Bug ID
int64
961
1.91M
Comment ID
int64
3.98k
17.1M
Author
stringlengths
8
48
Comment Text
stringlengths
1
64.3k
493,177
4,099,875
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b5pre) Gecko/20090514 Firefox/3.5.0 (.NET CLR 3.5.30729) Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b5pre) Gecko/20090514 Firefox/3.5.0 (.NET CLR 3.5.30729) When loading certain page, the browser is crashing. Reproducible: Always Steps to Reproduce: 1.Start Minefield.Shiretoko with new profile 2.Go URL 3. Actual Results: The browser is crashing. with crash report. Expected Results: No crash. Regression range in Minefield(1.9.2): Works fine: http://hg.mozilla.org/mozilla-central/rev/68cfe7fb9f31 Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2a1pre) Gecko/20090413 Minefield/3.6a1pre (.NET CLR 3.5.30729) Broken: http://hg.mozilla.org/mozilla-central/rev/68d9acc70491 Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2a1pre) Gecko/20090414 Minefield/3.6a1pre (.NET CLR 3.5.30729) Pushlog: http://hg.mozilla.org/mozilla-central/p ... d9acc70491 Crash report: Firefox 3.6a1pre Crash Report [@ js_Interpret ] http://crash-stats.mozilla.com/report/i ... 090515?p=1 Regression range in Shiretoko(1.9.1): Works fine: http://hg.mozilla.org/releases/mozilla- ... 39d6b3b56d Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b4pre) Gecko/20090418 Shiretoko/3.5b4pre Broken: http://hg.mozilla.org/releases/mozilla- ... a5ebd9a59c Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b4pre) Gecko/20090419 Shiretoko/3.5b4pre Pushlog: http://hg.mozilla.org/releases/mozilla- ... a5ebd9a59c Crash report: Firefox 3.5b4pre Crash Report [@ js_Interpret ] http://crash-stats.mozilla.com/report/i ... 090514?p=1 There is no check-in which overlaps between 1.9.1 and 1.9.2. But Crash Report [@ js_Interpret ] is same. And reported in http://forums.mozillazine.org/viewtopic.php?p=6487075#p6487075 , http://forums.mozillazine.org/viewtopic.php?p=6487095#p6487095 The browser is crashing on Windows Vista SP1 and Windows 7RC also.
493,281
4,100,721
Steps to reproduce: -> Load http://www.tuning.fr/compts/compteurs.php?compts_id=1670&scrw=1680 --> Crashs 1.9.1 opt/debug builds Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b5pre) Gecko/20090515 Shiretoko/3.5b5pre and trunk Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2a1pre) Gecko/20090515 Minefield/3.6a1pre (fa8.18c): Access violation - code c0000005 (!!! second chance !!!) eax=3ecb3f57 ebx=7ffdf000 ecx=0012ea4c edx=06389f15 esi=00d0b4e8 edi=00150000 eip=06389f39 esp=0012d934 ebp=0012d950 iopl=0 nv up ei pl nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202 06389f39 3b00 cmp eax,dword ptr [eax] ds:0023:3ecb3f57=???????? The stack trace contains one or more locations for which no symbol or module could be found. This may be a sign of stack corruption. ChildEBP RetAddr WARNING: Frame IP not in any known module. Following frames may be wrong. 0012d930 0028b31d 0x6389f39 0012d950 02c6dc49 xpcom_core!nsQueryInterface::operator()+0x2d 0284f81c 6c6c697a gklayout!nsCOMPtr<nsIDOMHTMLDocument>::assign_from_qi+0x19 0284f81c 00000000 0x6c6c697a quit:
499,169
4,158,869
The current topcrash in Firefox 3.5b99 and Firefox 3.5 (all RCs) happens with a signature of js_MonitorLoopEdge(JSContext*, unsigned int&). On trunk, it appears further down in the topcrash list and, currently, doesn't have any crashes on Windows. It seems to happen across platforms on 1.9.1, however, and the top two frames all appear to be random hex numbers. Query for Firefox 3.5 (RC) crashes: http://crash-stats.mozilla.com/report/list?product=Firefox&version=Firefox%3A3.5&query_search=signature&query_type=exact&query=&date=&range_value=1&range_unit=weeks&do_query=1&signature=js_MonitorLoopEdge%28JSContext*%2C%20unsigned%20int%26%29 Typically, the crash happens with the following stack, taken from bp-3d4e216c-f4bf-4444-b663-1e82d2090617: Frame Module Signature [Expand] Source 0 @0x4122c24 1 @0x12ecbb 2 js3250.dll js_MonitorLoopEdge js/src/jstracer.cpp:4862 3 js3250.dll js_Interpret js/src/jsinterp.cpp:3308 However, sometimes it appears with the following stack, taken from bp-b786c839-de39-4468-925b-065b72090618: Frame Module Signature [Expand] Source 0 @0x162d0c0c 1 @0xbfffc5f7 2 libmozjs.dylib js_MonitorLoopEdge js/src/jstracer.cpp:4862 3 libmozjs.dylib js_Interpret js/src/jsinterp.cpp:3308 4 libmozjs.dylib js_Invoke js/src/jsinterp.cpp:1394 5 libmozjs.dylib js_fun_apply js/src/jsfun.cpp:2074 6 libmozjs.dylib js_Interpret js/src/jsinterp.cpp:5147 7 libmozjs.dylib js_Invoke js/src/jsinterp.cpp:1394 8 libmozjs.dylib js_fun_apply js/src/jsfun.cpp:2074 9 libmozjs.dylib js_Interpret js/src/jsinterp.cpp:5147 10 libmozjs.dylib js_Invoke js/src/jsinterp.cpp:1394 11 libmozjs.dylib js_fun_apply js/src/jsfun.cpp:2074 12 libmozjs.dylib js_Interpret js/src/jsinterp.cpp:5147 13 libmozjs.dylib js_Invoke js/src/jsinterp.cpp:1394 14 libmozjs.dylib js_fun_apply js/src/jsfun.cpp:2074 15 libmozjs.dylib js_Interpret js/src/jsinterp.cpp:5147 16 libmozjs.dylib js_Invoke js/src/jsinterp.cpp:1394 17 libmozjs.dylib js_fun_apply js/src/jsfun.cpp:2074 18 libmozjs.dylib js_Interpret js/src/jsinterp.cpp:5147 19 libmozjs.dylib js_Execute js/src/jsinterp.cpp:1622 20 libmozjs.dylib JS_EvaluateUCScriptForPrincipals js/src/jsapi.cpp:5145 21 XUL nsJSContext::EvaluateString dom/src/base/nsJSEnvironment.cpp:1631 22 XUL nsScriptLoader::EvaluateScript content/base/src/nsScriptLoader.cpp:686 23 XUL nsScriptLoader::ProcessRequest content/base/src/nsScriptLoader.cpp:600 24 XUL nsScriptLoader::ProcessPendingRequests content/base/src/nsScriptLoader.cpp:740 25 XUL nsRunnableMethod<nsScriptLoader>::Run nsThreadUtils.h:264 26 XUL nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:510 27 XUL NS_ProcessNextEvent_P nsThreadUtils.cpp:227 28 XUL nsThread::Shutdown xpcom/threads/nsThread.cpp:465 29 XUL NS_InvokeByIndex_P xpcom/reflect/xptcall/src/md/unix/xptcinvoke_unixish_x86.cpp:179 30 XUL nsProxyObjectCallInfo::Run xpcom/proxy/src/nsProxyEvent.cpp:181 31 XUL nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:510 32 XUL NS_ProcessPendingEvents_P nsThreadUtils.cpp:180 33 XUL nsBaseAppShell::NativeEventCallback widget/src/xpwidgets/nsBaseAppShell.cpp:121 34 XUL nsAppShell::ProcessGeckoEvents widget/src/cocoa/nsAppShell.mm:405 35 CoreFoundation CFRunLoopRunSpecific 36 CoreFoundation CFRunLoopRunInMode 37 HIToolbox RunCurrentEventLoopInMode 38 HIToolbox ReceiveNextEventCommon 39 HIToolbox BlockUntilNextEventMatchingListInMode 40 AppKit _DPSNextEvent 41 AppKit -[NSApplication nextEventMatchingMask:untilDate:inMode:dequeue:] 42 AppKit -[NSApplication run] 43 XUL nsAppShell::Run widget/src/cocoa/nsAppShell.mm:720 44 XUL nsAppStartup::Run toolkit/components/startup/src/nsAppStartup.cpp:193 45 XUL XRE_main toolkit/xre/nsAppRunner.cpp:3298 46 firefox-bin main browser/app/nsBrowserApp.cpp:156 47 firefox-bin firefox-bin@0x1541 48 firefox-bin firefox-bin@0x1468 49 @0x1 Filing as security-sensitive for now just to be safe.
