[fd]fd fd
0x0c0e800053c0: fa fa fa fa 00 00 00 00 00 00 00 00 00 fa fa fa
0x0c0e800053d0: fa fa 00 00 00 00 00 00 00 00 00 fa fa fa fa fa
0x0c0e800053e0: 00 00 00 00 00 00 00 00 04 fa fa fa fa fa fd fd
0x0c0e800053f0: fd fd fd fd fd fd fd fa fa fa fa fa fd fd fd fd
0x0c0e80005400: fd fd fd fd fd fa fa fa fa fa fd fd fd fd fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==1314891==ABORTING
```
|
|
1,768,475 | 15,891,402 |
Steps to reproduce:
Go to e.g. https://www.youtube.com
right click : Inspect Element ( Devtools - Inspector opens)
Inspector is filled with HTML Document.
Reload Website
Inspector is empty
(If you active the Browser-Cache under Network Panel, it loads correctly)
Actual results:
Inspector is when openend with deactivated Browsercache, after Reload empty.
Happens since Edition V 100 . Developer Edition.
Expected results:
See the HTML Structure
|
|
1,768,537 | 15,891,834 |
Under a CSP sandbox header directive without `allow-scripts`, the document shouldn't be able to run scripts. However, this can be bypassed using a `javascript:` URI with a suitable (i.e. script-capable, same-origin) target document.
### Proof of concept
`parent.html`:
```html
<iframe src="child.html"></iframe>
```
`child.html`:
```html
Content-Security-Policy: sandbox allow-same-origin allow-top-navigation
<noscript>no scripts allowed here</noscript>
<a href="javascript:alert(`origin=${origin} location=${location}`)" target="_parent">click me</a>
```
When the link is clicked, the script runs in the context of `parent.html`. As per `allow-top-navigation`, the child is allowed to *navigate* the parent, but not to execute scripts since its sandbox doesn't `allow-scripts`.
### Details
Since the *target* (`parent.html`) is itself allowed to run scripts, the relevant security check here is the verification that the sandbox flags of the *triggering* context allow scripts, too:
[`nsJSThunk::EvaluateScript() at nsJSProtocolHandler.cpp:238`](https://searchfox.org/mozilla-central/rev/3175fbb2342bfcdd5dcffed21a4c5a29dae1c61c/dom/jsurl/nsJSProtocolHandler.cpp#238)
```cpp
// Sandboxed document check: javascript: URI execution is disabled in a
// sandboxed document unless 'allow-scripts' was specified.
if ((targetDoc && !targetDoc->IsScriptEnabled()) ||
(loadInfo->GetTriggeringSandboxFlags() & SANDBOXED_SCRIPTS)) {
...
```
In the example, `loadInfo->GetTriggeringSandboxFlags() == 0`, thus the script is allowed.
My understanding is that the triggering sandbox flags are taken from the triggering BC (not the document):
[`nsDocShell::OnLinkClickSync() at nsDocShell.cpp:13004`](https://searchfox.org/mozilla-central/rev/3175fbb2342bfcdd5dcffed21a4c5a29dae1c61c/docshell/base/nsDocShell.cpp#13004)
```cpp
uint32_t triggeringSandboxFlags = 0;
if (mBrowsingContext) {
triggeringSandboxFlags = mBrowsingContext->GetSandboxFlags();
}
...
aLoadState->SetTriggeringSandboxFlags(triggeringSandboxFlags);
...
nsresult rv = InternalLoad(aLoadState);
```
However, the CSP sandbox header didn't change the sandbox flags of the BC:
```cpp
(gdb) b nsDocShell.cpp:13100
Thread 1 "Isolated Web Co" hit Breakpoint 1, nsDocShell::OnLinkClickSync (this=0x7f514773d400, aContent=0x7f5142609030, aLoadState=0x7f516e69b480, aNoOpenerImplied=false, aTriggeringPrincipal=0x7f514284d880) at /m-c/docshell/base/nsDocShell.cpp:13100
13100 aLoadState->SetTriggeringSandboxFlags(triggeringSandboxFlags);
(gdb) p GetDocument()->GetSandboxFlags()
$1 = 1048555
(gdb) p mBrowsingContext->GetSandboxFlags()
$2 = (const uint32_t &) @0x7f514a905b64: 0
(gdb) p triggeringSandboxFlags
$3 = 0
```
Note that if the sandbox isn't set by CSP header, but `<iframe sandbox="allow-same-origin allow-top-navigation">` instead, the issue doesn't occur. In that case, the sandbox flags on the document and BC are aligned, as expected:
```cpp
(gdb) b nsDocShell.cpp:13100
Thread 1 "Isolated Web Co" hit Breakpoint 1, nsDocShell::OnLinkClickSync (this=0x7f5147740000, aContent=0x7f5142609190, aLoadState=0x7f516e69b480, aNoOpenerImplied=false, aTriggeringPrincipal=0x7f514284d1a0) at /m-c/docshell/base/nsDocShell.cpp:13100
13100 aLoadState->SetTriggeringSandboxFlags(triggeringSandboxFlags);
(gdb) p GetDocument()->GetSandboxFlags()
$1 = 1048555
(gdb) p mBrowsingContext->GetSandboxFlags()
$2 = (const uint32_t &) @0x7f516e6d3164: 1048555
(gdb) p triggeringSandboxFlags
$3 = 1048555
```
(Here, the BC's sandbox flags were updated from `nsFrameLoader::ApplySandboxFlags()`.)
|
|
1,768,574 | 15,892,020 |
From github: https://github.com/mozilla-mobile/fenix/issues/24736.
> ### Steps to reproduce
>
> following very recent changes on push notification in fenix (notification click should finally open corresponding tab eg :.intagram )make today nightly crash .
> not all notifications in my case Instagram push notification on click crash the browser ,telegram 's one are OK (even though fail to open correct telegram chat)
>
> ### Expected behaviour
>
> browser should not crash
>
> ### Actual behaviour
>
> Fenix crash :
> log :
> java.lang.RuntimeException: Unable to start activity ComponentInfo{org.mozilla.fenix/org.mozilla.fenix.IntentReceiverActivity}: java.lang.NullPointerException: Attempt to invoke virtual method 'int java.lang.String.length()' on a null object reference
>
> ### Device name
>
> _No response_
>
> ### Android version
>
> android 11
>
> ### Firefox release type
>
> Firefox Nightly
>
> ### Firefox version
>
> 101
>
> ### Device logs
>
> java.lang.RuntimeException: Unable to start activity ComponentInfo{org.mozilla.fenix/org.mozilla.fenix.IntentReceiverActivity}: java.lang.NullPointerException: Attempt to invoke virtual method 'int java.lang.String.length()' on a null object reference
>
> ### Additional information
>
> _No response_
Change performed by the [Move to Bugzilla add-on](https://addons.mozilla.org/en-US/firefox/addon/move-to-bugzilla/).
|
|
1,703,482 | 15,348,600 |
**Affected versions**
* Firefox 89.0a1 (BuildId:20210406152948)
**Affected platforms**
* macOS 11
* macOS 10.15.7
**Unaffected platforms**
* Windows 10 64bit.
* Ubuntu 20.04
**Preconditions**
* Have the `widget.macos.native-context-menus` and the `browser.proton.enabled prefs` enabled.
* Enable VoiceOver.
**Steps to reproduce**
1. Launch Firefox.
2. Right click on any page, text link, image link, tab, bookmark, etc
3. Navigate through the available context menu options.
**Expected result**
* VoiceOver reads all the available context menu options.
**Actual result**
* VoiceOver doesn’t read the available context menu options.
**Regression Range**
* I don’t think that this is a regression.
**Notes**
* It seems that the address bar context menu is not affected.
* The following context menus are affected: Page context menu, text link context menu, image context menu, vide context menu, tabs context menu, bookmark toolbar context menu, bookmark context menu, input fields context menu, toolbar icon context menu
|
|
1,703,635 | 15,349,654 |
Created attachment 9214183
screenshot with the issue.png
**Affected versions**
* latest Nightly 89.a01
**Affected platforms**
* Win 10 x64
* macOS 10.15
* Ubuntu 18.04 x64
**Steps to reproduce**
1. Launch Firefox.
2. Go to reddit.com and click on the shield icon from the URL bar.
3. Inspect the protection panel.
**Expected result**
* The radio button width is bit bigger.
* The "Site not working?" link is underlined.
* "S" from "Protection Settings" is written with lower case. Same goes for "Protection Dashboard", "Tracking Content" etc. - please observe the figma specs.
* The borders that delimitates each section are not stretched to the entire panel's width. Per specs, it should be a couple of pixels left at each sides. For example, the first border below the Protection for <website> is correctly displayed.
**Actual result**
* Radio icon seems a bit smaller in width compared to the specs.
* The "Site not working?" link is not underlined.
* "S" from "Protection Settings" is not written with lower case. Same goes for "Protection Dashboard", "Tracking Content" etc. - please observe the figma specs.
* The borders that delimitates each section are stretched to the entire panel's width. Expect is the first border from the header, which is correctly displayed.
**Suggested Severity**
* S2, since the permission panel is not completely styled for proton.
**Regression range**
* Not a regression.
**Additional notes**
* please observe the attached sceenshots.
|
|
1,703,810 | 15,350,819 |
**Affected versions**
* Nightly 89.0a1
**Affected platforms**
* Windows 10
**Steps to reproduce**
1. Make sure to have dark theme enabled in Windows 10
2. Start Firefox
3. Go to about:preferences#search
4. Click the Default Search Engine dropdown
**Expected result**
* Items in the dropdown are visible and respect the dark theme set in the OS.
**Actual result**
* Dropdown is white and the items are also in white text, making them invisible. They are visible only when hovering over them or going through them using arrow keys.
**Regression range**
* First bad: 72593dfc1e16b16ef11770d9e01a970d0e116d6f
* Last good: a5a265c2b2a5fa906275ffb8a1910c3e734bc76b
* Pushlog: https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=a5a265c2b2a5fa906275ffb8a1910c3e734bc76b&tochange=72593dfc1e16b16ef11770d9e01a970d0e116d6f
* Potential regressor: Bug 1701493 - [Proton] The drop-down background of the select box in the extension inline options page is transparent.
**Additional notes**
* Screenshot showing the issue is attached.
* Having Light theme set in OS does not show this issue.
**Suggested severity**
* I would say this is S2 severity because none of the items inside dropdowns can be seen and this is a recent regression.
|
|
1,704,040 | 15,352,305 |
Created attachment 9214604
context.jpg
|
|
1,704,278 | 15,353,944 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:87.0) Gecko/20100101 Firefox/87.0
Steps to reproduce:
This will happen when api.executeCommand('toggleShareScreen'); is called in Jitsi meet IFrame API (https://jitsi.github.io/handbook/docs/dev-guide/dev-guide-iframe#togglesharescreen). The IFrame Jitsi is using has allow="camera; microphone; display-capture; autoplay; clipboard-write" set.
The API call is triggered during a click event.
Clicking inside the IFrame first and then calling the API does work.
Internally obtainScreenFromGetDisplayMedia is called (cf. https://github.com/jitsi/lib-jitsi-meet/blob/2a2405e93614efd43d4db62f51399f5a870a1615/modules/RTC/ScreenObtainer.js)
Actual results:
InvalidStateError: "getDisplayMedia must be called from a user gesture handler"
Expected results:
Call to getDisplayMedia is allowed because call is made following a click event and the iframe is using allow="display-capture".
|
|
1,705,091 | 15,361,059 |
**[Notes]:**
- On Windows 10 x64 (using the "NVDA" software) and Linux Mint 20 x64 (using the "Orca" software) the "Primary" and the "Secondary" buttons are successfully recognized by the screen reader software if the "Tab" key is pressed.
**[Affected versions]:**
- Firefox 89.0a1 - Build ID: 20210414093129
**[Affected Platforms]:**
- Windows 10 x64
- macOS 10.15.7
- Linux Mint 20 x64
**[Prerequisites]:**
- Have a new Firefox profile.
- Have a screen reader software installed and turned on.
**[Steps to reproduce]:**
1. Open the browser and navigate to the "about:config" page.
2. Set the "browser.startup.homepage_override.mstone" pref to "88.0".
3. Restart the browser and observe the behavior.
**[Expected result]:**
- All the elements from the existing/updating user's "Onboarding" modal are successfully recognized by the screen reader software.
**[Actual result]:**
- The elements from the existing/updating user's "Onboarding" modal are not accessible through the screen reader software.
**[Additional Notes]:**
- On Windows using the "NVDA" software, the text strings are recognized at mouse hover.
- On macOS, the page behind the “Onboarding” modal is recognized and read by the “VoiceOver” software after the browser update.
- Also, this issue is not reproducible with the new user “Onboarding”. On this page, all the elements are successfully recognized by the screen reader software.
|
|
1,705,334 | 15,362,514 |
Created attachment 9216029
rec of the issue.gif
**[Affected versions]:**
- Firefox 89.0a1 - Build ID: 20210414160838
**[Affected Platforms]:**
- Windows 10 x64
- macOS 10.15.7
- Linux Mint 20 x64
**[Prerequisites]:**
- Have a new Firefox profile.
**[Steps to reproduce]:**
1. Open the browser with the profile from prerequisites and navigate to the "about:config" page.
2. Set the "browser.startup.homepage_override.mstone" pref to "88.0" and restart the browser.
3. Press the "Alt+F4" keys (Cmd+Q on macOS) and observe the behavior.
**[Expected result]:**
- The "Close tabs and exit?" confirmation message is triggered and visible.
**[Actual result]:**
- The "Close tabs and exit?" confirmation message is NOT visible.
**[Additional Notes]:**
- If the existing/updating users "Onboarding" modal is dismissed the "Close tabs and exit?" confirmation message becomes visible.
- Attached a screen recording of the issue.
|
|
1,702,001 | 15,337,424 |
Steps to reproduce:
1. Set `dom.security.https_only_mode` to true
2. Navigate to http://careers.aliceapp.com/apply/haxr79rjWf/Director-Of-Product?source=LILI#haxr79rjWf
3. Click "Continue to HTTP Site"
What happens:
Nothing. Page is not navigated to.
Expected result:
Page is navigated to.
5:10.15 INFO: Narrowed integration regression window from [098c3172, f40c23dc] (3 builds) to [098c3172, 5648a425] (2 builds) (~1 steps left)
5:10.15 INFO: No more integration revisions, bisection finished.