501,605
4,177,638
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.9.1) Gecko/20090624 Firefox/3.5 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.9.1) Gecko/20090624 Firefox/3.5 I have tried firefox 3.5 final version today. It starts up very very slow(almost morethen two minutes). I have a very powerfull machine at work (Q6600 with 4 GB Ram). HEre is what i have done to resolve the issues - Cleared all the cache (also from ie just in case as i read somewhere that ie cache can also have an impact on startup) - disable update check for all three things - Tried to compact the data base by Vacuum command and finally when things didnt go well I removed the profile fodler from Documents and settings (removed mozilla folder) Even after doing all the things above i still have a very slow startup of firefox for the first time(after reboot), subsequent startups are fine (3-4)secs. I have also been experimenting with earlier releases beta 2,3,4 rc1 the problem started after beta 4 as far as i can remember. Reproducible: Always Steps to Reproduce: 1. Stat firefox after reboot 2. 3. Actual Results: starts up in 2 mins Expected Results: should start up in under 10 secs I also tried clean install with no plugins/extensins that didnt help either.
502,148
4,181,705
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.10) Gecko/2009042316 Firefox/3.0.10 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.10) Gecko/2009042316 Firefox/3.0.10 <html> <script> var buf ="AAAAAAAAAAAAAAAAAAAAA"; buf +=buf; buf +=buf; buf +=buf; buf +=buf; buf +=buf; buf +=buf; buf +=buf; buf +=buf; buf +=buf; buf +=buf; buf +=buf; buf +=buf; buf +=buf; buf +=buf; buf +=buf; buf +=buf; buf +=buf; buf +=buf; buf +=buf; buf +=buf; buf +=buf; var sec ="AAAAAAAAAAAAAAAAAAAAA"; sec+=sec; sec+=sec; sec+=sec; sec+=sec; sec+=sec; sec+=sec; sec+=sec; sec+=sec; sec+=sec; sec+=sec; sec+=sec; sec+=sec; sec+=sec; sec+=sec; sec+=sec; sec+=sec; sec+=sec; sec+=sec; sec+=sec; sec+=sec; var third="AAAAAAAAAAAAAAAAAAAAA"; third+=third; third+=third; third+=third; third+=third; third+=third; third+=third; third+=third; third+=third; third+=third; third+=third; third+=third; third+=third; third+=third; third+=third; var four ="AAAAAAAAAAAAAAAAAAAAA"; four+= four; four+= four; four+= four; four+= four; four+= four; four+= four; four+= four; four+= four; four+= four; four+= four; four+= four; four+= four; four+= four; var five ="AAAAAAAAAAAAAAAAAAAAA"; five+=five; five+=five; five+=five; five+=five; five+=five; five+=five; five+=five; five+=five; var six ="AAAAAAAAAAAAAAAAAAAAA"; six+=six; six+=six; six+=six; six+=six; six+=six; six+=six; six+=six; var seven ="AAAAAAAAAAAAAAAAAAAAA"; seven+=seven; seven+=seven; var nine ="AAAAAAAAAAAAAAAAAAAAA"; nine += nine; document.write(buf+sec+third+four+five+six+seven+nine+"AAAAA"); </script> </html> you can control ecx and edx with the vaules above "A" Reproducible: Sometimes Steps to Reproduce: 1.produce a buffer of size 21,to the power of 23 2. use document.write(buf) 3.values of buf change eip address, possable dos looking for address fa******, with value "a" Actual Results: it displayed a error saying firefox is going to close Expected Results: free the buf like what it would do if you enter alot more "A", which doesn't crash mozcrt19_free and xull.dll 6052065b
498,619
4,154,117
Steps to reproduce: 1. Open two or three pages 2. Open some page in new window and close it 3. Point History -> Recently Closed Windows 4. Move mouse upward on History menu Actual result: Page list on History menu is disappeared. Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2a1pre) Gecko/20090616 Minefield/3.6a1pre
507,292
4,223,252
BuildID=20090727101705 Steps to reproduce: Load http://www.warcraftlatino.com/ulduar/rank.html (c20.bb4): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. eax=04859130 ebx=7ffdf000 ecx=072a0410 edx=c0000005 esi=0000000f edi=00c8f6f0 eip=00519bd4 esp=0012e718 ebp=0012ee44 iopl=0 nv up ei pl nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010206 js3250!js_Interpret+0x103b4: 00519bd4 8b02 mov eax,dword ptr [edx] ds:0023:c0000005=???????? 0:000> !exploitable -v HostMachine\HostUser Executing Processor Architecture is x86 Debuggee is in User Mode Debuggee is a live user mode debugging session on the local machine Event Type: Exception Exception Faulting Address: 0xffffffffc0000005 First Chance Exception Type: STATUS_ACCESS_VIOLATION (0xC0000005) Exception Sub-Type: Read Access Violation Faulting Instruction:00519bd4 mov eax,dword ptr [edx] Basic Block: 00519bd4 mov eax,dword ptr [edx] Tainted Input Operands: edx 00519bd6 mov ecx,dword ptr [eax+0ch] Tainted Input Operands: eax 00519bd9 call ecx Tainted Input Operands: ecx, edx Exception Hash (Major/Minor): 0x2a690d26.0x1548251d Stack Trace: js3250!js_Interpret+0x103b4 js3250!js_Execute+0x2e6 js3250!JS_EvaluateUCScriptForPrincipals+0xe7 gklayout!nsJSContext::EvaluateString+0x2c0 gklayout!nsScriptLoader::EvaluateScript+0x37a gklayout!nsScriptLoader::ProcessRequest+0xfd gklayout!nsScriptLoader::ProcessScriptElement+0x1040 gklayout!nsScriptElement::MaybeProcessScript+0x149 gklayout!nsHTMLScriptElement::MaybeProcessScript+0x24 gklayout!nsHTMLScriptElement::DoneAddingChildren+0x1f gklayout!HTMLContentSink::ProcessSCRIPTEndTag+0xcf gklayout!SinkContext::CloseContainer+0x31d gklayout!HTMLContentSink::CloseContainer+0xa0 gkparser!CNavDTD::CloseContainer+0x18a gkparser!CNavDTD::HandleEndToken+0x214 gkparser!CNavDTD::HandleToken+0x4ae gkparser!CNavDTD::BuildModel+0x298 gkparser!nsParser::BuildModel+0xe2 gkparser!nsParser::ResumeParse+0x1bc gkparser!nsParser::ContinueInterruptedParsing+0xe5 gklayout!nsContentSink::ContinueInterruptedParsingIfEnabled+0x54 gklayout!nsRunnableMethod<nsContentSink>::Run+0x24 xpcom_core!nsThread::ProcessNextEvent+0x1fa xpcom_core!NS_ProcessNextEvent_P+0x53 gkwidget!nsBaseAppShell::Run+0x5d tkitcmps!nsAppStartup::Run+0x6b xul!XRE_main+0x3000 firefox!NS_internal_main+0x2b2 firefox!wmain+0x119 firefox!__tmainCRTStartup+0x1a6 firefox!wmainCRTStartup+0xd kernel32!BaseProcessStart+0x23 Instruction Address: 0x0000000000519bd4 Description: Data from Faulting Address controls Code Flow Short Description: TaintedDataControlsCodeFlow Exploitability Classification: PROBABLY_EXPLOITABLE Recommended Bug Title: Probably Exploitable - Data from Faulting Address controls Code Flow starting at js3250!js_Interpret+0x00000000000103b4 (Hash=0x2a690d26.0x1548251d) The data from the faulting address is later used as the target for a branch.
507,389
4,224,103
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.1.1) Gecko/20090718 Shiretoko/3.5.1 Build Identifier: bugzilla-3.4 User can see all products even he has no access to them. Reproducible: Always Steps to Reproduce: 1. create 2 products: prod1 and prod2 2. restrict user1 access only to prod1 3. try to edit own bug and see all products in combobox Actual Results: user can see full product list Expected Results: user can see allowed product list product list page works ok. problem affects only combo and listboxes on new chart and editbug pages
511,752
4,258,500
STEPS TO REPRODUCE: 0. (Probably best to start with a fresh profile) 1. Add a master password to your profile, if you don't already have one. 2. Install Weave "experimental version", linked on http://labs.mozilla.com/weave/ 3. Click "New Account" on Weave's firstrun page 4. Fill out the form with information for a new account 5. Click "Next" 6. Cancel the master password dialog that appears (presumably because Weave wants to save my new password/passphrase) 7. Sign out of Weave (via Firefox's tray) ACTUAL RESULTS: Weave returns to the login page, but the **password and passphrase are displayed in cleartext!!!** EXPECTED RESULTS: Weave shouldn't display my password / passphrase in cleartext. NOTE: From here, I can repeat steps 5-7 (sign in/out) and reproduce this bug over and over. If I actually enter my master password in one of these trials, the password/passphrase will be hidden with bullets from that point forward. (desired behavior) But until then, they're printed as plain text.
478,299
3,971,736
Seen while running Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.1b3pre) Gecko/20090212 Shiretoko/3.1b3pre. STR: 1. Visit http://tinyvid.tv/show/22axtzbrwetr4 and while the video is still loading, hit the pause button. 2. I crash, 100% reproducible. I also crash trying the same steps on other videos on that same page. Machine is 32 bit Windows Vista Ultimate with SP 1, 4 GB RAM.
479,143
3,979,737
Created attachment 362996 Apple crash report Seen while running Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090218 Firefox. STR: 1. I had ~50 tabs open. I left my machine for a moment and came back and had this crash. Breakpad: http://crash-stats.mozilla.com/report/index/7ec9b82d-a667-4c3a-9a43-688cd2090218 stephend has also seen this crash a number of times today. I also got a an Apple crash report, which has some different info than breakpad so I will attach it for reference.
479,198
3,980,453
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_6; en-us) AppleWebKit/525.27.1 (KHTML, like Gecko) Version/3.2.1 Safari/525.27.1 Build Identifier: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b2) Gecko/20081201 Firefox/3.1b3pre It appears that under some circumstances JavaScript memory may not be properly synchronized so that seemingly impossible conditions occur. This is causing TIBCO General Interface Builder 3.7 to fail to load. I've spent a lot of time debugging and the issue seems exceedingly complicated. Whether the bug shows up or not seems to be related to whether and how many logging statements are sent to a separate browser window and the number of sync and async XHR requests. The only consistent way to prevent the bug is to turn off jit.client in about:config. I'm attaching both the 3.7 GA release and a version of Model.js that I have used to debug this issue. In the modified file the "impossible" condition is shown on lines 455-458. var try1 = this.getServer(); jsx3.log("Hello world!"); var try2 = this.getServer(); jsx3.log(try1 + " " + try2); "try1" logs null while "try2" logs the server object. However, the implementation of getServer() clearly does nothing to affect the state of memory (line 563): Model_prototype.getServer = function() { var node = this; while (node) { if (node._jsxserver) return node._jsxserver; node = node._jsxparent; } return null; }; The call to jsx3.log() modifies some parts of memory and may call browser DOM methods but it certainly does not modify anything that might affect the getServer() method. Reproducible: Always Steps to Reproduce: 1. Unzip attachment 2. Launch GI_Builder.html in Firefox 3.1+ with jit.client enabled 3. Click through security warnings (suggest selecting "remember") Actual Results: Start-up fails. Error console shows "objServer is null" or "x.getServer() is null" usually in Model.js. Or, replace JSX/js/jsx3/app/Model.js with the attached file and then launch GI_Builder. In this case a long red stack track shows up in the Application Monitor external window. Just above it you can see the logging messages corresponding to Model.js lines 455-458: 23:17:15.526 global (INFO) - Hello world! 23:17:15.527 global (INFO) - null @jsx3.app.Server GI_Builder:jsx3.IDE Expected Results: Start-up completes with no such errors. This is the case in Firefox 3.0 or 3.1 with jit.client disabled. Testing on a dual-core mac book and able to reproduce in XP running in Fusion with two cores enabled.
473,552
3,929,789
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.1b2) Gecko/20090113 Gentoo Firefox/3.1b2 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.1b2) Gecko/20090113 Gentoo Firefox/3.1b2 Firefox 3.1b2 terminates with SIGILL on loading any page containing JavaScript. The illegal instruction, according to gdb, is nopl. My processor, VIA C3-2 Nehemiah, is among those that do not support nopl even though they probably should, being 686s. Related discussion for binutils: http://sourceware.org/bugzilla/show_bug.cgi?id=6957 ("There is also another related issue with i686 class CPUs. Some do not actually support the NOPL instruction. Examples include Via C3, Via Eden, AMD Geode LX (as used in OLPC), Transmeta Crusoe and it appears broken on Virtual PC.") Also: http://kerneltrap.org/mailarchive/linux-kernel/2008/9/16/3313464 Reproducible: Always Steps to Reproduce: 1. On e.g. a VIA C3-2 Nehemiah system, start Firefox 3.1b2 with javascript.options.jit.content enabled. 2. Visit a site containing JavaScript (reddit.com will do). Actual Results: Program received signal SIGILL, Illegal instruction. [Switching to Thread 0xb6333710 (LWP 27571)] 0xb5d70eb0 in ?? () (gdb) disas 0xb5d70eb0 0xb5d70eb1 Dump of assembler code from 0xb5d70eb0 to 0xb5d70eb1: 0xb5d70eb0: nopl (%eax) End of assembler dump. (gdb) bt #0 0xb5d70eb0 in ?? () #1 0xb7047acc in js_ExecuteTree () from /usr/lib/xulrunner-1.9/libmozjs.so #2 0xb70526e9 in js_MonitorLoopEdge () from /usr/lib/xulrunner-1.9/libmozjs.so #3 0xb6ff8532 in js_Interpret () from /usr/lib/xulrunner-1.9/libmozjs.so #4 0xb6ffaa4a in js_Execute () from /usr/lib/xulrunner-1.9/libmozjs.so #5 0xb6fbf1f3 in JS_EvaluateUCScriptForPrincipals () from /usr/lib/xulrunner-1.9/libmozjs.so #6 0xb790b0af in nsJSContext::EvaluateString () from /usr/lib/xulrunner-1.9/libxul.so [...] Workaround: Disable javascript.options.jit.* by editing prefs.js (Firefox will crash before you can go to about:config).
475,396
3,946,172
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090126 Shiretoko/3.1b3pre Build Identifier: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090126 Shiretoko/3.1b3pre http://crash-stats.mozilla.com/report/index/7f217050-1d75-4671-9cea-6899c2090126 Reproducible: Always Steps to Reproduce: 1. go to http://www.opodo.fr/ 2. fill the form departure by for exemple montreal 3. fill the form departure by for exemple los angeles 4. try to select the date by the javascript script 5. when the popup open double click on a date Actual Results: crash could be a duplicate bug of https://bugzilla.mozilla.org/show_bug.cgi?id=462091
475,916
3,951,068
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.9.2a1pre) Gecko/20090128 Minefield/3.2a1pre Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.9.2a1pre) Gecko/20090128 Minefield/3.2a1pre After clicking on the search box of http://www.facebook.com at upper right hand corner, firefox will crash. Crash even with new profile with no plugin, but it will not crash in Safe Mode. Reproducible: Always Steps to Reproduce: 1.browse to http://www.facebook.com and logon 2.click on the search box on the upper right hand corner 3.crash without typing anything Actual Results: crashed Expected Results: allow to type the search string start appear in hourly build 20090128 (I am using 20090128190032)
476,292
3,954,619
https://crash-stats.mozilla.com reports 124 of these over the last 96 hours (98 on Mac and 26 on Linux). This is equivalent to 784 crashes over two weeks, and probably makes this a topcrasher. (I can't get crash-stats to report over a longer period than 96 hours.) http://crash-stats.mozilla.com/?do_query=1&product=Firefox&query_search=stack&query_type=exact&query=nsNavBookmarks%3A%3AIsRealBookmark(long%20long)&date=&range_value=96&range_unit=hours I just saw a couple of these myself (with yesterday's Shiretoko nightly, on two different Macs, on startup). Here are my Breakpad IDs: bp-c9a68bb9-cb71-4af5-840a-ff1db2090131 bp-924b3999-f091-4c70-9e1b-8403a2090130
484,035
4,022,156
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b3) Gecko/20090305 Firefox/3.1b3 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2a1pre) Gecko/20090318 Minefield/3.6a1pre In Firefox 3.0.7 and earlier betas of Firefox 3.1, the browser would detect an infinite loop scenario and put up an "Unresponsive Script" alert asking the user if the script should be stopped. In Firefox 3.1b3 and the latest 3.6 nightlies this does not occur. An infinite loop on a browser page will permanently hang Firefox. Reproducible: Always Steps to Reproduce: 1. Type "javascript:while(1){}" into the location bar Actual Results: Browser hangs and never recovers. Expected Results: After a short while the "Unresponsive Script" dialog should display as it does in Firefox 3.0.7. The browser hangs in a new profile, with no extensions or plugins installed (scanning for plugins disabled such that none display in the Add-ons window or about:plugins) Strangely though, if I run in "-safe-mode" it does display the "Unresponsive Script" dialog. I'm not sure what difference there is between a new profile with no extensions or plug-ins and "-safe-mode".