5:10.15 INFO: Last good revision: 098c3172afae38b129ae08e1586499f698a816f3
5:10.15 INFO: First bad revision: 5648a4254bca91c97b2ae625cf06270f1fc0ff8d
5:10.15 INFO: Pushlog:
https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=098c3172afae38b129ae08e1586499f698a816f3&tochange=5648a4254bca91c97b2ae625cf06270f1fc0ff8d
|
|
1,702,086 | 15,338,103 |
Crash report: https://crash-stats.mozilla.org/report/index/87dd4fbb-2c1c-4687-836a-309020210330
Reason: ```EXCEPTION_ACCESS_VIOLATION_READ```
Top frames of crashing thread:
```
0 xul.dll static SharedLibraryInfo::GetInfoForSelf tools/profiler/core/shared-libraries-win32.cc:209
1 xul.dll mozilla::Telemetry::BatchProcessedStackGenerator::BatchProcessedStackGenerator toolkit/components/telemetry/other/ProcessedStack.cpp:72
2 xul.dll mozilla::UntrustedModulesProcessor::CompleteProcessing toolkit/xre/UntrustedModulesProcessor.cpp:862
3 xul.dll mozilla::MozPromise<mozilla::Maybe<mozilla::UntrustedModulesProcessor::ModulesMapResultWithLoads>, nsresult, 1>::ThenValue<`lambda at /builds/worker/checkouts/gecko/toolkit/xre/UntrustedModulesProcessor.cpp:548:9', `lambda at /builds/worker/checkouts/gecko/toolkit/xre/UntrustedModulesProcessor.cpp:557:9'>::DoResolveOrRejectInternal xpcom/threads/MozPromise.h:846
4 xul.dll mozilla::MozPromise<RefPtr<mozilla::AllocPolicy::Token>, bool, 1>::ThenValueBase::ResolveOrRejectRunnable::Run xpcom/threads/MozPromise.h:487
```
The crash happened because the module was unloaded while running `GetPdbInfo`. It seems that calling `LoadLibraryEx` does not contribute to locking the module loaded.
```
0:010> .excr
rax=00007ffc35faa560 rbx=0000000000000000 rcx=00007ffc50e8d074
rdx=0000000000000000 rsi=00007ffc35e80000 rdi=000000f9a35be960
rip=00007ffc18f0fc68 rsp=000000f9a35be790 rbp=00007ffc35e80000
r8=000000f9a35be748 r9=000000000000003f r10=0000000000000000
r11=0000000000000246 r12=ffffffffffffffff r13=0003001100000000
r14=000000f9a35bec40 r15=000000f9a35be870
iopl=0 nv up ei pl nz na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206
xul!GetPdbInfo+0x43 [inlined in xul!SharedLibraryInfo::GetInfoForSelf+0x398]:
00007ffc`18f0fc68 83780c02 cmp dword ptr [rax+0Ch],2 ds:00007ffc`35faa56c=????????
Unloaded modules that overlapped the address in the past:
Base Address End Address Size
7ffc`35e80000 7ffc`35fcd000 0`0014d000 msvp9dec_store.dll
```
|
|
1,702,133 | 15,338,305 |
[Tracking Requested - why for this release]:
Crash when user has disabled remote canvas.
Crash report: https://crash-stats.mozilla.org/report/index/c188b534-2c43-4ea8-860a-76fd80210331
Reason: ```EXCEPTION_ACCESS_VIOLATION_READ```
Top 10 frames of crashing thread:
```
0 xul.dll mozilla::gfx::AutoSerializeWithMoz2D::AutoSerializeWithMoz2D gfx/2d/Factory.cpp:795
1 xul.dll static mozilla::layers::D3D11TextureData::Create gfx/layers/d3d11/TextureD3D11.cpp:506
2 xul.dll static mozilla::layers::D3D11TextureData::Create gfx/layers/d3d11/TextureD3D11.cpp:416
3 xul.dll mozilla::layers::D3D11TextureClientAllocationHelper::Allocate gfx/layers/D3D11ShareHandleImage.cpp:116
4 xul.dll mozilla::layers::TextureClientRecycleAllocator::CreateOrRecycle gfx/layers/client/TextureClientRecycleAllocator.cpp:171
5 xul.dll mozilla::layers::D3D11RecycleAllocator::CreateOrRecycleClient gfx/layers/D3D11ShareHandleImage.cpp:183
6 xul.dll mozilla::layers::D3D11ShareHandleImage::AllocateTexture gfx/layers/D3D11ShareHandleImage.cpp:39
7 xul.dll mozilla::D3D11DXVA2Manager::CopyToImage dom/media/platforms/wmf/DXVA2Manager.cpp:875
8 xul.dll mozilla::WMFVideoMFTManager::CreateD3DVideoFrame dom/media/platforms/wmf/WMFVideoMFTManager.cpp:662
9 xul.dll mozilla::WMFVideoMFTManager::Output dom/media/platforms/wmf/WMFVideoMFTManager.cpp:794
```
|
|
1,702,948 | 15,344,836 |
Ghost functions (functions inside arrow function's parameter expression, and parsed twice, and its first stencil) shouldn't be exposed to debugger,
in order to avoid delazifying it.
|
|
1,703,476 | 15,348,509 |
Created attachment 9214020
permission 1.png
**Affected versions**
* Firefox 89.0a1
**Affected platforms**
* Windows 10 x64
* Ubuntu 18.04 x64
* macOS 10.15
**Precondition**
The following prefs are set to true in about:config:
- browser.proton.enabled
- browser.proton.doorhangers.enabled (for preliminary testing this also required, until the work is moved to the main pref)
**Steps to reproduce**
1. Go to https://permission.site/.
2. Click on the "Location" button.
3. Click on the "Allow" button.
4. Click on the site permission icon.
**Expected result**
* There is no arrow before "Last access..."
* The "Last access..." string is smaller than the "Access your location" string.
* The Allowed/Blocked string is inside a grey rectangle.
**Actual result**
* There is an arrow before "Last access..."
* The "Last access..." string is too big.
* The Allowed/Blocked string is not inside a grey rectangle.
**Regression range**
* This is not a regression.
**Additional notes**
* Please look at the attached image. This is the one from the specs.
|
|
1,691,813 | 15,257,604 |
Reproducible: always
Steps to reproduce:
0. Activate acceciblity tools such as ATOK(Japanese IME) insights
1. Enabe "Restore previous session" from about:preferences
2. Open https://ftp.mozilla.org/pub/firefox/nightly/2021/01/
3. Right click on the page, Choose "View Page Source"
4. Quit beowser
5. Start the browser
6-1. Right click so that context menu will appear
6-2. Click elsewhere to hide the context
6-3. Scroll 50-100px
7. Repeat step 6-1 to step 6-3 several times
--- browser does not hang as expected --- browser get hang up for long period. BUG!
Profiler log: https://share.firefox.dev/3p2ECcV
|
|
1,692,734 | 15,263,877 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:87.0) Gecko/20100101 Firefox/87.0
Steps to reproduce:
Mozregression, single build, mozilla-central, 2021-02-13 (20210213214236). Options -> search for dns, enable DoH (either provider, although more consistent with Cloudflare). Then load a youtube video (I've been using https://www.youtube.com/watch?v=LfI8sxSFtuE to test).
Actual results:
The site (and subsequently sometimes the video itself) take 20-50s to load.
Expected results:
Not taking that long to load. From my limited testing, it only happens with DoH enabled, and not on all websites or all the time. Bugzilla for example loads as usual most of the time, except user avatars sometimes are slow. Mozregression pointed me to bug #1690615 as the culprit.
I've also captured a performance profile: https://share.firefox.dev/3tZBYZ0
|
|
1,692,736 | 15,263,889 |
Created attachment 9203098
test-case.html
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.16; rv:85.0) Gecko/20100101 Firefox/85.0
Steps to reproduce:
https://jazzy-placid-sunspot.glitch.me/
Display an animated gif on the page and draw on a canvas every frame at the same time.
Actual results:
The gif animation stutters, it only animates sometimes when the full page is rerendered (e.g after a scroll or a window resize).
Expected results:
The gif should still animate smoothly.
Running mozregression points to [this pushlog](https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=e2e967977e4bc5f9da2bc35f18c6bec772ae1760&tochange=f0e9e8ac401cb01ae412bf6fd098562892136456), hence asking to [email protected] if they can have a look, since it seems bug1691065 is gonna land soon.
|
|
1,693,778 | 15,272,929 |
Created attachment 9204178
Screenshot
STR:
1. Latest Nightly, `intl.uidirection` set to `1` (or `intl.l10n.pseudo` set to `bidi`)
2. Type anything in the urlbar
AR:
The page name is on the right (good), but the url itself is aligned to the left (bad)
ER:
Both should be aligned to the right, while the URL itself is LTR.
|
|
1,699,680 | 15,318,901 |
Steps to reproduce:
1. Launch Firefox Nightly
2. View any page (e.g. mozilla.org)
3. Launch Accerciser and examine the interfaces implemented by the document
Expected results: Text would be implemented.
Actual results: Text is not implemented.
Impact: Orca relies upon the text interface for many things including. This breaks (at least) searching for the caret location on a newly-loaded page. My guess is that it breaks other things too....
|
|
1,699,703 | 15,318,994 |
Created attachment 9210279
search engine 87 remote settings.gif
**[Notes]:**
- This issue also affects the Sponsored Top Sites experiments. In that case, the search tiles are also generated by clicks on the Sponsored Top Site.
**[Affected versions]:**
- Firefox Beta 87.0 RC (Build ID: 20210310152336)
- Firefox Nightly 88.0a1 (Build ID: 20210318213531)
**[Affected Platforms]:**
- Windows 10
- Linux Mint 20
- macOS 10.15
**[Prerequisites]:**
- Have Firefox 87 open.
- Have `browser.search.region` set to `US`.
**[Steps to reproduce]:**
1. Open a new tab using Firefox.
2. Click the @amazon search tile.
3. Use @amazon to make a search.
4. Repeat steps 2 and 3 several times.
5. On a New Tab page, dismiss the Amazon search engine tile and any that take its place.
6. Observe the behavior of the tile.
**[Expected result]:**
- The Amazon tile is dismissed.
**[Actual result]:**
- Another search engine tile takes its place.
- If dismissed, another search tile takes its place.
- Each additional search tile is created by the number of searches performed.
**[Additional Notes]:**
- This issue is different on Firefox 86 with Remote Settings Top Sites turned on (browser.topsites.useRemoteSetting set to true), where URL tiles are generated as seen in [this recording](https://drive.google.com/file/d/1EMs8k60pFkHqJtapXOWEo7RU6X52TP0f/view?usp=sharing).
- From discussions on Slack, the different behavior seen on version 86 and 87 was probably introduced by the fix to bug 1696187.
- I am also linking to the [behavior seen in the non-remote settings version](https://drive.google.com/file/d/1aJtD55IKkAbJW5Ktz7NZCgzRJ5RGsawV/view?usp=sharing).
- Attached is a recording of the issue.
|
|
1,700,101 | 15,323,322 |
Created attachment 9210761
LibraryMenu.gif
**Affected versions**
* latest Nightly 88.0a1
*Preconditions*
- Have around 30 sites populated in History.
- Library icon (from Customize page) is dragged & dropped into toolbar.
**Affected platforms**
* Windows 10 x64
**Steps to reproduce**
1. Click on the Library icon from the toolbar.
2. Click on the History option.
3. Rapidly close the panel via "<" button from the sub panel.
4. Repeat steps 2 and 3, if the issue is not reproduced instantly.
**Expected result**
* The Library panel is correctly displayed.
**Actual result**
* The Library panel is broken.
**Suggested Severity**
* S2, since this is a regression.
**Regression range**
- changeset: 97565326ca40d150f65bae3acf92178851180ca1
- pushlog_url: https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=97565326ca40d150f65bae3acf92178851180ca1&tochange=0c5f0b28261bfe990f6e3bc71fd57d1a32e69082
* Potential regressor: Bug 1697040
**Additional notes**
* it seems that this issue is Windows specific. I cannot reproduce it on Ubuntu nor macOS.
* please see the attached screencast.
* I can also reproduce this with `browser.proton.enabled` set to false.
|
|
1,700,308 | 15,324,908 |
Created attachment 9210981
ss of the issue.png
**[Affected versions]:**
- Firefox 87.0 - Build ID: 20210318103112
**[Affected Platforms]:**
- Windows 10 x64
**[Prerequisites]:**
- Have this [user.js](https://drive.google.com/file/d/1-PUpWIm6JYwiHZhFERQiVEZVmeqwnMlf/view?usp=sharing) saved to your PC.
- Have the "app.update.channel" set to "release".
**[Steps to reproduce]:**
1. Create a new profile but do not open the browser.
2. Go to the profile folder and paste the "user.js" from prerequisites.
3. Open the browser with the profile from prerequisites using the "--first-startup" argument.
4. Observe the first slide of the "about:welcome" page.
**[Expected result]:**
- The "Pin Firefox to your taskbar" slide contains the following elements:
- The "Have an account? Sign in" test string, with the "Sign in" hyperlinked, is displayed in the top-right part of the page.
- The Firefox logo is displayed in the middle-top part of the page.
- The "Pin Firefox to your taskbar" title is displayed on black bolded characters under the Firefox logo.
- The "Speed, safety, and privacy every time you browse." text string written in grey characters is displayed under the title.
- An image describing the pin to taskbar process is displayed under the description.
- A blue button with the "Pin to Taskbar" label written in white is displayed under the "pin-illustration" image.
- The "Not now" hyperlink is displayed under the button.
**[Actual result]:**
- The "pin-illustration" image is no longer displayed and the "Pin" label is wrongly displayed on the primary button instead of the "Pin to Taskbar" one.
**[Additional Notes]:**
- This issue is also reproducible on the "Treatment B" branch.
- This issue is not reproducible with the old experiment setup from the "Remote Settings - Stage" server.
- Attached a screenshot of the issue.
@Ed, could you please take a look over this issue?
|
|
1,700,929 | 15,328,687 |
- Open Bookmarks Sidebar (Ctrl+B)
- Select multiple tabs while holding Ctrl
- Right click
- "Open all in tabs" context menu is missing.
|
|
1,701,190 | 15,330,356 |
This hit rarely before but more frequent since March 18/19 (Firefox 88.0a1)
Crash report: https://crash-stats.mozilla.org/report/index/2131b145-b312-4cff-b16f-f19750210326
Reason: ```EXCEPTION_ACCESS_VIOLATION_READ```
Top 10 frames of crashing thread:
```
0 xul.dll mozilla::dom::WorkerDebugger::ReportPerformanceInfo dom/workers/WorkerDebugger.cpp:512
1 xul.dll mozilla::CollectPerformanceInfo toolkit/components/perfmonitoring/PerformanceUtils.cpp:38
2 xul.dll mozilla::dom::ContentChild::RecvRequestPerformanceMetrics dom/ipc/ContentChild.cpp:1453
3 xul.dll mozilla::dom::PContentChild::OnMessageReceived ipc/ipdl/PContentChild.cpp:9168
4 xul.dll mozilla::ipc::MessageChannel::DispatchMessage ipc/glue/MessageChannel.cpp:2078
5 xul.dll mozilla::TaskController::DoExecuteNextTaskOnlyMainThreadInternal xpcom/threads/TaskController.cpp:754
6 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1155
7 xul.dll mozilla::ipc::MessagePump::Run ipc/glue/MessagePump.cpp:109
8 xul.dll MessageLoop::RunHandler ipc/chromium/src/base/message_loop.cc:328
9 xul.dll MessageLoop::Run ipc/chromium/src/base/message_loop.cc:310
```
|
|
1,696,794 | 15,296,445 |
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:88.0) Gecko/20100101 Firefox/88.0
Steps to reproduce:
I record 10 seconds of audio , and read it
Actual results:
At the play , I have only 3 seconds of sound
Expected results:
I should have 10 seconds of audio on playing the audio.
Same code works on Firefox and chromium , but not on Nightly ...
|
|
1,697,249 | 15,301,394 |
This was initially reported in https://github.com/webcompat/web-bugs/issues/67604
Steps to reproduce:
1. Log in to your LinkedIn account and proceed to https://www.linkedin.com/feed/ in Firefox Nightly 88.0a1 / Firefox release
2. Under any post press "Comment" button to display contenteditable box
3. Type "@" to trigger autocomplete with your friends list
4. Select any friend from the list to "mention" them and press Space
5. Type any message and observe the text
Actual:
Text is bold as it's a part of the mention
Expected:
Text is in normal font
This behavior results in an error when trying to post the comment. There is a video recorder by the initial reporter https://www.youtube.com/watch?v=cO-ojh7whKo
From mozregression:
```
27:02.96 INFO: Narrowed integration regression window from [687d3f79, c5fb8455] (3 builds) to [bd0fd84d, c5fb8455] (2 builds) (~1 steps left)
27:02.96 INFO: No more integration revisions, bisection finished.
27:02.96 INFO: Last good revision: bd0fd84dbf437b7f0cddacd51520176c6f4dec2e
27:02.96 INFO: First bad revision: c5fb8455ae1a6a29bb7d1d9c093f5ca48e294f5d
27:02.96 INFO: Pushlog:
https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=bd0fd84dbf437b7f0cddacd51520176c6f4dec2e&tochange=c5fb8455ae1a6a29bb7d1d9c093f5ca48e294f5d
```
|
|
1,697,476 | 15,302,864 |
Created attachment 9208083
memory-report.json.gz
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.182 Safari/537.36 OPR/74.0.3911.203
Steps to reproduce:
Visit either :
- https://demo.castlabs.com/v6/6.0.0-EAB-2/#/player?cfg=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%3D
- https://codepen.io/JordanKinow/pen/eYdaZaz
on Windows and playback the video during 1h~1h30.
Actual results:
After 1h~1h30 of playback. The video stops/freeze.
The following error can be see in the console :
NS_ERROR_OUT_OF_MEMORY
I've attached a memory report retrieved with about:memory tool
Expected results:
The playback of the video should continue smoothly withtout the NS_ERROR_OUT_OF_MEMORY error.
|
|
1,698,024 | 15,306,354 |
Created attachment 9208637
Image showing the issue
**Affected versions**
* Latest Nightly 88.0a1
**Unaffected versions**
* Firefox 86.0.1
* Firefox 87.0b9
**Affected platforms**
* Windows 7 64bit
* Windows 10 64bit
* macOS 10.15
* Ubuntu 20.04
**Steps to reproduce**
1. Start Firefox
2. Login to a Firefox account that has more then 1 device connected to it (I used one with 3 and 30 devices)
3. Right click any tab (except about: pages)
4. Click `Send Tab to Device`
**Expected result**
* Devices connected are displayed along with `Send to All Devices... and Manage Devices...`.
**Actual result**
* `Send to All Devices... and Manage Devices...` options are missing from context menu.
**Regression range**
* First bad: 403ffdf9b6fb1d2be503cfb0feddae5faa3b85b7
* Last good: 73633f8e0e5860e4801288251decf1eaa6759b27
* Pushlog: https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=cffeff2a28032c57f5d43a8293814d4cedbbc804&tochange=b422dd886e036907f35269f381f43785873c5296
* Potential regressor: Bug 1690131: create proton-specific fxa menu
**Additional notes**
* Screenshot showing the issue attached.
**Suggested severity**
* I would mark this an S2 because items in menus are missing.
|
|
1,698,307 | 15,308,264 |
¡Hola!
I can't join any Discord server with Firefox Nightly.
Here's the output of the console when trying to join
https://discord.com/channels/696139060561051688/696139060561051691
Please let me know if there's anything further needed from the affected profile.
The messages start to repeat over and over.
¡Gracias!
Alex
23:11:18.658 Navigated to https://discord.com/channels/696139060561051688/696139060561051691
23:11:18.730 [GatewaySocket] [WS CLOSED] (true, 1006, ) retrying in 2.97 seconds. 31296b03bdb291fe6072.js:2:126313
23:11:18.814 Content Security Policy: Ignoring “'unsafe-inline'” within script-src or style-src: nonce-source or hash-source specified
23:11:19.798 Content Security Policy: The page’s settings blocked the loading of a resource at inline (“script-src”). onloadwff.js:71:790852
23:11:20.423 [FAST CONNECT] wss://gateway.discord.gg/?encoding=json&v=8&compress=zlib-stream, encoding: json, version: 8 696139060561051691:47:334
23:11:20.549 unreachable code after return statement 2276137a5d7df04f45db.js:2:2904464
23:11:20.549 unreachable code after return statement 2276137a5d7df04f45db.js:2:2904513
23:11:20.778 [Logger.tsx] Logger has loaded 31296b03bdb291fe6072.js:2:126313
23:11:20.969 Cookie “locale” has “SameSite” policy set to “Lax” because it is missing a “SameSite” attribute, and “SameSite=Lax” is the default value for this attribute. 2276137a5d7df04f45db.js:2:1440047
23:11:21.214 unreachable code after return statement 2276137a5d7df04f45db.js:2:2904464
23:11:21.221 unreachable code after return statement 2276137a5d7df04f45db.js:2:2904513
23:11:21.595 [default] [BUILD INFO] Release Channel: stable, Build Number: 79478, Version Hash: b329d0aea41807066b25c73e2feca0f3ef4baa5b 31296b03bdb291fe6072.js:2:126313
23:11:22.424 [Flux] Slow batch emitChanges took 178ms recentActions: EXPERIMENT_REGISTER_LEGACY -> I18N_LOAD_START -> STREAMING_UPDATE -> ACCESSIBILITY_SYSTEM_PREFERS_REDUCED_MOTION_CHANGED -> I18N_LOAD_SUCCESS 31296b03bdb291fe6072.js:2:126313
23:11:22.426 [Flux] Slow dispatch on I18N_LOAD_SUCCESS: 185ms 31296b03bdb291fe6072.js:2:126313
23:11:22.643 Source map error: Error: request failed with status 404
Resource URL: https://discord.com/assets/31296b03bdb291fe6072.js
Source Map URL: 31296b03bdb291fe6072.js.map
23:11:22.709 Source map error: Error: request failed with status 404
Resource URL: https://discord.com/assets/2276137a5d7df04f45db.js
Source Map URL: 2276137a5d7df04f45db.js.map
23:11:26.533 [GatewaySocket] Connected, current state is 0 31296b03bdb291fe6072.js:2:126313
23:11:26.537 [GatewayDiscovery] [STICKY] wss://gateway.discord.gg 31296b03bdb291fe6072.js:2:126313
23:11:26.628 [GatewaySocket] [CONNECT] wss://gateway.discord.gg, encoding: json, version: 8, compression: zlib-stream 31296b03bdb291fe6072.js:2:126313
23:11:46.645 [GatewaySocket] [WS CLOSED] (false, 0, The connection timed out after 20014 ms - did not receive OP_HELLO in time.) retrying in 2.76 seconds. 31296b03bdb291fe6072.js:2:126313
23:11:49.406 [GatewayDiscovery] [STICKY] wss://gateway.discord.gg 31296b03bdb291fe6072.js:2:126313
23:11:49.408 [GatewaySocket] [CONNECT] wss://gateway.discord.gg, encoding: json, version: 8, compression: zlib-stream 31296b03bdb291fe6072.js:2:126313
23:11:52.205 Content Security Policy: Ignoring “'unsafe-inline'” within script-src or style-src: nonce-source or hash-source specified
23:12:09.414 [GatewaySocket] [WS CLOSED] (false, 0, The connection timed out after 20004 ms - did not receive OP_HELLO in time.) retrying in 2.91 seconds. 31296b03bdb291fe6072.js:2:126313
23:12:12.202 Firefox can’t establish a connection to the server at wss://gateway.discord.gg/?encoding=json&v=8&compress=zlib-stream. 696139060561051691:47:396
23:12:12.335 [GatewayDiscovery] [STICKY] wss://gateway.discord.gg 31296b03bdb291fe6072.js:2:126313
23:12:12.337 [GatewaySocket] [CONNECT] wss://gateway.discord.gg, encoding: json, version: 8, compression: zlib-stream 31296b03bdb291fe6072.js:2:126313
23:12:32.346 [GatewaySocket] [WS CLOSED] (false, 0, The connection timed out after 20005 ms - did not receive OP_HELLO in time.) retrying in 5.24 seconds. 31296b03bdb291fe6072.js:2:126313
23:12:37.584 [GatewayDiscovery] [STICKY] wss://gateway.discord.gg 31296b03bdb291fe6072.js:2:126313
23:12:37.586 [GatewaySocket] [CONNECT] wss://gateway.discord.gg, encoding: json, version: 8, compression: zlib-stream 31296b03bdb291fe6072.js:2:126313
23:12:57.604 [GatewaySocket] [WS CLOSED] (false, 0, The connection timed out after 20015 ms - did not receive OP_HELLO in time.) retrying in 12.21 seconds. 31296b03bdb291fe6072.js:2:126313
23:13:09.823 [GatewayDiscovery] [STICKY] wss://gateway.discord.gg 31296b03bdb291fe6072.js:2:126313
23:13:09.824 [GatewaySocket] [CONNECT] wss://gateway.discord.gg, encoding: json, version: 8, compression: zlib-stream 31296b03bdb291fe6072.js:2:126313
23:13:12.206 Content Security Policy: Ignoring “'unsafe-inline'” within script-src or style-src: nonce-source or hash-source specified
23:13:29.829 [GatewaySocket] [WS CLOSED] (false, 0, The connection timed out after 20003 ms - did not receive OP_HELLO in time.) retrying in 34.31 seconds. 31296b03bdb291fe6072.js:2:126313
23:13:29.830 [GatewaySocket] [RESET] (false, 0, The connection timed out after 20003 ms - did not receive OP_HELLO in time.) 31296b03bdb291fe6072.js:2:126313
23:13:29.839 [AuthenticationStore] handleConnectionClosed called with code 0.
Object { tokenManagerHasToken: true, storageHasToken: false }
31296b03bdb291fe6072.js:2:126313
23:13:32.209 Firefox can’t establish a connection to the server at wss://gateway.discord.gg/?encoding=json&v=8&compress=zlib-stream. 2276137a5d7df04f45db.js:2:3634847
23:14:04.139 [GatewayDiscovery] [DISCOVERING] 31296b03bdb291fe6072.js:2:126313
23:14:04.246 [GatewayDiscovery] [DISCOVERED] wss://gateway.discord.gg 31296b03bdb291fe6072.js:2:126313
23:14:04.247 [GatewaySocket] [CONNECT] wss://gateway.discord.gg, encoding: json, version: 8, compression: zlib-stream 31296b03bdb291fe6072.js:2:126313
23:14:24.262 [GatewaySocket] [WS CLOSED] (false, 0, The connection timed out after 20007 ms - did not receive OP_HELLO in time.) retrying in 60.00 seconds. 31296b03bdb291fe6072.js:2:126313
23:14:24.263 [GatewaySocket] [RESET] (false, 0, The connection timed out after 20007 ms - did not receive OP_HELLO in time.) 31296b03bdb291fe6072.js:2:126313
23:14:24.264 [AuthenticationStore] handleConnectionClosed called with code 0.
Object { tokenManagerHasToken: true, storageHasToken: false }
31296b03bdb291fe6072.js:2:126313
23:14:32.225 Content Security Policy: Ignoring “'unsafe-inline'” within script-src or style-src: nonce-source or hash-source specified
23:14:32.267 Firefox can’t establish a connection to the server at wss://gateway.discord.gg/?encoding=json&v=8&compress=zlib-stream. 2276137a5d7df04f45db.js:2:3634847
23:15:24.816 [GatewayDiscovery] [DISCOVERING] 31296b03bdb291fe6072.js:2:126313
23:15:24.902 [GatewayDiscovery] [DISCOVERED] wss://gateway.discord.gg 31296b03bdb291fe6072.js:2:126313
23:15:24.903 [GatewaySocket] [CONNECT] wss://gateway.discord.gg, encoding: json, version: 8, compression: zlib-stream 31296b03bdb291fe6072.js:2:126313
23:15:32.267 Content Security Policy: Ignoring “'unsafe-inline'” within script-src or style-src: nonce-source or hash-source specified
23:15:32.314 Firefox can’t establish a connection to the server at wss://gateway.discord.gg/?encoding=json&v=8&compress=zlib-stream. 2276137a5d7df04f45db.js:2:3634847
23:15:45.041 [GatewaySocket] [WS CLOSED] (false, 0, The connection timed out after 20136 ms - did not receive OP_HELLO in time.) retrying in 60.00 seconds. 31296b03bdb291fe6072.js:2:126313
23:15:45.041 [GatewaySocket] [RESET] (false, 0, The connection timed out after 20136 ms - did not receive OP_HELLO in time.) 31296b03bdb291fe6072.js:2:126313
23:15:45.042 [AuthenticationStore] handleConnectionClosed called with code 0.
Object { tokenManagerHasToken: true, storageHasToken: false }
31296b03bdb291fe6072.js:2:126313
23:16:32.319 Content Security Policy: Ignoring “'unsafe-inline'” within script-src or style-src: nonce-source or hash-source specified
23:16:32.359 Firefox can’t establish a connection to the server at wss://gateway.discord.gg/?encoding=json&v=8&compress=zlib-stream. 2276137a5d7df04f45db.js:2:3634847
23:16:45.053 [GatewayDiscovery] [DISCOVERING] 31296b03bdb291fe6072.js:2:126313
23:16:45.155 [GatewayDiscovery] [DISCOVERED] wss://gateway.discord.gg 31296b03bdb291fe6072.js:2:126313
23:16:45.156 [GatewaySocket] [CONNECT] wss://gateway.discord.gg, encoding: json, version: 8, compression: zlib-stream 31296b03bdb291fe6072.js:2:126313
23:17:05.292 [GatewaySocket] [WS CLOSED] (false, 0, The connection timed out after 20132 ms - did not receive OP_HELLO in time.) retrying in 60.00 seconds. 31296b03bdb291fe6072.js:2:126313
23:17:05.294 [GatewaySocket] [RESET] (false, 0, The connection timed out after 20132 ms - did not receive OP_HELLO in time.) 31296b03bdb291fe6072.js:2:126313
23:17:05.296 [AuthenticationStore] handleConnectionClosed called with code 0.