487,215
4,049,275
Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2a1pre) Gecko/20090407 Minefield/3.6a1pre Steps to reproduce: 1. Open the URL. Actual result: Crashes. BuildID=20090406035346 SourceStamp=b14428284d51 works fine BuildID=20090407030745 SourceStamp=f0507c4d0abb fails Crash Report: http://crash-stats.mozilla.com/report/index/84fe518c-c2c1-4a6b-9168-18c422090407
471,101
3,907,953
[@ nsMenuItemIconX::OnStopRequest] is currently the #1 topcrash on trunk. I think I'm hitting this on more than 1 in 1000 startups.
471,307
3,909,693
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9) Gecko/2008052906 Firefox/3.0 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b3pre) Gecko/20081227 Lightning/1.0pre Folder index files are being corrupted when right-clicking a folder and doing "Properties... --> General Information --> Rebuild Index". The messages are still listed, but their content is no longer viewable. Once this occurs, the only solution is to shutdown Shredder and manually delete the associated .msf file. Regression Range: Works: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b3pre) Gecko/20081219 Shredder/3.0b2pre Broken: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b3pre) Gecko/20081220 Shredder/3.0b2pre Reproducible: Always Steps to Reproduce: 1. Right-click a folder (containing messages) and select "Properties... --> General Information --> Rebuild Index" 2. Click a different folder then reselect the folder in Step #1 and attempt to view any of the messages. Notice that no message content can be displayed. 3. Shutdown Shredder and delete the corresponding .msf file for the folder 4. Start Shredder and notice that you can now view the message content.
471,540
3,911,936
Steps to reproduce: 1. Load http://webapp1.latimes.com/homicide/homicideReport.php 2. Wait one second. Result: Assertion failure: cp >= buf, at /Users/jruderman/tracemonkey/js/src/jsnum.cpp:343
473,120
3,926,247
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-NZ; rv:1.9.1b2) Gecko/20081201 Firefox/3.1b2 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-NZ; rv:1.9.1b2) Gecko/20081201 Firefox/3.1b2 Hitting the Escape key while editing the bookmark properties will save any changes. Reproducible: Always Steps to Reproduce: 1.Edit a bookmark from right clicking on bookmark toolbar or bookmarks menu entry. 2.Change some text (name or URL). 3.Hit ESC Actual Results: Changes to bookmark properties are saved. Expected Results: Changes should be ignored. Tested in safe mode (addons/themes disabled).
467,747
3,878,872
User-Agent: Mozilla/5.0 (X11; U; Linux i686 (x86_64); en-US; rv:1.9.1b3pre) Gecko/20081203 Shiretoko/3.1b3pre Build Identifier: Mozilla/5.0 (X11; U; Linux i686 (x86_64); en-US; rv:1.9.1b3pre) Gecko/20081203 Shiretoko/3.1b3pre Sometimes, the add-on manager shows no add-ons and searching doesn't work. The add-ons are still present and running because they have their various icons in the status bar. Reproducible: Sometimes Steps to Reproduce: 1. Start Firefox 2. Go to Tools->Add-ons Actual Results: The window that opens doesn't show add-ons. It also has two extra icons across the top (languages and updates). Expected Results: Normal add-ons Window with list of add-ons under extensions. These two messages appear in the error console: Error: missing ; before statement Source File: file:///usr/local/firefox/modules/PluralForm.jsm Line: 70 Source Code: let gFunctions = [ Error: uncaught exception: [Exception... "Component returned failure code: 0x80004003 (NS_ERROR_INVALID_POINTER) [nsIPrefBranch2.addObserver]" nsresult: "0x80004003 (NS_ERROR_INVALID_POINTER)" location: "JS frame :: chrome://mozapps/content/extensions/extensions.js :: Startup :: line 989" data: no]
468,279
3,883,744
(Using a debug trunk tip build of NSS) If a program upgrades a cert8 to cert9, and then imports a cert, softoken imports the cert into the cert8 DB, and then crashes in a VERY confused state. After debugging this most of the day, I've concluded that after an upgrade, softoken is really confused about whether it's using cert8 or cert9. This MUST be fixed for Sun's 3.12 release. Steps to reproduce: mkdir -p DB # create new empty cert8 DB certutil -N -d DB # upgrade it to cert9 and import email cert certutil -E -d sql:DB -n email@address -i email-cert.der -t ',,p' Expected result: email cert successfully imported into cert9.db. cert8.db still empty. Actual result: cert is imported into cert8.db, then softoken crashes on an assertion. I did this test using the cert attached to bug 185167. The actual command I used was: certutil -E -d sql:DB -n [email protected] -i /tmp/185167b.der -t ',,p' Here is some info from debugging. Things get really interesting at the point in the NSC_CreateObject where it tries to "handle" the token object, writing it to the DB. The stack at that point is: softokn3.dll!sftkdb_write() Line 1106 softokn3.dll!sftk_handleCertObject() Line 701 + 0x14 bytes softokn3.dll!sftk_handleObject() Line 1472 + 0xd bytes softokn3.dll!NSC_CreateObject() Line 3681 + 0xd bytes nss3.dll!import_object() Line 250 + 0x1b bytes nss3.dll!nssToken_ImportCertificate() Line 579 + 0x18 bytes nss3.dll!PK11_ImportCert() Line 907 + 0x3a bytes certutil.exe!AddCert() Line 189 + 0x15 bytes certutil.exe!certutil_main() Line 2803 + 0x3d bytes certutil.exe!main() Line 2934 + 0xf bytes When sftkdb_write calls db->sdb_Begin, crv = (*db->sdb_Begin)(db); the function it actually calls is lg_Begin. When sftkdb_write calls sftkdb_lookupObject /* Find any copies that match this particular object */ crv = sftkdb_lookupObject(db, object->objclass, &id, template, count); that function finds the SMIME object (!?) as if it is already in the DB. So, sftkdb_write calls: /* object already exists, modify it's attributes */ *objectID = id; crv = sftkdb_setAttributeValue(arena, handle, db, id, template, count); which eventually calls into lg_SetSingleAttribute. The stack looks like: lg_SetSingleAttribute() Line 1729 lg_SetAttributeValue() Line 1786 + 0x17 bytes sftkdb_setAttributeValue() Line 1070 + 0x18 bytes sftkdb_write() Line 1148 + 0x1d bytes lg_SetSingleAttribute handles some classes of objects, but not SMIME objects. For unhandled object classes, it returns CKR_ATTRIBUTE_READ_ONLY, and that's just what it does for this SMIME object. So, back in sftkdb_write, it goes to loser, bypassing the call to crv = (*db->sdb_Commit)(db); At loser, it calls: loser: if (inTransaction) { (*handle->db->sdb_Abort)(handle->db); This is a call to sdb_Abort (not to lg_Abort). Perhaps this is because it calls handle->db->sdb_Abort instead of calling db->sdb_Abort. sdb_Abort calls sdb_complete, which crashes on this assertion: /* We must have a transation database, or we shouldn't have arrived here */ PR_EnterMonitor(sdb_p->dbMon); -> PORT_Assert(sdb_p->sqlXactDB); Now, it's bad enough that sftkdb_write is confused about whether it's using the legacy DB or the new one, and it would be an improvement just to make it be consistent. But it really should not be using the legacy DB at all after NSS_Initialize completes the upgrade. Yet it does. Other discoveries: PK11_SaveSMimeProfile adds 1 to the length of the string it passes for the CKA_NETSCAPE_EMAIL attribute, apparently to include the trailing NUL character (?!). But the stored email address does not have a trailing NUL character, so the string being stored always mismatches the string already stored because their lengths differ by 1. I think the "+1" in this line PK11_SETATTRS(attrs, CKA_NETSCAPE_EMAIL, emailAddr, PORT_Strlen(emailAddr)+1); attrs++; of PK11_SaveSMimeProfile is wrong. Finally, I found one other major error in lg_mkHandle. Here is patch for it; /* there is only one KRL, use a fixed handle for it */ - if (handle != LG_TOKEN_KRL_HANDLE) { + if (handle == LG_TOKEN_KRL_HANDLE) { lg_XORHash(hashBuf,dbKey->data,dbKey->len); handle = (hashBuf[0] << 24) | (hashBuf[1] << 16) | (hashBuf[2] << 8) | hashBuf[3]; handle = class | (handle & ~(LG_TOKEN_TYPE_MASK|LG_TOKEN_MASK));
468,393
3,884,707
BUILD: Current trunk build STEPS TO REPRODUCE: 1) Load https://bugzilla.mozilla.org/attachment.cgi?id=351645 2) Hit Command-S before the alert comes up and start typing a filename 3) When the alert comes up dismiss it 4) Finish typing the filename 5) Hit "OK" in the filepicker ACTUAL RESULTS: Crash with this stack: http://crash-stats.mozilla.com/report/index/ae98fc08-603c-4d92-9357-dd0012081207 (and focus is very screwed up after step 3) EXPECTED RESULTS: probably prevent the alert from coming up while the filepicker is active, like we do for XUL modal dialogs in general. Certainly _don't_ crash.