Object { tokenManagerHasToken: true, storageHasToken: false }
31296b03bdb291fe6072.js:2:126313
23:17:32.361 Content Security Policy: Ignoring “'unsafe-inline'” within script-src or style-src: nonce-source or hash-source specified
23:17:32.393 Firefox can’t establish a connection to the server at wss://gateway.discord.gg/?encoding=json&v=8&compress=zlib-stream. 2276137a5d7df04f45db.js:2:3634847
23:18:05.732 [GatewayDiscovery] [DISCOVERING] 31296b03bdb291fe6072.js:2:126313
|
|
1,698,353 | 15,308,435 |
Created attachment 9208956
7udh6AB0TF.mp4
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:86.0) Gecko/20100101 Firefox/86.0
Steps to reproduce:
1) Install https://addons.mozilla.org/firefox/addon/yahoo-mail-notifier-we/
2) Go to options page and check "Show mail preview window"
3) Click on the mail icon in the toolbar menu
Actual results:
See attached video.
Expected results:
Should load normal.
|
|
1,698,556 | 15,311,450 |
Created attachment 9209165
rec of the issue.gif
**[Affected versions]:**
- Firefox Beta 87.0b9 - Build ID: 20210311161514
**[Affected Platforms]:**
- Windows 10 x64
**[Prerequisites]:**
- Have this [user.js](https://drive.google.com/file/d/1tG01VbQIOhf_2m9KSc_F7314tKehEDVM/view?usp=sharing) saved to your PC.
**[Steps to reproduce]:**
1. Create a new profile but do not open the browser.
2. Go to the profile folder and paste the "user.js" from prerequisites.
3. Open the browser with the profile from prerequisites using the "--first-startup" argument.
4. Navigate to the "about:telemetry" page.
5. Observe the telemetry pings specific to the experiment in test.
**[Expected result]:**
- An "expose" ping specific to the "Pin Firefox to Taskbar During Onboarding" experiment is displayed.
**[Actual result]:**
- There are no "expose" telemetry pings displayed at all.
**[Additional Notes]:**
- Attached a screen recording of the issue.
@Ed, could you please take a look over this issue?
|
|
1,699,647 | 15,318,492 |
The attached testcase crashes on mozilla-central revision a96c49a026f6 (build with --target=i686-pc-linux-gnu --enable-gczeal --enable-optimize --enable-debug --enable-fuzzing, run with --no-threads --fuzzing-safe --baseline-warmup-threshold=0 --disable-oom-functions test.js).
Backtrace:
==29603==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x00000000 (pc 0x58a3fffc bp 0xffd59f98 sp 0xffd59f40 T29603)
#0 0x58a3fffb in AnnotateMozCrashReason(char const*) js/src/debug32fuzzing/dist/include/mozilla/Assertions.h:42:19
#1 0x58a3fffb in js::jit::X86Encoding::GPReg8Name(js::jit::X86Encoding::RegisterID) js/src/jit/x86-shared/Constants-x86-shared.h:194:3
#2 0x58a3fffb in js::jit::X86Encoding::BaseAssembler::setCC_r(js::jit::X86Encoding::Condition, js::jit::X86Encoding::RegisterID) js/src/jit/x86-shared/BaseAssembler-x86-shared.h:2034:41
#3 0x58a3fffb in js::jit::AssemblerX86Shared::setCC(js::jit::AssemblerX86Shared::Condition, js::jit::Register) js/src/jit/x86-shared/Assembler-x86-shared.h:1208:10
#4 0x58a3fffb in js::jit::MacroAssembler::allTrueInt16x8(js::jit::FloatRegister, js::jit::Register) js/src/jit/x86-shared/MacroAssembler-x86-shared-inl.h:1407:3
#5 0x58a3f5bb in js::jit::CodeGenerator::visitWasmReduceSimd128(js::jit::LWasmReduceSimd128*) js/src/jit/x86-shared/CodeGenerator-x86-shared.cpp:3448:12
#6 0x58cdaf3b in js::jit::CodeGenerator::generateBody() js/src/jit/CodeGenerator.cpp:6571:9
#7 0x58d33b82 in js::jit::CodeGenerator::generateWasm(js::wasm::TypeIdDesc, js::wasm::BytecodeOffset, js::wasm::ArgTypeVector const&, js::jit::MachineState const&, unsigned int, js::wasm::FuncOffsets*, js::wasm::StackMaps*) js/src/jit/CodeGenerator.cpp:11359:8
#8 0x59234ea4 in js::wasm::IonCompileFunctions(js::wasm::ModuleEnvironment const&, js::wasm::CompilerEnvironment const&, js::LifoAlloc&, mozilla::Vector<js::wasm::FuncCompileInput, 8u, js::SystemAllocPolicy> const&, js::wasm::CompiledCode*, mozilla::UniquePtr<char [], JS::FreePolicy>*) js/src/wasm/WasmIonCompile.cpp:5659:20
#9 0x591f114b in ExecuteCompileTask(js::wasm::CompileTask*, mozilla::UniquePtr<char [], JS::FreePolicy>*) js/src/wasm/WasmGenerator.cpp:782:16
#10 0x591f2c1c in js::wasm::ModuleGenerator::locallyCompileCurrentTask() js/src/wasm/WasmGenerator.cpp:831:8
#11 0x591f2c1c in js::wasm::ModuleGenerator::finishFuncDefs() js/src/wasm/WasmGenerator.cpp:969:24
#12 0x5912d858 in bool DecodeCodeSection<js::wasm::Decoder>(js::wasm::ModuleEnvironment const&, js::wasm::Decoder&, js::wasm::ModuleGenerator&) js/src/wasm/WasmCompile.cpp:678:13
#13 0x5912d2b1 in js::wasm::CompileBuffer(js::wasm::CompileArgs const&, js::wasm::ShareableBytes const&, mozilla::UniquePtr<char [], JS::FreePolicy>*, mozilla::Vector<mozilla::UniquePtr<char [], JS::FreePolicy>, 0u, js::SystemAllocPolicy>*, JS::OptimizedEncodingListener*) js/src/wasm/WasmCompile.cpp:700:8
#14 0x5926d4cf in js::WasmModuleObject::construct(JSContext*, unsigned int, JS::Value*) js/src/wasm/WasmJS.cpp:1598:7
#15 0x57db361a in CallJSNative(JSContext*, bool (*)(JSContext*, unsigned int, JS::Value*), js::CallReason, JS::CallArgs const&) js/src/vm/Interpreter.cpp:435:13
#16 0x57db77e9 in CallJSNativeConstructor(JSContext*, bool (*)(JSContext*, unsigned int, JS::Value*), JS::CallArgs const&) js/src/vm/Interpreter.cpp:451:8
#17 0x57da79be in InternalConstruct(JSContext*, js::AnyConstructArgs const&) js/src/vm/Interpreter.cpp:624:14
#18 0x57da75d6 in js::ConstructFromStack(JSContext*, JS::CallArgs const&) js/src/vm/Interpreter.cpp:670:10
#19 0x588cba98 in js::jit::DoCallFallback(JSContext*, js::jit::BaselineFrame*, js::jit::ICCall_Fallback*, unsigned int, JS::Value*, JS::MutableHandle<JS::Value>) js/src/jit/BaselineIC.cpp:1821:10
#20 0x326745b9 (<unknown module>)
This is x86 (32-bit) only and blocking further fuzzing.
|
|
1,707,286 | 15,376,976 |
Created attachment 9218053
image.png
User Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:90.0) Gecko/20100101 Firefox/90.0
Build ID 20210423095101
Steps To Reproduce:
nothing of special. Just started Nightly.
|
|
1,694,446 | 15,279,109 |
We removed "View Pocket List" from the library, so the animation no longer makes sense.
|
|
1,694,734 | 15,280,959 |
+++ This bug was initially created as a clone of Bug #1677696 +++
*Affected versions*
* 88.0a1 (20210224100119)
*Affected platforms*
* Windows 8.1x64
*Steps to reproduce*
1. Open Firefox and go to Customize mode.
2. Set Alpenglow theme and observe the top buttons.
*Expected result*
* Buttons are displayed as expected.
*Actual result*
* The buttons are not displayed.
*Notes*
Tested with a new profile.
|
|
1,694,927 | 15,282,268 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:86.0) Gecko/20100101 Firefox/86.0
Steps to reproduce:
1.) try to get an existing window with name "anyname":
var windowRef = http://window.open("", "anyname");
2.) then write a new URL into it:
windowRef.location.href = "http://domain.com/file.html";
Actual results:
The window with name "anyname" and reference "windowRef" gets "automatic" focused, just like an additional:
windowRef.focus();
Expected results:
The existing window with name "anyname" and reference "windowRef" should stay in the background and should not "steal" the focus.
This was the usual behavior since I remember and is still the default behavior of other Browsers, I have tested with.
|
|
1,695,383 | 15,285,231 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:88.0) Gecko/20100101 Firefox/88.0
Steps to reproduce:
1.Open Firefox Nighty
2.Download Anything from web
3.open download button from toolbar
4. right click and choose copy download link
Actual results:
Nothing is copied
Expected results:
The file download link must be copied
|
|
1,695,597 | 15,288,097 |
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:88.0) Gecko/20100101 Firefox/88.0
Steps to reproduce:
Visit https://bbs.nyaa.cat/ when its IPv6 address doesn't response
Actual results:
Connection timed out. No packet has sent to its IPv4 address.
Expected results:
Firefox should fallback to IPv4 and display the page.
Google Chrome sends out SYN to the IPv4 address 300ms after the IPv6 connection doesn't work. It displays the page quickly.
I've tested with a newly created Firefox profile.
|
|
1,696,187 | 15,292,325 |
follow-up from bug 1691478
##### [Environment:]
Windows 10, Mac 10.14.6, Ubuntu 20.04
##### [Steps]:
1. Start an en-ca localized older version (87.0a1) with an user.js that has
user_pref("browser.search.region", "CA");
user_pref("browser.topsites.useRemoteSetting", false);
2. Note down the topsites: the order would be amazon.ca is on pos 5 unpinned.
3. Close Fx down, edit the said user.js and change user_pref("browser.topsites.useRemoteSetting", true);
4. Download latest beta - 87.b05
5. Start beta 87.b05 with the above profile. (migration scenario)
##### [Actual Result:]
amazon.ca is pinned and on position 1
##### [Expected Result:]
amazon.ca is pinned and on position 5
##### [Note:]
Unpinning in the above actual result will send the amazon.ca to position 5 (order 50).
|
|
1,696,593 | 15,295,156 |
This JS Fiddle https://jsfiddle.net/6v512jax/ shows that ICE gathering in a new fresh tab sometimes fails to produce any candidates.
This problem appeared new in Fx 85. And turning on the Socket Process makes the problem no longer reproducible.
|
|
1,737,271 | 15,624,770 |
**[Affected versions]:**
- Firefox Beta 93.0 - Build ID: 20210927210923
**[Affected Platforms]:**
- Windows 10 x64
**[Steps to reproduce]:**
1. Navigate to the experiment's [experimenter page](https://experimenter.services.mozilla.com/nimbus/emotive-pin-firefox-modal).
2. Scroll down to the "Recipe JSON" and observe the trigger.
**[Expected result]:**
- The appropriate trigger should be displayed.
**[Actual result]:**
- The `"id": "captivePortalLogin"` string is displayed instead.
**[Notes]:**
- Due to the actual trigger the experiment spotlight cannot be triggered naturally.
|
|
1,737,770 | 15,629,597 |
Created attachment 9247716
ss of the issue.png
**[Affected versions]:**
- Firefox Release 93.0 - Build ID: 20210927210923
- Firefox Beta 94.0 - Build ID: 20211025220926
**[Affected Platforms]:**
- Windows 10 x64
**[Prerequisites]:**
- Have a Firefox profile older than 28 days.
- Have this [user.js](https://drive.google.com/file/d/1W7JYZPsxuTUfU6mp19cY3WFdGp6LF030/view?usp=sharing) file saved to your PC.
- Have at least 1 URL accessed in the last 13 days.
- The Firefox browser is not pinned to the taskbar.
**[Steps to reproduce]:**
1. Navigate to the profile folder from prerequisites and paste the "user.js" file.
2. Open the browser with the profile from prerequisites.
3. Observe the icon from the "Pin to taskbar" modal.
**[Expected result]:**
- An "umbrella" icon is displayed in the top part of the modal.
**[Actual result]:**
- The Firefox logo is displayed instead.
**[Notes]:**
- Attached a screenshot of the issue.
|
|
1,737,837 | 15,630,100 |
See also bug 1737405
9 crashes from 9 different devices, crashes predominantly on twitch.tv
Maybe Fission related. (DOMFissionEnabled=1)
Crash report: https://crash-stats.mozilla.org/report/index/4e3e62a9-d58e-4e8d-9725-0068f0211026
MOZ_CRASH Reason: ```MOZ_DIAGNOSTIC_ASSERT(ok) (corrupt optimized wasm cache file)```
Top 10 frames of crashing thread:
```
0 xul.dll mozilla::dom::JSStreamConsumer::OnInputStreamReady dom/fetch/FetchUtil.cpp:542
1 xul.dll mozilla::`anonymous namespace'::InputStreamCallbackRunnable::Run dom/file/ipc/RemoteLazyInputStream.cpp:54
2 xul.dll static mozilla::`anonymous namespace'::InputStreamCallbackRunnable::Execute dom/file/ipc/RemoteLazyInputStream.cpp:48
3 xul.dll mozilla::RemoteLazyInputStream::AsyncWait dom/file/ipc/RemoteLazyInputStream.cpp:460
4 xul.dll mozilla::dom::JSStreamConsumer::OnInputStreamReady dom/fetch/FetchUtil.cpp:577
5 xul.dll mozilla::`anonymous namespace'::InputStreamCallbackRunnable::Run dom/file/ipc/RemoteLazyInputStream.cpp:54
6 xul.dll static mozilla::`anonymous namespace'::InputStreamCallbackRunnable::Execute dom/file/ipc/RemoteLazyInputStream.cpp:48
7 xul.dll mozilla::RemoteLazyInputStream::OnInputStreamReady dom/file/ipc/RemoteLazyInputStream.cpp:581
8 xul.dll nsPipeEvents::~nsPipeEvents xpcom/io/nsPipe3.cpp:1142
9 xul.dll nsPipeOutputStream::WriteSegments xpcom/io/nsPipe3.cpp:1715
```
|
|
1,738,129 | 15,632,296 |
Steps to reproduce:
1) In about:config set browser.download.improvements_to_download_panel to true. (The current default value in Nighty.)
2) In a search engine search for "dummy pdf file w3c" (without the quotes) to find an entry for https://www.w3.org/WAI/ER/tests/xhtml/testfiles/resources/pdf/dummy.pdf in the results.
3) Right click and select "Save Link As...".
Expected:
3) A Save dialog appears to select a location to save the file, and then the file is saved at that location.
Actual:
3) The file is opened immediately.
Setting browser.download.improvements_to_download_panel to false fixes the problem.
I'm seeing this with XFCE under Linux. Others have reported this type of behavior with Windows.
|
|
1,738,237 | 15,632,938 |
Created attachment 9248226
poc.zip
Tested Version: Windows 10 1909 x64 memory 16G + firfox 93.0 64-bit.
####Root cause:
In functionn sStructuredCloneContainer::GetDataAsBase64, at the position #1, v10 Force conversion from 64-bit to 32-bit, which leads to Integer Overflow vulnerability. This vulnerability can be easily exploited for Remote Code Execution Vulnerability.
The patch for this vulnerability is simple, you just need to determine if v10 overflows before calling SetLength.
####Code:
```
__int64 __fastcall nsStructuredCloneContainer::GetDataAsBase64(__int64 a1, __int64 a2)
{
__int64 v2; // rsi
__int64 v3; // rbx
__int64 v4; // rax
_QWORD *v5; // rcx
unsigned int v6; // ebp
_QWORD *v8; // rcx
__int64 v9; // rax
unsigned __int64 v10; // rdi
__int64 v11; // rax
signed __int64 v12; // r15
__int64 v13; // r12
__int64 v14; // rbx
size_t v15; // rbp
int v16; // eax
__int64 v17; // [rsp+0h] [rbp-D8h]
void *Src[2]; // [rsp+20h] [rbp-B8h]
__int128 v19; // [rsp+30h] [rbp-A8h]
char *v20; // [rsp+40h] [rbp-98h]
__int64 v21; // [rsp+48h] [rbp-90h]
int v22; // [rsp+50h] [rbp-88h]
char v23; // [rsp+54h] [rbp-84h]
unsigned __int64 v24; // [rsp+98h] [rbp-40h]
v2 = a2;
v3 = a1;
v24 = (unsigned __int64)&v17 ^ _security_cookie;
nsTSubstring_char16_t_::Truncate(a2);
v4 = *(_QWORD *)(v3 + 240);
v5 = (_QWORD *)(v4 + 64);
if ( !v4 )
v5 = (_QWORD *)(v3 + 168);
v6 = -2147467259;
if ( *v5 && !**(_DWORD **)(v3 + 56) && !**(_DWORD **)(v3 + 64) && !**(_DWORD **)(v3 + 80) && !**(_DWORD **)(v3 + 72) )
{
v8 = (_QWORD *)(v4 + 8);
if ( !v4 )
v8 = (_QWORD *)(v3 + 112);
v19 = 0i64;
*(_OWORD *)Src = 0i64;
if ( v8[2] )
{
v9 = v8[1];
Src[1] = *(void **)v9;
*(_QWORD *)&v19 = (char *)Src[1] + *(_QWORD *)(v9 + 8);
}
v10 = v8[7];
v20 = &v23;
v21 = 844497944576000i64;
v22 = 63;
v23 = 0;
v6 = -2147024882;
if ( nsTSubstring_char_::SetLength((volatile signed __int32 **)&v20, v10) )
...
if ( (unsigned __int8)nsTSubstring_char_::SetLength(&v20, (unsigned int)v10, &std::nothrow) ) #1
{
v11 = *(_QWORD *)(v3 + 240);
v12 = v11 + 8;
if ( !v11 )
v12 = v3 + 112;
if ( !(unsigned __int8)nsTSubstring_char_::EnsureMutable(&v20, 0xFFFFFFFFi64) )
NS_ABORT_OOM((unsigned int)v21);
if ( v10 )
{
v13 = (__int64)v20;
v14 = 0i64;
do
{
if ( Src[1] > (void *)v19 )
{
gMozCrashReason = "MOZ_RELEASE_ASSERT(mData <= mDataEnd)";
__debugbreak();
MOZ_NoReturn(209i64);
}
v15 = v19 - (unsigned __int64)Src[1];
if ( v10 < (unsigned __int64)v19 - (unsigned __int64)Src[1] )
v15 = v10;
if ( !v15 )
break;
if ( Src[1] == (void *)v19 )
{
gMozCrashReason = "MOZ_RELEASE_ASSERT(!Done())";
__debugbreak();
MOZ_NoReturn(196i64);
}
memcpy_0((void *)(v13 + v14), Src[1], v15);
v14 += v15;
mozilla::BufferList_js::SystemAllocPolicy_::IterImpl::Advance(Src, v12, v15);
v10 -= v15;
}
while ( v10 );
}
....
}
```
####OOB Write details:
```
Debugging Details:
------------------
0:000> r
rax=000001d4af2fe808 rbx=00000000000ad000 rcx=000001d4af2fef20
rdx=000001d4b5f16718 rsi=000001d4b57996a0 rdi=00000000fff53430
rip=00007ffd35bd151e rsp=000000036c7fb7f8 rbp=0000000000001000
r8=00000000000008e8 r9=ffffffffffffffe8 r10=00007ffd35bd0000
r11=000001d665c00000 r12=000001d4af251808 r13=000000036c7fbaa0
r14=000000036c7fb820 r15=000001d4af205828
iopl=0 nv up ei pl nz na po nc
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206
VCRUNTIME140!memcpy+0x22e:
00007ffd`35bd151e c5fd7fa1e0000000 vmovdqa ymmword ptr [rcx+0E0h],ymm4 ds:000001d4`af2ff000=??
0:000> kb
RetAddr : Args to Child : Call Site
00007ffd`16446f5b : 00000000`00000000 0000f1a7`6bbca904 000001d4`b5624000 00000003`6c7fb8b0 : VCRUNTIME140!memcpy+0x22e
00007ffd`17083170 : 0000f1a7`6bbca9e4 00000003`6c7fb978 000001d4`b5624088 00000003`6c7fb968 : xul!nsStructuredCloneContainer::GetDataAsBase64+0x18b [/builds/worker/checkouts/gecko/dom/base/nsStructuredCloneContainer.cpp @ 151]
00007ffd`1707f930 : 000001d4`b5750c00 00007ffd`165d8d8c 0000f1a7`6bbca614 fffe02e8`44f009b0 : xul!mozilla::dom::Notification::InitFromJSVal+0x80 [/builds/worker/checkouts/gecko/dom/notification/Notification.cpp @ 1952]
00007ffd`1707f7a0 : 000001d4`b5624068 00000003`6c7fbde8 fff98000`00000000 000001d4`00000c01 : xul!mozilla::dom::Notification::CreateAndShow+0xe0 [/builds/worker/checkouts/gecko/dom/notification/Notification.cpp @ 2234]
00007ffd`165f2a2d : 00000003`6c7fba88 00000000`00000000 00000000`00000002 000001d4`b735c1e0 : xul!mozilla::dom::Notification::Constructor+0x140 [/builds/worker/checkouts/gecko/dom/notification/Notification.cpp @ 779]
00007ffd`157b6066 : 000001d4`b5620001 00000003`6c7fbf00 00000000`00000000 00000000`b5010111 : xul!mozilla::dom::Notification_Binding::_constructor+0x41d [/builds/worker/workspace/obj-build/dom/bindings/NotificationBinding.cpp @ 2212]
00007ffd`159753cb : 00000101`0000fe05 00000003`6c7fc400 00007ffd`18ae8bb0 00000000`00000077 : xul!InternalConstruct+0x296 [/builds/worker/checkouts/gecko/js/src/vm/Interpreter.cpp @ 612]
0:000> dd rcx
000001d4`af2fef20 41414141 41414141 41414141 41414141
000001d4`af2fef30 41414141 41414141 41414141 41414141
000001d4`af2fef40 41414141 41414141 41414141 41414141
000001d4`af2fef50 41414141 41414141 41414141 41414141
000001d4`af2fef60 41414141 41414141 41414141 41414141
000001d4`af2fef70 41414141 41414141 41414141 41414141
000001d4`af2fef80 41414141 41414141 41414141 41414141
000001d4`af2fef90 41414141 41414141 41414141 41414141
```
#########################################################################################################################################
This vuln is discovered by bo13oy of Cyber Kunlun Lab.
Thanks.
|
|
1,738,448 | 15,634,435 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0
Build ID: 20211029094127
### Steps to reproduce
1. In a new profile, make sure `browser.download.improvements_to_download_panel` is `true`.
3. Open any PDF in a Private Browsing window. Quick link: https://wiki.mozilla.org/images/d/d0/Manifesto-0.7.pdf
4. In the PDF viewer, click `Download`.
5. Confirm the PDF is downloaded in the download folder.
6. Close all PB windows.
### Actual result
The downloaded PDF is deleted from the system. It is not found in Windows' Recycle Bin neither.
### Expected result
The downloaded PDF should not be deleted.
### Notes
1. PDFs downloaded from normal windows are not deleted.
2. It seems that the bug affects PDF viewer's download button only. I can retain the PDF by using Ctrl-S or right click > `Save Page As…`
3. I tried a .zip, a .exe, and a .gz file from [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/nightly/latest-mozilla-central/) and the files are all retained.
### Workaround
Disable `browser.download.improvements_to_download_panel`.
|
|
1,738,706 | 15,637,735 |
Created attachment 9248713
handlers.json
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0
Build ID: 20211101084651
### Steps to reproduce
1. In a new profile, make sure `browser.download.improvements_to_download_panel` to `true`.
2. Go to Settings > General > Applications. Check that there is no entries for Content Type `ZIP Archive`.
3. Download any .zip file, e.g. https://ftp.mozilla.org/pub/firefox/nightly/2021/11/2021-11-01-08-46-51-mozilla-central/jsshell-win64-aarch64.zip
4. In the Downloads button on toolbar, right click the downloaded .zip and enable `Always Open Similar Files`.
5. Reload the Settings page. Observe the entry for `ZIP Archive`.
### Actual result
The Action for `ZIP Archive` is labelled as `Always ask` even though .zip files will directly open in external software, e.g. Windows Explorer.
I have attached a `handler.json` that represents the state right after I enable `Always Open Similar Files`.
### Additional bugs
In Settings, if I switch the action for ZIP to `Use Windows Explorer` or other supported software, the tick for `Always Open Similar Files` is lost.
I can only get back the tick by pressing `Always Open Similar Files` again. This, however, results in two possible cases:
1. Reset `ZIP archive` to `Always ask`. Or
2. Create a new `zip archive` (in lowercase) and set the action to open my default zip program, 7-zip.
I haven't figured out how to reliably recreate case 2 yet.
|
|
1,738,713 | 15,637,777 |
Created attachment 9248724
registercontentscriptbug-1.0.zip
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/93.0
Steps to reproduce:
1. Install the minimal reproduction web extension attached
2. enable the popup blocker
3. open the attached test.html with the file-protocol
4. click "OpenSites"
5. close the opened tab and allow the other two tabs to be opened
6. close the two tabs
7. navigate to google.com in the tab with the local file
8. navigate back
9. click "OpenSites"
Actual results:
Only one tab is opened
Expected results:
All three tabs should open.
|
|
1,738,984 | 15,639,768 |
Jens, do you have insight why this signature [started to spike]8https://crash-stats.mozilla.org/signature/?product=Firefox&signature=shutdownhang%20%7C%20NtFlushBuffersFile&date=%3E%3D2021-08-02T16%3A18%3A00.000Z&date=%3C2021-11-02T16%3A18%3A00.000Z&_columns=date&_columns=product&_columns=version&_columns=build_id&_columns=platform&_columns=reason&_columns=address&_columns=install_time&_columns=startup_crash&_sort=-date&page=2#graphs9 (3.5-4x previous level) around 2021-10-27 but on release? Bug 1705360 saw a change but that was for Nightly (95.0a1) and other signatures are also seeing an increase. Either people crash more, submit more or we process more.
* [@ mozilla::detail::RunnableMethodImpl<T>::~RunnableMethodImpl](https://crash-stats.mozilla.org/signature/?product=Firefox&signature=shutdownhang%20%7C%20mozilla%3A%3Adetail%3A%3ARunnableMethodImpl%3CT%3E%3A%3A~RunnableMethodImpl&date=%3E%3D2021-08-02T16%3A19%3A00.000Z&date=%3C2021-11-02T16%3A19%3A00.000Z&_columns=date&_columns=product&_columns=version&_columns=build_id&_columns=platform&_columns=reason&_columns=address&_columns=install_time&_columns=startup_crash&_sort=-date&page=1#graphs)
* [@ mozilla::ClearOnShutdown_Internal::PointerClearer<T>::Shutdown](https://crash-stats.mozilla.org/signature/?product=Firefox&signature=shutdownhang%20%7C%20mozilla%3A%3AClearOnShutdown_Internal%3A%3APointerClearer%3CT%3E%3A%3AShutdown&date=%3E%3D2021-08-02T16%3A19%3A00.000Z&date=%3C2021-11-02T16%3A19%3A00.000Z&_columns=date&_columns=product&_columns=version&_columns=build_id&_columns=platform&_columns=reason&_columns=address&_columns=install_time&_columns=startup_crash&_sort=-date&page=1#graphs)
* [@ shutdownhang | mozilla::EventListenerManager::HandleEventInternal](https://crash-stats.mozilla.org/signature/?product=Firefox&signature=shutdownhang%20%7C%20mozilla%3A%3AEventListenerManager%3A%3AHandleEventInternal&date=%3E%3D2021-08-02T20%3A33%3A00.000Z&date=%3C2021-11-02T20%3A33%3A00.000Z#graphs)
Crash report: https://crash-stats.mozilla.org/report/index/8b3e2d08-629d-4729-90e3-082930211102
MOZ_CRASH Reason: ```Shutdown hanging at step quit-application. Something is blocking the main-thread.```
Top 10 frames of crashing thread:
```
0 ntdll.dll NtFlushBuffersFile
1 KERNELBASE.dll FlushFileBuffers
2 nss3.dll winSync third_party/sqlite3/src/sqlite3.c:45420
3 nss3.dll syncJournal third_party/sqlite3/src/sqlite3.c:56920
4 nss3.dll sqlite3PagerCommitPhaseOne third_party/sqlite3/src/sqlite3.c:59166
5 nss3.dll sqlite3BtreeCommitPhaseOne third_party/sqlite3/src/sqlite3.c:69499
6 nss3.dll sqlite3VdbeHalt third_party/sqlite3/src/sqlite3.c:82024
7 nss3.dll sqlite3VdbeExec third_party/sqlite3/src/sqlite3.c:89967
8 nss3.dll sqlite3_step third_party/sqlite3/src/sqlite3.c:84918
9 nss3.dll sqlite3_exec third_party/sqlite3/src/sqlite3.c:126190
```
|
|
1,739,142 | 15,640,828 |
**Note**
* When the user ..., he will notice that...
**Affected versions**
* Nightly v96.0a1
**Affected platforms**
* Ubuntu 21 + Wayland
**Steps to reproduce**
1. Go into the "nightly" folder
2. Right-click and "Open in Terminal"
3. type: MOZ_ENABLE_WAYLAND=1
4. And then: ./firefox
5. Load https://emilghitta.github.io/TestPages/TestCases/ShareScreen.html
6. Click on "Start Capture"
7. Click the drop-down and select the Nightly Window.
**Expected result**
* The Nightly window is in the list and correctly selected.