468,840
3,888,212
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b3pre) Gecko/20081209 Shiretoko/3.1b3pre (.NET CLR 3.5.30729) Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b3pre) Gecko/20081209 Shiretoko/3.1b3pre (.NET CLR 3.5.30729) The referenced page does image evolution in client-side Javascript. With JIT content enabled, the page eventually hangs my browser (after ~20 minutes). CPU goes to 100% and the browser becomes non-responsive. As far as I can tell, this doesn't occur with JIT content disabled. I have JIT chrome disabled. This is reproducible on at least two machines, both Windows XP running the latest Shiretoko. Reproducible: Always Steps to Reproduce: 1. Load page. 2. Hit "Start" 3. Wait.
480,270
3,990,847
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.1b2) Gecko/20081201 Firefox/3.1b2 (.NET CLR 3.5.30729) Build Identifier: 0.2.105 After the upgrade to 0.2.105 each computer does a server wipe data, and this is incorrect. Reproducible: Always Steps to Reproduce: 1. Upgrade Computer1 to 0.2.105 2. After FF restart, do a sync 3. Weave on Computer1 does a server wipe data calls (OK) 4. After sync finishes, upgrade Copmuter2 5. After restart Weave on Copmuter2 does a server wipe data againg, although Computer1 already done so. (not OK) Actual Results: As a result of the two time wiping, the client list gets inconsistent. On Copmuter1 you have both Computer1 and Computer2 listed, and on Computer2 client list consist of only Computer2. Also I suspect on the server files only Computer2 is in the client list, because after Computer2 wiped the data, the record for Computer1 was lost, and the client on that computer does not reconize this. Expected Results: Weave should wipe server data, only after the upgrade of the first client. Each other client upgraded after that should just wipe client data, and do a full sync from server to client
483,179
4,014,498
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.9.1b4pre) Gecko/20090313 SeaMonkey/2.0b1pre Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.9.1b4pre) Gecko/20090313 SeaMonkey/2.0b1pre If you assign the value of "this" to a JavaScript object's private variable, and then read that variable's value, it is - under certain circumstances - referring to *another* object of the same class. Reproducible: Always Steps to Reproduce: See attached testcase. The testcase contains a loop over 20 individual instances of the same class. Actual Results: The values of "this.id" and "thisObject.id" should be identical for all the individual objects. Expected Results: In some of the objects those values are different. This bug happens in SeaMonkey 2.0 only. Neither Seamonkey 1.x nor Firefox 3.0 show this behaviour.
619,594
5,145,820
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.13) Gecko/20101212 Gentoo Firefox/3.6.13 Build Identifier: Bugzilla-3.6.3, as well as the version running on bugzilla.mozilla.org To Whom It May Concern, the Bugzilla 3.6.3, the bugzilla.mozilla.org website, and likely other versions and instances of Bugzilla contain a critical vulnerability that can be used to recover a password reset token for any account. An attacker with an account on the bugzilla system can request a password reset for any other account and through efficient bruteforce recover the token, the attacker can use the token to changethe password of the victim's account and login as the victim. A Quick explanation. Bugzilla uses rand and srand in perl, which are based on srand48 and drand48 on Linux (and possibly other OS's) srand48 is seeded with at most 32 bit of entropy. Using a modern machine one can go through these 32bits in a very short amount of time, less than 10 minutes on my machine. Bugzilla uses (s)rand to generate their tokens and to generate their login cookie. When accessing token.cgi with the attackers login credentials Bugzilla will login the attacker and send him a login cookie made using generate_random_password, the attacker can recover the seed used for srand from this, and use it to know the full internal state of the random number generator. The same request is used by the attacker to request a password reset for the account the attackers wants to take over. For the reset procedure a token will be generated and send to the victim, if the attacker can find this token he can reset the victims password. Since the token is also created using generate_random_password and uses the internal random state that was left after making the login cookie the attacker can easily deduce the token send to the victim. Steps for a succesful attack: request a password reset for the victim account, while logging into to Bugzilla: POST /token.cgi --- Bugzilla_login=<ATTACKER_LOGIN>&Bugzilla_password=<ATTACKER_PASSWORD>&Bugzilla_remember=on&loginname=<VICTIMLOGINNAME>&a=reqpw the response from the server will contain: Set-Cookie: Bugzilla_logincookie=LPfN86mTdY; path=/; expires=Fri, 01-Jan-2038 00:00:00 GMT; secure; HttpOnly while the victim will be sent an email with a token in it. Next the attacker finds the random state used to generate his login Cookie and calculates the next token that BugZilla generated: ./randfindclean LPfN86mTdY found at seed: -43631713 // fd663b9f YKWG0y4oQT (randfindclean finds the seed used to make the logincookie, and then calculates the token based on rand state) and uses the token to login as the victim and change their password. ---- copy paste from the victims email --- You have (or someone impersonating you has) requested to change your Bugzilla password. To complete the change, visit the following link: https://bugzilla.mozilla.org/token.cgi?t=YKWG0y4oQT&a=cfmpw ----- If there are any questions, please don't hesitate to contact me, Willem Pinckaers. Reproducible: Always Steps to Reproduce: 1.login while requestion a password change for the victim 2.based on logincookie, calculate the password token 3.change the victim password and login as the victim Actual Results: Got access to the victim's account Expected Results: r
620,122
5,149,949
crash [@ nsContentList::PopulateSelf(unsigned int)] only wndows OS matches this stack. Mac crash bp-e2dff7a3-62e4-4276-ac1b-442502101218 doesn't match up bp-e88ee015-44cc-4953-a96d-2ce092101211 EXCEPTION_ACCESS_VIOLATION_READ 0x14 0 xul.dll nsContentList::PopulateSelf content/base/src/nsContentList.cpp:868 1 xul.dll nsContentList::BringSelfUpToDate content/base/src/nsContentList.cpp:933 2 xul.dll nsContentList::IndexOf content/base/src/nsContentList.cpp:526 3 xul.dll nsContentUtils::GenerateStateKey content/base/src/nsContentUtils.cpp:2137 4 xul.dll nsDocument::GetLayoutHistoryState content/base/src/nsDocument.cpp:7109 5 xul.dll nsGenericHTMLElement::GetPrimaryPresState content/html/content/src/nsGenericHTMLElement.cpp:1368 6 @0x8 7 @0x3e333330 8 mozcrt19.dll arena_dalloc obj-firefox/memory/jemalloc/crtsrc/jemalloc.c:4284 9 mozcrt19.dll free obj-firefox/memory/jemalloc/crtsrc/jemalloc.c:6121 10 xul.dll ReleaseData xpcom/string/src/nsSubstring.cpp:122 11 xul.dll nsHTMLInputElement::SaveState content/html/content/src/nsHTMLInputElement.cpp:3205 12 xul.dll nsGenericElement::UnbindFromTree content/base/src/nsGenericElement.cpp:3045 13 xul.dll nsGenericHTMLFormElement::UnbindFromTree content/html/content/src/nsGenericHTMLElement.cpp:2483 14 xul.dll nsHTMLInputElement::UnbindFromTree content/html/content/src/nsHTMLInputElement.cpp:2543 15 xul.dll nsGenericElement::UnbindFromTree content/base/src/nsGenericElement.cpp:3041