**Actual result**
* The nightly window is not an option in the drop-down.
**Regression range**
* unknown
**Additional notes**
* This issue only occurs with wayland, not with xwayland or x11 Window Protocols.
|
|
1,739,502 | 15,643,095 |
Created attachment 9249303
XFA pdf.pdf
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/93.0
Steps to reproduce:
Open XFA PDF (Attached to this ticket)
Actual results:
All pages work fine except page 6
Expected results:
Page 6 would have loaded fine.
|
|
1,739,924 | 15,645,644 |
Out of nowhere tabs crash after a while. All tabs will crash at the same time, except for some tabs (seems like especially tabs which play a video), those will crash after I switch away from them and back to them or when I try to open a new site within them. It also affecs all new tabs. The browser becomes unusable for surfing until it is closed or killed and reopened. Behaviour happens at random. Sometimes after half an hour, sometimes after multiple hours. It started right after my update to Firefox 94 from Firefox 93 on Arch Linux. I have enough more than system resources, neither RAM nor swap was full.
Here is some data that was automatically entered into this form:
Crash report: https://crash-stats.mozilla.org/report/index/007b5ede-76b7-458e-bd9a-2a1580211107
MOZ_CRASH Reason: ```MOZ_RELEASE_ASSERT(result.isOk())```
Top 10 frames of crashing thread:
```
0 libxul.so mozilla::dom::ipc::SharedStringMap::SharedStringMap /build/firefox/src/firefox-94.0.1/dom/ipc/SharedStringMap.cpp:33
1 libxul.so /build/firefox/src/firefox-94.0.1/intl/strres/nsStringBundle.cpp:489
2 libxul.so /build/firefox/src/firefox-94.0.1/intl/strres/nsStringBundle.cpp:581
3 libxul.so nsStringBundleBase::GetStringFromName /build/firefox/src/firefox-94.0.1/intl/strres/nsStringBundle.cpp:569
4 libxul.so mozilla::CubebUtils::InitBrandName /build/firefox/src/firefox-94.0.1/dom/media/CubebUtils.cpp:382
5 libxul.so mozilla::detail::RunnableFunction<void /build/firefox/src/firefox-94.0.1/xpcom/threads/nsThreadUtils.h:531
6 libxul.so mozilla::TaskController::DoExecuteNextTaskOnlyMainThreadInternal /build/firefox/src/firefox-94.0.1/xpcom/threads/TaskController.cpp:770
7 libxul.so nsThread::ProcessNextEvent /build/firefox/src/firefox-94.0.1/xpcom/threads/nsThread.cpp:1148
8 libxul.so mozilla::ipc::MessagePump::Run /build/firefox/src/firefox-94.0.1/ipc/glue/MessagePump.cpp:85
9 libxul.so MessageLoop::Run /build/firefox/src/firefox-94.0.1/ipc/chromium/src/base/message_loop.cc:306
```
|
|
1,740,788 | 15,653,315 |
Created attachment 9250434
Nightly_vs_Stable.png
Nightly 96.0a1 (2021-11-11) (64-Bit)
macOS 12.0.1
Steps to reproduce:
1.) Open a New Tab in FF Nightly
2.) Compare the height of the Tab in FF Nightly with FF Stable
Actual: In FF Nightly the Tab height has become smaller.
Expected: They should be higher to match again the with the height of Hover Botton of the New Tab Button.
This is a regression in recent Nightly.
A screenshot Nightly vs Stable is attached.
Thanks for fixing in advance.
|
|
1,740,818 | 15,653,487 |
Carmen and her team caught a bug [shown in this video](https://drive.google.com/file/d/1mx-yMMDPnCF-kpEg-aU3AvLIn6h3CKTN/view) where you opt in to online, upgrade Firefox, and then the data collection toggle is off but it should be on.
STR:
1. Start with 94.0.1
2. Set `nimbus.debug=true`
3. Enroll in the [offline vs. online](https://experimenter.services.mozilla.com/nimbus/firefox-suggest-offline-vs-online/details) treatment branch (i.e., online)
4. Restart
5. Verify the opt-in modal appears
6. Click Allow suggestions
7. Verify both Fx Suggest checkboxes are checked in about:prefs
8. Quit
9. Start Nightly with the same profile
10. Open about:preferences#privacy
Actual: Data collection toggle is off
Expected: Data collection toggle should be on
QA was able to reproduce this only on a couple of Ubuntu 20.04 machines but not on other Linux machines or Windows or Mac.
I can't reproduce it on Ubuntu 20.04.3 LTS or Mac, but I think I see how it could happen. It's a technical problem due to timing. You have to be unlucky to hit it, but I can't say how how likely it is. It's not related to Ubuntu or your platform and I bet if you tried it on enough machines you'd eventually hit it on Windows or Mac too. Carmen mentioned that when the problem happens, `browser.search.region` is not present before step 4, but I don't think that's related either.
Technical description below:
I think the problem is due to a race: The Nimbus urlbar feature may not be initialized by the time we [migrate Suggest preferences](https://searchfox.org/mozilla-central/rev/df6434d2ebfdf2b5f89f205fc81d60d64a774fe1/browser/components/urlbar/UrlbarPrefs.jsm#830). The data collection pref is [set here](https://searchfox.org/mozilla-central/rev/df6434d2ebfdf2b5f89f205fc81d60d64a774fe1/browser/components/urlbar/UrlbarPrefs.jsm#872) -- and only here -- so we're not hitting that path like we should be. I think that's because `scenario` is "offline" instead of "online" because the Nimbus urlbar feature hasn't finished initializing. When I add an artificial delay right before [this line in the Nimbus client implementation](https://searchfox.org/mozilla-central/rev/df6434d2ebfdf2b5f89f205fc81d60d64a774fe1/toolkit/components/nimbus/lib/SharedDataMap.jsm#74), then I can reproduce it. i.e., add this right before the `await this._store.load()`:
```js
const { setTimeout } = ChromeUtils.import(
"resource://gre/modules/Timer.jsm"
);
await new Promise(r => setTimeout(r, 3000));
```
|
|
1,741,597 | 15,660,528 |
Setting `privacy.restrict3rdpartystorage.rollout.enabledByDefault` to `false` explicitly will always set cookie behavior to `BEHAVIOR_REJECT_TRACKER`. This is unexpected for release channels which have a different default cookie behavior.
Instead we should revert the cookie behavior to its initial default value.
https://searchfox.org/mozilla-central/rev/df18dd52da04ee2bad434b0ba2d9fcb196d4d15e/browser/components/BrowserGlue.jsm#1757
|
|
1,741,997 | 15,663,059 |
We might not have a `GLContext` set in `DMABufSurface::mGL` if we create it via the `DMABufSurface::ImportSurfaceDescriptor` method. Since we have a check for a null `mGL` before freeing the handle, this could result in a leak:
https://searchfox.org/mozilla-central/rev/3881c4ca80d1b4b2f43be695438ecaf90ee4f86c/widget/gtk/DMABufSurface.cpp#214
I was able to confirm this happens sometimes (but not always) in a debug build on Linux + Intel just by moving the close earlier and printing the GL context pointer value (it was sometimes null).
|
|
1,742,146 | 15,664,161 |
**Affected platforms**
Windows 10
MacOS 11
**Affected versions**
Nightly 96.0a1
Beta 95.0b9
Release 94.0.1
**Steps to reproduce**
launch firefox with new profile
go to about preferences
search for "download"
on download folder, click "browse" button
click desktop
double click any folder that you have on your desktop
click on "select folder" button
**Actual Results**
Folder stays as download
**Expected Results**
Folder should change to whatever folder you chose.
**Note**
if you try same steps a second time, then firefox takes the folder name correctly in about:preferences.
|
|
1,742,362 | 15,667,018 |
Most of these crashes have been observed with macOS 10.12 and Firefox 94.0.1 (94.0 didn't ship to macOS 10.12 users due to bug 1737998). But the reports get frequent on 2021-11-11 while the 94.0.1 started to ship to all users a week before - is this a fission issue? All crash reports have 'dom fission enabled'.
Maybe Fission related. (DOMFissionEnabled=1)
Crash report: https://crash-stats.mozilla.org/report/index/b2edadf8-1bff-4922-99b0-469340211121
Reason: ```EXC_BAD_ACCESS / KERN_INVALID_ADDRESS```
Top 10 frames of crashing thread:
```
0 XUL nsDeviceContext::BeginPage gfx/src/nsDeviceContext.cpp:346
1 XUL mozilla::layout::RemotePrintJobParent::PrintPage layout/printing/ipc/RemotePrintJobParent.cpp:160
2 XUL mozilla::layout::RemotePrintJobParent::FinishProcessingPage layout/printing/ipc/RemotePrintJobParent.cpp:146
3 XUL mozilla::MozPromise<nsRefCountedHashtable<nsIntegralHashKey<unsigned long long, 0>, RefPtr<mozilla::gfx::RecordedDependentSurface> >, nsresult, true>::ThenValue<mozilla::layout::RemotePrintJobParent::RecvProcessPage xpcom/threads/MozPromise.h:850
4 XUL mozilla::MozPromise<nsRefCountedHashtable<nsIntegralHashKey<unsigned long long, 0>, RefPtr<mozilla::gfx::RecordedDependentSurface> >, nsresult, true>::ThenValueBase::ResolveOrRejectRunnable::Run xpcom/threads/MozPromise.h:487
5 XUL mozilla::TaskController::DoExecuteNextTaskOnlyMainThreadInternal xpcom/threads/TaskController.cpp:770
6 XUL nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1148
7 XUL NS_ProcessPendingEvents xpcom/threads/nsThreadUtils.cpp:432
8 XUL nsAppShell::ProcessGeckoEvents widget/cocoa/nsAppShell.mm:501
9 CoreFoundation CoreFoundation@0xa4e50
```
|
|
1,742,413 | 15,667,370 |
Created attachment 9251904
rec of the issue.gif
**[Affected versions]:**
- Firefox Release 94.0.1- Build ID: 20211103134640
**[Affected Platforms]:**
- Windows 10 x64
- macOS 11.6
- Linux Mint 20.2 Cinnamon
**[Prerequisites]:**
- Have a Firefox profile with the `browser.search.region` pref set to `US` in the "about:config" page.
- Have the "Recommend extensions as you browse" and the "Recommend features as you browse" options from the "Browsing" section of the "about:preferences#general" page unchecked.
**[Steps to reproduce]:**
1. Open the browser with the profile from prerequisites.
2. Restart the browser.
3. Observe the behavior.
**[Expected result]:**
- The browser is opened and the "Moments" page is **NOT** triggered.
**[Actual result]:**
- The "VPN Moments" page is triggered.
**[Notes]:**
- The [Mozilla support](https://support.mozilla.org/en-US/kb/firefox-browser-welcome-pages?utm_source=mozilla.org-firefox-welcome-10&utm_medium=referral&utm_campaign=welcome-10-vpn&entrypoint=mozilla.org-firefox-welcome-10) page states that the "Moments" page should not be displayed if the "Recommend extensions as you browse" and the "Recommend features as you browse" options are unchecked.
- Attached a screen recording of the issue.
|
|
1,734,612 | 15,602,311 |
Crash report: https://crash-stats.mozilla.org/report/index/e3259484-a527-4128-b916-504690211007
MOZ_CRASH Reason: ```MOZ_RELEASE_ASSERT(JS::IsTranscodingBytecodeAligned(scriptData.get()))```
Top 10 frames of crashing thread:
```
0 xul.dll mozilla::ScriptPreloader::InitCacheInternal js/xpconnect/loader/ScriptPreloader.cpp:540
1 xul.dll mozilla::ScriptPreloader::InitCache js/xpconnect/loader/ScriptPreloader.cpp:440
2 xul.dll static mozilla::ScriptPreloader::GetSingleton js/xpconnect/loader/ScriptPreloader.cpp:115
3 xul.dll xpc::InitializeJSContext js/xpconnect/src/nsXPConnect.cpp:99
4 xul.dll XREMain::XRE_mainRun toolkit/xre/nsAppRunner.cpp:5013
5 xul.dll XREMain::XRE_main toolkit/xre/nsAppRunner.cpp:5477
6 xul.dll XRE_main toolkit/xre/nsAppRunner.cpp:5536
7 firefox.exe wmain toolkit/xre/nsWindowsWMain.cpp:138
8 firefox.exe __scrt_common_main_seh /builds/worker/workspace/obj-build/browser/app/d:/agent/_work/1/s/src/vctools/crt/vcstartup/src/startup/exe_common.inl:288
9 kernel32.dll BaseThreadInitThunk
```
|
|
1,734,679 | 15,602,678 |
+++ This bug was initially created as a clone of Bug #1391628 +++
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/93.0
Build ID: 20210927210923
Steps to reproduce:
Firefox update 93.0 (64 bit) on Windows (10)
Dynamics CRM 365 SP1 (8.2.2.112) On-prem
In advanced find window, clicked edit columns, clicked add columns
Actual results:
Returned a blank white (empty) list of columns
Console logs error _twoletterlanguagename is not defined in /_static/tools/vieweditor/scripts/fieldlist.js
Expected results:
Should return a list of available columns as in current Chrome and IE
Bug introduced with update 93.0
|
|
1,734,843 | 15,603,704 |
User Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:93.0) Gecko/20100101 Firefox/93.0
Steps to reproduce:
The beta 93.0b3 auto updated to beta 94.0b1 and since it takes minutes to load even a simple text email so I can read or work with it. Also don't seem to be able save attachments. I literally cannot use this like it is. When I try to uninstall and reinstall version 93.0b3 I am told that my profile has been changed due to the new release of Thunderbird so I cannot revert back without damaging my profile.
Actual results:
it takes minutes to load even a simple text email so I can read or work with it. Also don't seem to be able save attachments. It seems to be perpetually downloading emails over and over again.
Expected results:
normal operation in clicking on, reading, and replying to emails.
|
|
1,735,076 | 15,605,048 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:92.0) Gecko/20100101 Firefox/92.0
Steps to reproduce:
1. Open Write dialog (File->New->Message) and begin to write a message.
2. Close window to get the "Save Message" modal to pop up.
3. Left- and right-arrow keys are inoperative, i.e. don't cycle between Save, Discard changes, and Close options as expected in any standard Windows native modal.
Actual results:
Arrow keys don't work to cycle between options; only tab key works.
Expected results:
Save, Discard changes, and Close options should have been highlighted as I cycled between them, just as with the tab key.
|
|
1,735,265 | 15,608,198 |
Created attachment 9245388
parent.html
User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.71 Safari/537.36
Steps to reproduce:
1. open 'parent.html' on Firefox 93.
2. load 'child.html' by executing Js code
set_frame('./child.html');
Actual results:
The content in iframe is drawn outside of iframe even if 'child.html' is loaded from a local server.
Expected results:
The content in iframe should not be drawn outside of iframe.
|
|
1,735,347 | 15,608,940 |
Created attachment 9245501
firefox_VlXnqIfduB.png
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/93.0
Actual results:
The error shows in the console after the update (95.0a1 (2021-10-12) (64-Bit)).
|
|
1,735,454 | 15,610,195 |
STR (with a screen reader):
1. Open the browser console and enter:
`Cc["@mozilla.org/browser/browserglue;1"].getService().wrappedJSObject._showUpgradeDialog()`
2. Press the Explore colorways button.
3. Choose to explore abstract colorways.
4. Tab to the "Soft" radio button.
- Expected: The screen reader reports "Soft" as the label of the radio button.
- Actual: The screen reader reports "Use this colorway".
The labels "Soft", "Balanced" and "Bold" are set as the textContent of the radio inputs. This is non-standard and is thus not exposed to accessibility.
The correct fix is either to move the text outside of the input or to set aria-label. Both of these would require changes to l10n strings, which probably isn't feasible at this point.
We can get the correct string at runtime. However, we can't set the aria-label attribute because Fluent clobbers it.
I'll attach a patch which creates a hidden label node and references it with aria-labelledby. It's really ugly, but I honestly don't think there's a better option at this point without messing with strings.
|
|
1,735,508 | 15,610,539 |
Created attachment 9245700
log.odt Copy pasted content of error console
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0) Gecko/20100101 Thunderbird/91.2.0
Steps to reproduce:
Entered the name of a "Group" that was defined in Mac OS X Contacts. After typing a few letters into the "To" field a short list of possible completions showed up and I selected the desired one, a Groups defined in contacts. Then hit entered and Thunderbird immediately crashed and the crash report window opened up. This is 100% reproducible
Actual results:
Crashed
Expected results:
?? I should have been able to enter text in Subject and in the body of the email
|
|
1,735,595 | 15,611,183 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/93.0
Steps to reproduce:
Go to www.Facebook.com
Actual results:
Facebook says "waiting for static.xx.fbcdn.net" and Facebook images are not loading.
See: https://www.reddit.com/r/firefox/comments/pbkaro/waiting_for_staticxxfbcdnnet_message_when/
Expected results:
The page should load normally, like in Chrome.
|
|
1,735,643 | 15,611,584 |
Created attachment 9245807
Screenshot
Tested on Windows with HCM White.
|
|
1,735,856 | 15,613,112 |
User Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:92.0) Gecko/20100101 Firefox/92.0
Steps to reproduce:
Visit https://demo.websec.saarland/static/csp_frame.html
Define a securitypolicyviolation handler and frame an document that sets frame-ancestors that blocks the framing
Actual results:
A securitypolicyviolation event is thrown on the parent page
Expected results:
No securitypolicyviolation should be thrown as this leaks cross-origin information.
See https://bugs.chromium.org/p/chromium/issues/detail?id=1186611&q=frame-ancestors&can=1 for the discussion and fix in chromium.
|
|
1,735,899 | 15,613,415 |
Created attachment 9246010
edit.xpi
Since possibly 95.0a1 (2021-10-10) (64-bit), the browserAction pop-up & sidebar has been failing.
Once Firefox starts, they work and gradually start to fail. It has been the same for multiple unsigned addons that I have installed.
- When FF starts, pop-ups work
- After a while they stop working
- Opening a new window, pop-ups don't work
- Opening a new Private window and pop-ups work
- After a while, pop-ups also start to fail in Private window
Error messages
```
Layout was forced before the page was fully loaded. If stylesheets are not yet loaded this may cause a flash of unstyled content.
```
```
FrameData missing for ******* page moz-extension://************/content/popup.html ExtensionPageChild.jsm:429
initExtensionContext resource://gre/modules/ExtensionPageChild.jsm:429
initExtensionDocument resource://gre/modules/ExtensionProcessScript.jsm:322
```
I noticed that loading the popup or sidebar without the `stylesheet` solves the problem.
**Does not work**
```html
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<title>Popup</title>
<link rel="stylesheet" href="popup.css">
<script type="module" src="popup.js"></script>
</head>
```
**Works**
```html
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<title>Popup</title>
<!-- <link rel="stylesheet" href="popup.css"> -->
<script type="module" src="popup.js"></script>
</head>
```
|
|
1,736,046 | 15,614,506 |
Using the fuzzing target in bug 1590068 (a target that uses `dom::ipc::StructuredCloneData` as its entry point to cover the StructuredCloneReader code that is browser-only), I was able to find the following crash on mozilla-central revision 9b9f8bfe2625+.
Backtrace:
Assertion failure: data.Size() % 8 == 0, at vm/StructuredClone.cpp:727
==15383==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7fb64f4eb133 bp 0x7ffdfbf3ae10 sp 0x7ffdfbf3abf0 T15383)
#0 0x7fb64f4eb133 in SCInput js/src/vm/StructuredClone.cpp:727:3
#1 0x7fb64f4eb133 in ReadStructuredClone(JSContext*, JSStructuredCloneData const&, JS::StructuredCloneScope, JS::MutableHandle<JS::Value>, JS::CloneDataPolicy const&, JSStructuredCloneCallbacks const*, void*) js/src/vm/StructuredClone.cpp:703:11
#2 0x7fb64f5001c0 in JS_ReadStructuredClone(JSContext*, JSStructuredCloneData const&, unsigned int, JS::StructuredCloneScope, JS::MutableHandle<JS::Value>, JS::CloneDataPolicy const&, JSStructuredCloneCallbacks const*, void*) js/src/vm/StructuredClone.cpp:3382:10
#3 0x7fb64f501358 in JSAutoStructuredCloneBuffer::read(JSContext*, JS::MutableHandle<JS::Value>, JS::CloneDataPolicy const&, JSStructuredCloneCallbacks const*, void*) js/src/vm/StructuredClone.cpp:3508:12
#4 0x7fb64a7c20af in Read dom/base/StructuredCloneHolder.cpp:289:22
#5 0x7fb64a7c20af in mozilla::dom::StructuredCloneHolder::Read(nsIGlobalObject*, JSContext*, JS::MutableHandle<JS::Value>, JS::CloneDataPolicy const&, mozilla::ErrorResult&) dom/base/StructuredCloneHolder.cpp:375:35
#6 0x7fb64a7bff0e in mozilla::dom::StructuredCloneHolder::Read(nsIGlobalObject*, JSContext*, JS::MutableHandle<JS::Value>, mozilla::ErrorResult&) dom/base/StructuredCloneHolder.cpp:362:10
#7 0x7fb64cf9e66a in mozilla::dom::ClonedErrorHolder::ToErrorValue(JSContext*, JS::MutableHandle<JS::Value>) dom/ipc/ClonedErrorHolder.cpp:263:10
#8 0x7fb64cf9e464 in mozilla::dom::ClonedErrorHolder::ReadStructuredClone(JSContext*, JSStructuredCloneReader*, mozilla::dom::StructuredCloneHolder*) dom/ipc/ClonedErrorHolder.cpp:225:43
#9 0x7fb64a7c4736 in mozilla::dom::StructuredCloneHolder::CustomReadHandler(JSContext*, JSStructuredCloneReader*, JS::CloneDataPolicy const&, unsigned int, unsigned int) dom/base/StructuredCloneHolder.cpp:1009:12
#10 0x7fb64f4fb205 in JSStructuredCloneReader::startRead(JS::MutableHandle<JS::Value>, js::gc::InitialHeap) js/src/vm/StructuredClone.cpp:2814:11
#11 0x7fb64f4eb2b2 in JSStructuredCloneReader::read(JS::MutableHandle<JS::Value>, unsigned long) js/src/vm/StructuredClone.cpp:3226:8
#12 0x7fb64f4eb071 in ReadStructuredClone(JSContext*, JSStructuredCloneData const&, JS::StructuredCloneScope, JS::MutableHandle<JS::Value>, JS::CloneDataPolicy const&, JSStructuredCloneCallbacks const*, void*) js/src/vm/StructuredClone.cpp:705:12
#13 0x7fb64f5001c0 in JS_ReadStructuredClone(JSContext*, JSStructuredCloneData const&, unsigned int, JS::StructuredCloneScope, JS::MutableHandle<JS::Value>, JS::CloneDataPolicy const&, JSStructuredCloneCallbacks const*, void*) js/src/vm/StructuredClone.cpp:3382:10
#14 0x7fb64a7c29fd in mozilla::dom::StructuredCloneHolder::ReadFromBuffer(nsIGlobalObject*, JSContext*, JSStructuredCloneData&, unsigned int, JS::MutableHandle<JS::Value>, JS::CloneDataPolicy const&, mozilla::ErrorResult&) dom/base/StructuredCloneHolder.cpp:409:8
#15 0x7fb64a7c2954 in mozilla::dom::StructuredCloneHolder::ReadFromBuffer(nsIGlobalObject*, JSContext*, JSStructuredCloneData&, JS::MutableHandle<JS::Value>, JS::CloneDataPolicy const&, mozilla::ErrorResult&) dom/base/StructuredCloneHolder.cpp:395:3
#16 0x7fb64d0123a1 in mozilla::dom::ipc::StructuredCloneData::Read(JSContext*, JS::MutableHandle<JS::Value>, JS::CloneDataPolicy const&, mozilla::ErrorResult&) dom/ipc/StructuredCloneData.cpp:116:3
#17 0x7fb64d00cade in mozilla::dom::ipc::StructuredCloneData::Read(JSContext*, JS::MutableHandle<JS::Value>, mozilla::ErrorResult&) dom/ipc/StructuredCloneData.cpp:104:3
#18 0x7fb648137ddc in FuzzingRunDomSC(unsigned char const*, unsigned long) dom/base/fuzztest/FuzzStructuredClone.cpp:61:10
[...]
#29 0x55884436efe8 in _start (objdir-ff-fuzzing-debug/dist/bin/firefox+0x52fe8)
The target code has not landed on mozilla-central yet, if you need it to reproduce (in case stack + test attached do not suffice), you will need to rebuild with the patch in bug 1590068 (feel free to ping me for instructions).
Also marking s-s because the parent fuzzing bug is still locked and it's unclear what caused the misalignment here.
|
|
1,736,385 | 15,618,376 |
Crash report: https://crash-stats.mozilla.org/report/index/003d96b6-943f-4dfc-b9a0-91f750211016
Reason: ```EXCEPTION_ACCESS_VIOLATION_READ```
Top 8 frames of crashing thread:
```
0 xul.dll mozilla::net::CacheIOThread::ThreadFunc netwerk/cache2/CacheIOThread.cpp:465
1 xul.dll static mozilla::net::CacheIOThread::ThreadFunc netwerk/cache2/CacheIOThread.cpp:406
2 nss3.dll _PR_NativeRunThread nsprpub/pr/src/threads/combined/pruthr.c:399
3 nss3.dll pr_root nsprpub/pr/src/md/windows/w95thred.c:139
4 ucrtbase.dll thread_start<unsigned int >
5 kernel32.dll BaseThreadInitThunk
6 ntdll.dll __RtlUserThreadStart
7 ntdll.dll _RtlUserThreadStart
```
Crash address is 0xe5e5e5e5
Stack seems to point to the call to [LoopOneLevel](https://searchfox.org/mozilla-central/rev/5122357c497684e01c5bb2d4a9bf8be1fe97a413/netwerk/cache2/CacheIOThread.cpp#465) but it's not entirely clear what causes the crash
|
|
1,724,896 | 15,521,720 |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36
Steps to reproduce:
1. Set up a system at https://fb.mvfst.net/15 which speaks HTTP/3, and returns an HTTP/3 header with a newline in it.
2. Browse to it in Firefox with the Network tab open
Actual results:
The page loads properly and the Network tab indicates that Firefox parsed the header with a newline as two separate headers, similar to how it would have been parsed in HTTP/1.1
Expected results:
The page should fail to load, because the QPACK encoding for headers should allow Firefox to recognize that a single header containing a newline is present, and newlines are not allowed in headers.
|
|
1,725,572 | 15,526,241 |
~70 crashes from ~50 installations with 92.0 betas, >50% on Windows 7 with ~90% on x86. The signature got added in bug 1722378.
Maybe Fission related. (DOMFissionEnabled=1)
Crash report: https://crash-stats.mozilla.org/report/index/8d2cb23d-5443-4977-8391-86bed0210813
MOZ_CRASH Reason: ```MOZ_CRASH(Content child abort due to IPC error)```
Top 10 frames of crashing thread:
```
0 xul.dll mozilla::dom::ContentChild::ProcessingError dom/ipc/ContentChild.cpp:2237
1 xul.dll static mozilla::ipc::IPCResult::Fail ipc/glue/ProtocolUtils.cpp:63
2 xul.dll mozilla::dom::ContentChild::RecvConstructBrowser dom/ipc/ContentChild.cpp:1747
3 xul.dll mozilla::dom::PContentChild::OnMessageReceived ipc/ipdl/PContentChild.cpp:8479
4 xul.dll mozilla::ipc::MessageChannel::DispatchMessage ipc/glue/MessageChannel.cpp:1978
5 xul.dll mozilla::TaskController::DoExecuteNextTaskOnlyMainThreadInternal xpcom/threads/TaskController.cpp:805
6 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1148
7 xul.dll mozilla::ipc::MessagePump::Run ipc/glue/MessagePump.cpp:85
8 xul.dll MessageLoop::RunHandler ipc/chromium/src/base/message_loop.cc:324
9 xul.dll MessageLoop::Run ipc/chromium/src/base/message_loop.cc:306
```
|
|
1,725,652 | 15,526,666 |
Created attachment 9236192
screenshot_dropdown_menu
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0
Steps to reproduce:
1. Clear all history, except cookies.
2. Updated to Firefox 91.
3. Enter one letter in the urlbar, e.g. 'v'.
Actual results:
Drop-down menu showed random bookmarks with the letter 'v' in it.
Expected results:
It should show "JanVissersWeer.nl" (weather forecast), like it did before the update (see screenshot).
I have set urlbar suggestions to only show bookmarks.
|
|
1,725,828 | 15,527,823 |
Created attachment 9236331
Screenshot-20210814154906-1239x1047.png
User Agent: Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0
Steps to reproduce:
Log in to https://open.spotify.com/
Actual results:
The bar at the top of the page says "WidevineCDM plugin has crashed."
Expected results:
Spotify is able to play music.
|
|
1,726,022 | 15,530,868 |
## Steps to reproduce
1. Open `about:logins`
## Actual results
- Load takes 22s...
- ... during which the main `firefox-bin` process keeps 1 CPU core (out of 4) 100% busy, making the laptop fans spin :-/
Symptoms are very reminiscent of Bug 1606992 from 2 years ago.
## Expected results
Opening the password manager is usually instant and doesn't make the fans spin.
This was the case a few days / weeks ago. I'm not sure in which Nightly this started happening, probably somewhere early August.
## Debug information
- Firefox 93.0a1 - 20210816094534 (official binary build from mozilla.org)
- Arch Linux 64bit
- 361 passwords
- Using a master password, whose config didn't change recently (master password wasn't recently deleted/recreated)
- Passwords are _not_ synced with Firefox Sync, they're local only
- Feel free to ask for more info
|
|
1,726,124 | 15,531,550 |
Created attachment 9236619
screenshot
Steps to reproduce.