621,664
5,162,003
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; sk-SK; rv:1.9.2.13) Gecko/20101203 Firefox/3.6.13 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7 I am developing my own PKCS#11 module to sign my e-mail. Everything works when C_SignInit returns CKR_OK. But when it returns CKR_FUNCTION_CANCELED, Thunderbird crashes. Tried other CKR_ return codes such ask CKR_FUNCTION_NOT_SUPPORTED, the crash remains. (this is to implement authentication on the side of the device - when it fails, the module returns CKR_FUNCTION_CANCELED). I can see C_CloseSession being called after C_SignInit (see the pkcs11-spy log). Reproducible: Always Steps to Reproduce: 1. Load a PKCS#11 module which returns CKR_FUNCTION_CANCELED in C_SignInit 2. Set up your digital signature properties as usual 3. Compose a new message, choose Security - Digitally sign this message 4. Send your e-mail and see the crash. Actual Results: Sometimes Visual C++ Runtime Error, sometimes a black little window behind the window with progress bar, sometimes Mozilla Crash Reporter dialog. See the screenshot: http://img4.glowfoto.com/images/2010/12/10-1150202661L.png Expected Results: Display an error message box that the message cannot be sent. -------- pkcs11-spy log with unneeded information omitted ------ 42: C_GetAttributeValue [in] hSession = 0x1 [in] hObject = 0x2 [in] pTemplate[1]: CKA_PRIVATE requested with 1 buffer [out] pTemplate[1]: CKA_PRIVATE True Returned: 0 CKR_OK 43: C_OpenSession [in] slotID = 0x0 [in] flags = 0x4 pApplication=068E8400 Notify=61A6A378 [out] *phSession = 0x2 Returned: 0 CKR_OK 44: C_SignInit [in] hSession = 0x2 pMechanism->type=CKM_RSA_PKCS [in] hKey = 0x2 Returned: 80 CKR_FUNCTION_CANCELED 45: C_CloseSession [in] hSession = 0x2 Returned: 0 CKR_OK -------------- pks11-spy log end (TB crashed here) ----------- ----- call stack begin ----- > thunderbird.exe!nsGlobalWindow::SetNewDocument(nsIDocument * aDocument=0x00a02c00, nsISupports * aState=0x00000000, int aClearScopeHint=0x00000001, int aIsInternalCall=0x0000000b) Line 1760 + 0x3 bytes C++ thunderbird.exe!nsGlobalWindow::SetNewDocument(nsIDocument * aDocument=0x00a02c00, nsISupports * aState=0x00000000, int aClearScopeHint=0x00000001) Line 1569 C++ thunderbird.exe!DocumentViewerImpl::InitInternal(nsIWidget * aParentWidget=0x04e498c0, nsISupports * aState=0x00000000, const nsIntRect & aBounds={...}, int aDoCreation=0x00000001, int aInPrintPreview=0x00000000, int aNeedMakeCX=0x00000001) Line 960 C++ thunderbird.exe!DocumentViewerImpl::Init(nsIWidget * aParentWidget=0x00a79580, const nsIntRect & aBounds={...}) Line 699 C++ thunderbird.exe!nsDocShell::SetupNewViewer(nsIContentViewer * aNewViewer=0x04e8c3c0) Line 7304 + 0x1b bytes C++ thunderbird.exe!nsDocShell::Embed(nsIContentViewer * aContentViewer=0x04e8c3c0, const char * aCommand=0x01ab0481, nsISupports * aExtraInfo=0x00000000) Line 5472 C++ thunderbird.exe!nsDocShell::CreateContentViewer(const char * aContentType=0x03c37d68, nsIRequest * request=0x050c6740, nsIStreamListener * * aContentHandler=0x050c6740) Line 7090 + 0x15 bytes C++ thunderbird.exe!nsDSURIContentListener::DoContent(const char * aContentType=0x03c37d68, int aIsContentPreferred=0x00000000, nsIRequest * request=0x050c6740, nsIStreamListener * * aContentHandler=0x04effb5c, int * aAbortProcess=0x0045ac48) Line 150 C++ thunderbird.exe!nsDocumentOpenInfo::TryContentListener(nsIURIContentListener * aListener=0x06eb4e80, nsIChannel * aChannel=0x04effb5c) Line 734 C++ thunderbird.exe!nsDocumentOpenInfo::DispatchContent(nsIRequest * request=0x050c6740, nsISupports * aCtxt=0x00000000) Line 434 + 0x15 bytes C++ thunderbird.exe!nsDocumentOpenInfo::OnStartRequest(nsIRequest * request=0x050c6740, nsISupports * aCtxt=0x00000000) Line 287 C++ thunderbird.exe!nsJARChannel::OnStartRequest(nsIRequest * req=0x05bac330, nsISupports * ctx=0x00000000) Line 867 + 0x16 bytes C++ thunderbird.exe!nsInputStreamPump::OnStateStart() Line 445 C++ thunderbird.exe!nsInputStreamPump::OnInputStreamReady(nsIAsyncInputStream * stream=0x04e7cb68) Line 407 C++ xpcom_core.dll!nsOutputStreamReadyEvent::Run() Line 113 C++ xpcom_core.dll!nsThread::ProcessNextEvent(int mayWait=0x00000001, int * result=0x0045aef0) Line 527 + 0x6 bytes C++ xpcom_core.dll!NS_ProcessNextEvent_P(nsIThread * thread=0x00000001, int mayWait=0x00000001) Line 250 + 0xd bytes C++ xpcom_core.dll!nsThread::Shutdown() Line 468 + 0xa bytes C++ thunderbird.exe!nsSound::PurgeLastSound() Line 140 C++ thunderbird.exe!nsSound::~nsSound() Line 135 C++ thunderbird.exe!nsSound::`scalar deleting destructor'() + 0x8 bytes C++ thunderbird.exe!nsIndexedToHTML::Release() Line 62 + 0x18 bytes C++ thunderbird.exe!XPCJSRuntime::GCCallback(JSContext * cx=0x04f1d400, JSGCStatus status=JSGC_END) Line 760 + 0x2a bytes C++ thunderbird.exe!DOMGCCallback(JSContext * cx=0x04f1d400, JSGCStatus status=JSGC_END) Line 3827 + 0x14 bytes C++ thunderbird.exe!XPCCycleCollectGCCallback(JSContext * cx=0x04f1d400, JSGCStatus status=JSGC_END) Line 412 + 0x10 bytes C++ js3250.dll!js_GC(JSContext * cx=0x04f1d400, JSGCInvocationKind gckind=GC_NORMAL) Line 3822 + 0x5 bytes C++ js3250.dll!JS_GC(JSContext * cx=0x04f1d400) Line 2439 + 0x8 bytes C++ thunderbird.exe!nsXPConnect::Collect() Line 479 C++ xpcom_core.dll!nsCycleCollector::Collect(unsigned int aTryCollections=0x00000001) Line 2434 + 0x5 bytes C++ xpcom_core.dll!nsCycleCollector_collect() Line 3130 C++ thunderbird.exe!nsJSContext::CC() Line 3641 + 0x6 bytes C++ thunderbird.exe!nsJSContext::IntervalCC() Line 3730 C++ xpcom_core.dll!nsTimerImpl::Fire() Line 427 + 0x6 bytes C++ xpcom_core.dll!nsTimerEvent::Run() Line 521 C++ xpcom_core.dll!nsThread::ProcessNextEvent(int mayWait=0x00000001, int * result=0x0045f060) Line 527 + 0x6 bytes C++ xpcom_core.dll!NS_ProcessNextEvent_P(nsIThread * thread=0x00000001, int mayWait=0x00000001) Line 250 + 0xd bytes C++ thunderbird.exe!nsXULWindow::ShowModal() Line 416 + 0x9 bytes C++ thunderbird.exe!nsContentTreeOwner::ShowAsModal() Line 529 C++ thunderbird.exe!nsWindowWatcher::OpenWindowJSInternal(nsIDOMWindow * aParent=0x00a47780, const char * aUrl=0x01c5e844, const char * aName=0x01ab0bd0, const char * aFeatures=0x01ab0bd8, int aDialog=0x00000001, nsIArray * argv=0x04e20720, int aCalledFromJS=0x00000000, nsIDOMWindow * * _retval=0x0045f35c) Line 1011 C++ thunderbird.exe!nsWindowWatcher::OpenWindow(nsIDOMWindow * aParent=0x00a47780, const char * aUrl=0x01c5e844, const char * aName=0x01ab0bd0, const char * aFeatures=0x01ab0bd8, nsISupports * aArguments=0x04eef740, nsIDOMWindow * * _retval=0x0045f35c) Line 425 + 0x24 bytes C++ thunderbird.exe!nsPromptService::DoDialog(nsIDOMWindow * aParent=0x04e498c0, nsIDialogParamBlock * aParamBlock=0x04eef740, const char * aChromeURL=0x01c5e844) Line 797 C++ thunderbird.exe!nsPromptService::Alert(nsIDOMWindow * parent=0x00a47780, const wchar_t * dialogTitle=0x04eff8e0, const wchar_t * text=0x0773c268) Line 148 C++ thunderbird.exe!nsPrompt::Alert(const wchar_t * dialogTitle=0x04eff8e0, const wchar_t * text=0x0773c268) Line 199 C++ thunderbird.exe!nsMsgDisplayMessageByString(nsIPrompt * aPrompt=0x06eb4e40, const wchar_t * msg=0x0773c268, const wchar_t * windowTitle=0x04eff8e0) Line 124 C++ thunderbird.exe!nsMsgSendReport::DisplayReport(nsIPrompt * prompt=0x06eb4e40, int showErrorOnly=0x00000001, int dontShowReportTwice=0x00000000, unsigned int * _retval=0x0045f57c) Line 428 + 0xe bytes C++ thunderbird.exe!nsMsgComposeAndSend::Fail(unsigned int failure_code=0x06eb4e40, const wchar_t * error_msg=0x00000000, unsigned int * _retval=0x0045f57c) Line 3812 C++ thunderbird.exe!nsMsgComposeAndSend::GatherMimeAttachments() Line 1147 C++ thunderbird.exe!nsMsgAttachmentHandler::UrlExit(unsigned int status=0x00000000, const wchar_t * aMsg=0x00000000) Line 1315 + 0x4 bytes C++ thunderbird.exe!FetcherURLDoneCallback(unsigned int aStatus=0x00000000, const nsACString_internal & aContentType={...