1. open attached html
2. when tab spinner stops spinning, scroll down
Actual results:
high cpu usage and rendering stops for long period.
Profiler : https://share.firefox.dev/3CWZrhY
Screenshot: see attached
Setting accessibility.force_disabled to 1 fixes the issue.
|
|
1,726,319 | 15,533,147 |
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0
Steps to reproduce:
I have a gmail account setup with imap.
It has around 60k messages.
Although I set the option to syncronise all msgs locally, if I work offline not all messages are there.
Moreover, in activity manager, tb is stuck indexing messages at 0%.
I tried to both repair forlder and force syncronization, but this does not solve my issue.
|
|
1,726,381 | 15,533,489 |
Created attachment 9236853
evince-LINK-1031-0-GOOD.pdf
**Note**
* When the user loads a specific PDF file in Adobe Reader, selects some specific checkbox then unchecks it, and then saves it and reopens it, he will notice that the checkbox shows it's checked when in fact it should be unchecked.
**Affected versions**
* Nightly v92.0b5
**Affected platforms**
* all
**Steps to reproduce**
1. Launch browser.
2. Flip "pdfjs.enableXfa" to true.
3. Load http://static.anaf.ro/static/10/Anaf/Declaratii_R/AplicatiiDec/D100_710_XML_1220_260321.pdf
4. Check the checkboxes:
[ ] Declaraţie depusă după anularea rezervei verificării ulterioare
[ ] Declaraţie depusă potrivit art.90 alin.(4) din Legea nr.207/2015 privind Codul de Procedură fiscală
5. Uncheck them!
5. Save the PDF file.
6. Reopen it.
**Expected result**
* The checkboxes should be unchecked.
**Actual result**
* The checkboxes are checked.
**Regression range**
* Not a regression.
**Additional information**
* This issue does not occur on all checkboxes, but on specific ones.
|
|
1,726,606 | 15,534,967 |
As above.
Recently, we decided to default FFHCM to "with HCM themes" on MacOS, but this has caused some confusion for users for whom "increase contrast" previously had no effect on FF HCM. We should revert (and uplift) this change, restoring the UX we had before.
|
|
1,729,971 | 15,562,739 |
Created attachment 9240373
0f5a3305-976f-4749-9ff4-41dd9720682b.pdf
**Note**
* When the user opens a specific PDF file in Firefox, inputs some data, saves it and then opens it in Adobe Reader, he will notice that the saved PDF is now corrupted.
The message displayed in Adobe Reader: "There was an error opening this document. There was a problem reading this document (135)."
**Affected versions**
* Beta v93.0b2
**Affected platforms**
* all
**Steps to reproduce**
1. Launch browser.
2. Load the attached PDF file.
3. Input some data in any field.
4. Save the document (CTRL+S)
5. Open the document in Adobe Reader.
**Expected result**
* Document is properly displayed in Adobe Reader along with the previously input data.
**Actual result**
* Adobe reader shows an error message and does not open the PDF form.
**Regression range**
* Not a regression.
**Additional Information:**
* The input data is properly displayed if opened in Firefox again.
* I do not know whether this should block bug 1706133. Remove the block if not necessary.
* The document gets corrupted even if the only completed field is the first field.
|
|
1,730,598 | 15,568,583 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
Steps to reproduce:
(I'm actually on the latest Nightly with RFP)
1. Visit `https://dykstra.weebly.com/uploads/1/0/4/6/1046090/reading_poetry_article.pdf`
Actual results:
The PDF pages do not display
Expected results:
The PDF pages are visible
|
|
1,731,049 | 15,572,049 |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36 OPR/78.0.4093.184
Steps to reproduce:
1. Open Firefox as RemoteApp over RDP
1a. Tested with:
- Local system: Windows 10, connection through mstsc
- Remote system: Windows Server 2019, Windows 10
2. Download a file
3. Save in a folder on a mapped drive from the local machine
Actual results:
The file appears to be downloading, but fails after the progress bar is finished. A file does appear in the selected folder, but it has a size of 0 bytes.
Expected results:
The downloaded file is successfully saved into the selected folder. This worked well up until version 82.0.3. The problem first occurred in version 83 and is still present in version 90.
|
|
1,732,416 | 15,583,681 |
Maybe Fission related. (DOMFissionEnabled=1)
Crash report: https://crash-stats.mozilla.org/report/index/a4ffbe9e-5486-481c-99a8-1bf8f0210923
MOZ_CRASH Reason: ```MOZ_DIAGNOSTIC_ASSERT(IsAtomic<bool>::value || NS_IsMainThread()) (Non-atomic static pref 'media.decoder-doctor.wmf-disabled-is-failure' being accessed on background thread by getter)```
Top 10 frames of crashing thread:
```
0 xul.dll mozilla::PDMFactory::CreatePDMs dom/media/platforms/PDMFactory.cpp:440
1 xul.dll mozilla::AllocationWrapper::CreateDecoder::<unnamed-tag>::operator const dom/media/platforms/AllocationPolicy.cpp:215
2 xul.dll static mozilla::MozPromise<RefPtr<mozilla::AllocPolicy::Token>, bool, 1>::InvokeMethod<`lambda at /builds/worker/checkouts/gecko/dom/media/platforms/AllocationPolicy.cpp:141:7', RefPtr<mozilla::MozPromise<RefPtr<mozilla::AllocPolicy::Token>, bool, 1> > xpcom/threads/MozPromise.h:630
3 xul.dll mozilla::MozPromise<RefPtr<mozilla::AllocPolicy::Token>, bool, 1>::ThenValue<`lambda at /builds/worker/checkouts/gecko/dom/media/platforms/AllocationPolicy.cpp:205:15', `lambda at /builds/worker/checkouts/gecko/dom/media/platforms/AllocationPolicy.cpp:232:15'>::DoResolveOrRejectInternal xpcom/threads/MozPromise.h:846
4 xul.dll mozilla::MozPromise<RefPtr<mozilla::AllocPolicy::Token>, bool, 1>::ThenValueBase::ResolveOrRejectRunnable::Run xpcom/threads/MozPromise.h:487
5 xul.dll mozilla::TaskQueue::Runner::Run xpcom/threads/TaskQueue.cpp:208
6 xul.dll nsThreadPool::Run xpcom/threads/nsThreadPool.cpp:303
7 xul.dll nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:1142
8 xul.dll mozilla::ipc::MessagePumpForNonMainThreads::Run ipc/glue/MessagePump.cpp:300
9 xul.dll MessageLoop::RunHandler ipc/chromium/src/base/message_loop.cc:324
```
This looks like a thread safety check on a preference getter. There are a few crashes, but all from the same user, so maybe their have some weird prefs set.
|
|
1,732,692 | 15,586,799 |
Created attachment 9243028
residual line between tab and toolbar
**Affected versions**
* Fx94.0a1
**Affected platforms**
* Windows 10
* Ubuntu 20.04
**Preconditions**
Set browser.theme.temporary.monochromatic.enabled = true
Select any monochromatic theme.
**Steps to reproduce**
1. Launch Firefox.
2. Observe the tab bar and the toolbar.
**Expected result**
* There is no 'separator', the color change is done directly.
**Actual result**
* There is a residual line separating the tab bar from the toolbar.
**Regression range**
* Not a regression.
**Additional notes**
* Please note that the issue occurs with all the monochromatic themes.
* The 'old' themes (Default, Light, Dark and Alpenglow) don't have this issue.
|
|
1,733,757 | 15,594,108 |
Crash report: https://crash-stats.mozilla.org/report/index/5e834290-9eb1-4d57-bad7-f90750211002
MOZ_CRASH Reason: ```Bug: next_index pointed at non-free list entry (or end of list)```
Top 10 frames of crashing thread:
```
0 libxul.so RustMozCrash mozglue/static/rust/wrappers.cpp:18
1 libxul.so mozglue_static::panic_hook mozglue/static/rust/lib.rs:91
2 libxul.so core::ops::function::Fn::call library/core/src/ops/function.rs:70
3 libxul.so std::panicking::rust_panic_with_hook library/std/src/panicking.rs:626
4 libxul.so std::panicking::begin_panic::{{closure}} library/std/src/panicking.rs:542
5 libxul.so std::sys_common::backtrace::__rust_end_short_backtrace library/std/src/sys_common/backtrace.rs:141
6 libxul.so std::panicking::begin_panic library/std/src/panicking.rs:541
7 libxul.so ffi_support::handle_map::ConcurrentHandleMap<T>::insert third_party/rust/ffi-support/src/handle_map.rs:762
8 libxul.so glean_labeled_counter_metric_get third_party/rust/glean-ffi/src/labeled.rs:77
9 libjnidispatch.so libjnidispatch.so@0x10154
```
|
|
1,734,027 | 15,597,743 |
Crash report: https://crash-stats.mozilla.org/report/index/dd68d07c-aed5-4664-ba6a-ce9c20211004
New crash in Fenix 93.
Reason: ```SIGSEGV / SEGV_MAPERR```
Top 10 frames of crashing thread:
```
0 @0x0
1 libxul.so mozilla::ScopedDrawCallWrapper::ScopedDrawCallWrapper dom/canvas/WebGLContext.cpp:1288
2 libxul.so libxul.so@0x730c824
3 libxul.so mozilla::WebGLContext::Clear dom/canvas/WebGLContextFramebufferOperations.cpp:59
4 @0x7edd530ffc
5 libxul.so mozilla::dom::WebGLRenderingContext_Binding::vertexAttribPointer dom/bindings/WebGLRenderingContextBinding.cpp:22081
6 @0x7f84222ffc
7 libxul.so bool mozilla::dom::binding_detail::GenericGetter<mozilla::dom::binding_detail::NormalThisPolicy, mozilla::dom::binding_detail::ThrowExceptions> dom/bindings/BindingUtils.cpp:3172
8 @0x7f84223014
9 libxul.so js::InternalCallOrConstruct js/src/vm/Interpreter.cpp:488
```
|
|
1,734,126 | 15,598,586 |
Created attachment 9244331
screen recording of the issue (about welcome).gif
**[Affected Versions]:**
- Firefox Nightly 95.0a1 (Build ID: 20211004215121)
- Firefox Beta 94.0b1 (Build ID: 20211004193346)
**[Affected Platforms]:**
- Windows 10 x64
- macOS 10.15.7
- Linux Mint 20
**[Steps to reproduce]:**
1. Open the latest Nightly/Beta build.
2. Open a New Tab page and navigate to the "about:welcome" page.
3. Navigate through onboarding until the "Life in color" panel is displayed.
4. Click on the "Not now" button.
5. Click the browser's "Back" button.
6. Wait a few seconds and observe the behavior.
**[Expected results]:**
- The Onboarding is not dismissed.
**[Actual results]:**
- The Onboarding is dismissed after a few seconds.
**[Notes]:**
- After navigating back from the "Thank you" page, if you choose another theme, the selected theme remains applied after the Onboarding page is dismissed.
- The issue is not reproducible for the Upgrade Spotlight modal since there is no option to return to the previous pages.
- Attached is a screen recording of the issue.
|
|
1,726,745 | 15,535,719 |
Created attachment 9237189
rec of the issue.gif
**[Affected versions]:**
- Firefox Nightly 93.0a1 - Build ID: 20210819214942
**[Affected Platforms]:**
- Windows 10 x64
- macOS 11.5.2
- Ubuntu 20.04 x64
**[Prerequisites]:**
- Have a Firefox profile with the "messaging-system.rsexperimentloader.collection_id" pref set to "nimbus-preview" in the "about:config" page.
- Have the "Remote Settings Devtools" add-on installed from [here](https://github.com/mozilla-extensions/remote-settings-devtools/releases).
- Have a captive portal available but you are **NOT** connected to it.
**[Steps to reproduce]:**
1. Open the browser with the profile from prerequisites and click the "Remote Settings Devtools" toolbar button.
2. Change the "Environment" to "Stage" and restart the browser.
3. Connect to the captive portal from the prerequisites.
4. Click the "Open network login page" button from the infobar.
5. Enter your credentials and log in to the captive portal.
6. Click the "Learn more" button and observe the behavior.
**[Expected result]:**
- The infobar is dismissed and you are redirected to the "https://www.mozilla.org/en-US/products/vpn/" page.
**[Actual result]:**
- The infobar is dismissed but you are not redirected to any page.
**[Notes]:**
- The issue is also reproducible when triggering the "VPN_CAPTIVE_PORTAL_EXPERIMENT" from the "about:newtab#asrouter" page.
- Attached a screen recording of the issue.
|
|
1,726,789 | 15,535,955 |
Created attachment 9237225
error message in adobe after saving in Firefox.png
**Note**
* When the user opens a specific PDF file in Firefox, inputs some data, saves it and opens it in Adobe Reader, he will notice that the PDF will display an error and won't open.
**Affected versions**
* Beta v92.0b6
**Affected platforms**
* all
**Steps to reproduce**
1. Launch browser.
2. Load the attached PDF file in Firefox.
3. Input some data in any field.
4. Save the document (CTRL+S)
5. Open the document in Adobe Reader.
**Expected result**
* The data input using the browser is displayed in Adobe Reader.
**Actual result**
* The PDF will display an error and won't open.
**Regression range**
* Not a regression.
**Additional Information:**
* I do not know whether this should block bug 1706133. Remove the block if not necessary.
* The input data is properly displayed if opened in Firefox again
* This issue appears to be intermittent or it may be related to a specific data input; please refer to the error screenshots attached next.
* Setting the S3 severity based on the last 2 paragraphs.
* Also, please let me know if further testing is necessary.
|
|
1,726,793 | 15,535,979 |
**[Affected Versions]:**
Firefox Nightly 93.0a1 - Build ID: 20210820095755
**[Affected Platforms]:**
- macOS 11.5.2
- Ubuntu Linux 20.04 x64
**[Prerequisites]:**
- Have a Firefox profile with the "messaging-system.rsexperimentloader.collection_id" pref set to "nimbus-preview" in the "about:config" page.
- Have the "Remote Settings Devtools" add-on installed from here.
- Have a captive portal available but you are NOT connected to it.
- The Firefox browser is set as default.
**[Steps to reproduce]:**
1. Open the browser with the profile from prerequisites and click the "Remote Settings Devtools" toolbar button.
2. Change the "Environment" to "Stage" and restart the browser.
3. Login to the captive portal using the automatically opened OS Captive Portal login window.
4. Observe the Firefox Browser.
**[Expected results]:**
- The “VPN Promo” infobar is displayed.
**[Actual results]:**
- Login is successful but the infobar is not displayed.
**[Notes]:**
- A recording of the issue can be seen [here](https://drive.google.com/file/d/1RavKANXRxSKNjErcDQo-aDBZShHCT9eV/view?usp=sharing).
- The issue is not reproducible on Windows 10.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.