}, const nsACString_internal & aCharset={...}, int totalSize=0x000000f1, const wchar_t * aMsg=0x00000000, void * tagData=0x04e56920) Line 534 + 0xd bytes C++ thunderbird.exe!nsURLFetcher::OnStopRequest(nsIRequest * request=0x04e7ce0c, nsISupports * ctxt=0x00000000, unsigned int aStatus=0x00000000) Line 327 + 0x15 bytes C++ thunderbird.exe!nsDocumentOpenInfo::OnStopRequest(nsIRequest * request=0x04e7ce0c, nsISupports * aCtxt=0x00000000, unsigned int aStatus=0x00000000) Line 324 C++ thunderbird.exe!nsBaseChannel::OnStopRequest(nsIRequest * request=0x04e63b00, nsISupports * ctxt=0x00000000, unsigned int status=0x00000000) Line 681 C++ thunderbird.exe!nsInputStreamPump::OnStateStop() Line 579 C++ thunderbird.exe!nsInputStreamPump::OnInputStreamReady(nsIAsyncInputStream * stream=0x04e7d428) Line 404 C++ xpcom_core.dll!nsOutputStreamReadyEvent::Run() Line 113 C++ xpcom_core.dll!nsThread::ProcessNextEvent(int mayWait=0x00000001, int * result=0x0045f8dc) Line 527 + 0x6 bytes C++ xpcom_core.dll!NS_ProcessNextEvent_P(nsIThread * thread=0x00000001, int mayWait=0x00000001) Line 250 + 0xd bytes C++ thunderbird.exe!nsBaseAppShell::Run() Line 177 + 0x9 bytes C++ thunderbird.exe!nsAppStartup::Run() Line 184 C++ thunderbird.exe!XRE_main(int argc=0x00000001, char * * argv=0x00a110a8, const nsXREAppData * aAppData=0x00a17340) Line 3485 C++ thunderbird.exe!NS_internal_main(int argc=0x00000001, char * * argv=0x00a110a8) Line 102 C++ thunderbird.exe!wmain(int argc=0x00a110a8, wchar_t * * argv=0x00a1b700) Line 122 C++ thunderbird.exe!__tmainCRTStartup() Line 591 + 0x19 bytes C kernel32.dll!@BaseThreadInitThunk@12() + 0x12 bytes ntdll.dll!___RtlUserThreadStart@8() + 0x27 bytes ntdll.dll!__RtlUserThreadStart@8() + 0x1b bytes ------------ call stack end -------------- crashed on a line in nsGlobalWindow.cpp: nsWindowSH::InvalidateGlobalScopePolluter(cx, currentInner->mJSObject); saying Uncaught exception occurred. (debugged using VS2008)
629,912
5,237,726
possible new crash on mozilla-central maybe first appearing in build 2011 01 28 030208 stack looks like https://crash-stats.mozilla.com/report/index/e944c84d-58d8-4d56-bf6f-5c6632110129 Frame Module Signature [Expand] Source 0 xul.dll NotificationController::TextEnumerator accessible/src/base/NotificationController.cpp:601 1 xul.dll NotificationController::QueueEvent accessible/src/base/NotificationController.cpp:139 2 xul.dll nsTArray<nsAutoPtr<nsPropertyTable>,nsTArrayDefaultAllocator>::~nsTArray<nsAutoPtr<nsPropertyTable>,nsTArrayDefaultAllocator> obj-firefox/dist/include/nsTArray.h:373 3 xul.dll PL_DHashTableEnumerate obj-firefox/xpcom/build/pldhash.c:754 4 xul.dll nsTArray_base<nsTArrayInfallibleAllocator>::ShrinkCapacity obj-firefox/dist/include/nsTArray-inl.h:135 5 xul.dll NotificationController::WillRefresh accessible/src/base/NotificationController.cpp:247 6 xul.dll nsTArray<nsAutoPtr<nsPropertyTable>,nsTArrayDefaultAllocator>::~nsTArray<nsAutoPtr<nsPropertyTable>,nsTArrayDefaultAllocator> obj-firefox/dist/include/nsTArray.h:373 7 xul.dll PresShell::FlushPendingNotifications layout/base/nsPresShell.cpp:4924 8 xul.dll NotificationController::CreateTextChangeEventFor accessible/src/base/NotificationController.cpp:574 9 xul.dll nsRefreshDriver::Notify layout/base/nsRefreshDriver.cpp:254 10 user32.dll user32.dll@0x1baf8 11 user32.dll user32.dll@0x1bd31 12 xul.dll xul.dll@0xa3776f 13 nspr4.dll PR_AssertCurrentThreadOwnsLock nsprpub/pr/src/threads/combined/prulock.c:404 14 xul.dll mozilla::TimeDuration::ToSeconds xpcom/ds/TimeStamp.cpp:63 15 nspr4.dll PR_Unlock more reports at: https://crash-stats.mozilla.com/report/list?signature=NotificationController%3A%3ATextEnumerator(nsPtrHashKey<nsIContent>*%2C void*)&version=Firefox%3A4.0b11pre source at the top of the stack appears to have been recently changed. 2011-01-28 16:42 +0800 Alexander Surkov - Bug 625652 - make sure accessible tree is correct when rendered text is changed, r=davidb, sr=roc, a=roc 2011-01-28 13:15 +0800 Alexander Surkov - Bug 629394, part3 - replace do_QueryObject on AsHyperText, r=fer, a=davidb 2011-01-28 12:37 +0800 Alexander Surkov - Bug 606924, part5 - rename GetCachedAccessible, r=fer, a=final+ 2011-01-26 14:35 +0800 Alexander Surkov - Bug 606924, part3 - handing document concept, r=davidb, a=blocking2.0Final+ 2011-01-24 10:58 +0800 Alexander Surkov - Bug 606924, part2 - create initial tree, r=davidb, a=blocking2.0Final+ base Alexander Surkov - Bug 498015 - update accessible tree on content insertion after layout, r=davidb, sr=bz, a=blockingBetaN
635,977
5,296,829
User-Agent: Mozilla/5.0 (X11; Linux i686 on x86_64; rv:2.0b11) Gecko/20100101 Firefox/4.0b11 Build Identifier: 4.0b11 Firefox 4.0b11 crashes in libxul with a segfault on a bad and possibly controllable read when given an iframe with source address ";%80". Reproducible: Always Steps to Reproduce: 1. echo '<iframe src=";%80">' > page.html 2. ... 3. firefox page.html Actual Results: Firefox is sorry it followed a bad pointer. Expected Results: Firefox should only follow good pointers. The above minimal case crashes with: Program received signal SIGSEGV, Segmentation fault. [Switching to Thread 0xeffffb70 (LWP 31736)] 0xf71dafaf in ?? () from ./libxul.so => 0xf71dafaf: mov (%edx,%eax,4),%edi with eax = -1, edx = 0 Different files causing this seem to have edx=0, but eax as different values like -256975184, which make this look less like a harmless null deref. Filing conservatively as a security issue.
644,069
5,361,920
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-GB; rv:1.9.2.16) Gecko/20110319 Firefox/3.6.16 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-GB; rv:1.9.2.16) Gecko/20110319 Firefox/3.6.16 We have a web page using JQuery 1.5.1 that makes a POST ajax request to a REST web service on another domain. Firefox sends a preflighting OPTIONS request, then the POST. If the server responds with a header of Access-Control-Max-Age set to a number of seconds longer than it takes to make 100 unique uri requests, firefox crashes. On the 101st unique URL post request, Firefox makes the 101st OPTIONS request to the server, which replies, then Firefox crashes with the attached crash dump. Reproducible: Always Steps to Reproduce: 1. Edit CrossDomainTest.html line 22 to point to a REST webservice 2. Ensure the webservice response includes a header of Access-Control-Max-Age set to something like "1728000" which is 20 days. 3. Open the page in Firefox 4. On the 101 request Firefox crashes. Actual Results: Firefox crashed and showed the submit crash dump dialog. Expected Results: Firefox should continue to make requests. This is related to the submitted crash dump ID: 7636c991-6b98-4abf-b2c4-7ea2c2110322 Module: xul.dll When no "Access-Control-Max-Age" header is defined in the web service response Firefox continues to make more than 101 requests. We are unsure if this bug could be exploited so we are setting the "Many users could be harmed" option until further investigation confirms the extent of this issue.
1,233,556
11,015,222
This bug was filed from the Socorro interface and is report bp-695430d9-0b82-4b23-8827-23f332151217. ============================================================= 0 nahimicmsiosd.dll nahimicmsiosd.dll@0x6172 Ø 1 ntdll.dll ntdll.dll@0x12151 Ø 2 ntdll.dll ntdll.dll@0x11d9a Ø 3 ntdll.dll ntdll.dll@0x11f43 Ø 4 ntdll.dll ntdll.dll@0x11070 Ø 5 ntdll.dll ntdll.dll@0x109b3 Ø 6 ntdll.dll ntdll.dll@0x10df2 Ø 7 ntdll.dll ntdll.dll@0x10f8b Ø 8 nahimicmsiosd.dll nahimicmsiosd.dll@0x38d4f Ø 9 ntdll.dll ntdll.dll@0x114da Ø 10 ntdll.dll ntdll.dll@0x374de Ø 11 ntdll.dll ntdll.dll@0x89fb Ø 12 kernelbase.dll kernelbase.dll@0x56bf2 Ø 13 nahimicmsiosd.dll nahimicmsiosd.dll@0x476ef Ø 14 nahimicmsiosd.dll nahimicmsiosd.dll@0xc5c0 Ø 15 nahimicmsiosd.dll nahimicmsiosd.dll@0x476ef Ø 16 nahimicmsiosd.dll nahimicmsiosd.dll@0x240f Ø 17 nahimicmsiosd.dll nahimicmsiosd.dll@0x476ef Ø 18 nahimicmsiosd.dll nahimicmsiosd.dll@0x6791 Ø 19 nahimicmsiosd.dll nahimicmsiosd.dll@0x448df Ø 20 nahimicmsiosd.dll nahimicmsiosd.dll@0x448df Ø 21 nahimicmsiosd.dll nahimicmsiosd.dll@0x5ed9 22 @0x7ffbf5c7ffff Ø 23 nahimicmsiosd.dll nahimicmsiosd.dll@0x4700f Ø 24 nahimicmsiosd.dll nahimicmsiosd.dll@0x4708f 25 @0x7ffc0977ffff Ø 26 nahimicmsiosd.dll nahimicmsiosd.dll@0x3354 Ø 27 nahimicmsiosd.dll nahimicmsiosd.dll@0x4708f 28 @0x7ffc0977ffff Ø 29 nahimicmsidevprops.dll nahimicmsidevprops.dll@0xa01e Ø 30 nahimicmsidevprops.dll nahimicmsidevprops.dll@0x3268f 31 nss3.dll PR_WaitCondVar nsprpub/pr/src/threads/combined/prucv.c 32 @0x4f0044004e0048 =============================================================
1,237,224
11,050,428
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36 Steps to reproduce: Firefox crashes after series of subsequent re-negotiations in case H.264 has been negotiated and constrained by max-mbps receiver capability. 1. Create PC1 and PC2 2. Let PC2 simulate remote endpoint supporting H.264 with non-interleaved packetization mode only 3. Let PC2 specify max-mbps H.264 receiver capability 4. Add audio and video tracks to both PC1 and PC2 5. Negotiate bidirectional A/V m-lines between PC1 and PC2 6. Remove video track from PC1, re-negotiate unidirectional video m-line 7. Add video track back to PC1, re-negotiate bidirectional video m-line Can be reproduced by running the following in Nightly 46 - https://jsfiddle.net/9md05c03/ Actual results: After re-negotiating bidirectional video Firefox crashes with EXC_ARITHMETIC, full backtrace below: (lldb) bt * thread #9: tid = 0x6369, 0x00000001028f07d0 XUL`mozilla::WebrtcVideoConduit::SelectSendResolution(unsigned short, unsigned short, webrtc::I420VideoFrame*) + 71 at VideoConduit.cpp:1249, name = 'Socket Thread', stop reason = EXC_ARITHMETIC (code=EXC_I386_DIV, subcode=0x0) frame #0: 0x00000001028f07d0 XUL`mozilla::WebrtcVideoConduit::SelectSendResolution(unsigned short, unsigned short, webrtc::I420VideoFrame*) + 71 at VideoConduit.cpp:1249 frame #1: 0x00000001028f0789 XUL`mozilla::WebrtcVideoConduit::SelectSendResolution(this=0x000000013e171bb0, width=<unavailable>, height=<unavailable>, frame=0x0000000000000000) + 489 at VideoConduit.cpp:1137 * frame #2: 0x00000001028f0529 XUL`mozilla::WebrtcVideoConduit::GetVideoEncoderStats(this=0x000000013e171bb0, framerateMean=0x00007000003a5778, framerateStdDev=<unavailable>, bitrateMean=<unavailable>, bitrateStdDev=<unavailable>, droppedFrames=<unavailable>) + 345 at VideoConduit.cpp:185 frame #3: 0x000000010293598f XUL`mozilla::PeerConnectionImpl::ExecuteStatsQuery_s(query=0x00000001434c3f10) + 3615 at PeerConnectionImpl.cpp:3304 frame #4: 0x0000000102923d26 XUL`mozilla::EverySecondTelemetryCallback_s(aQueryList=nsAutoPtr<mozilla::Vector<nsAutoPtr<mozilla::RTCStatsQuery>, 0, mozilla::MallocAllocPolicy> > @ 0x00007000003a5af0) + 214 at PeerConnectionCtx.cpp:206 frame #5: 0x0000000102925b30 XUL`mozilla::runnable_args_func<void (*)(nsAutoPtr<mozilla::Vector<nsAutoPtr<mozilla::RTCStatsQuery>, 0ul, mozilla::MallocAllocPolicy> >), nsAutoPtr<mozilla::Vector<nsAutoPtr<mozilla::RTCStatsQuery>, 0ul, mozilla::MallocAllocPolicy> > >::Run() [inlined] void mozilla::detail::RunnableFunctionCallHelper<void>::apply<void (func=<unavailable>)(nsAutoPtr<mozilla::Vector<nsAutoPtr<mozilla::RTCStatsQuery>, 0ul, mozilla::MallocAllocPolicy> >), nsAutoPtr<mozilla::Vector<nsAutoPtr<mozilla::RTCStatsQuery>, 0ul, mozilla::MallocAllocPolicy> >, 0ul>(void (*)(nsAutoPtr<mozilla::Vector<nsAutoPtr<mozilla::RTCStatsQuery>, 0ul, mozilla::MallocAllocPolicy> >), mozilla::Tuple<nsAutoPtr<mozilla::Vector<nsAutoPtr<mozilla::RTCStatsQuery>, 0ul, mozilla::MallocAllocPolicy> > >&, mozilla::IndexSequence<0ul>) + 22 at runnable_utils.h:79 frame #6: 0x0000000102925b1a XUL`mozilla::runnable_args_func<void (*)(nsAutoPtr<mozilla::Vector<nsAutoPtr<mozilla::RTCStatsQuery>, 0ul, mozilla::MallocAllocPolicy> >), nsAutoPtr<mozilla::Vector<nsAutoPtr<mozilla::RTCStatsQuery>, 0ul, mozilla::MallocAllocPolicy> > >::Run(this=<unavailable>) + 10 at runnable_utils.h:118 frame #7: 0x0000000101ea3147 XUL`nsThread::ProcessNextEvent(this=0x000000010072cb00, aMayWait=<unavailable>, aResult=0x00007000003a5c07) + 1495 at nsThread.cpp:989 frame #8: 0x0000000101ee2653 XUL`NS_ProcessNextEvent(aThread=<unavailable>, aMayWait=true) + 51 at nsThreadUtils.cpp:297 frame #9: 0x0000000101fb4250 XUL`nsSocketTransportService::Run(this=0x0000000100727640) + 960 at nsSocketTransportService2.cpp:905 frame #10: 0x0000000101fb4dfd XUL`non-virtual thunk to nsSocketTransportService::Run(this=<unavailable>) + 13 at nsSocketTransportService2.cpp:793 frame #11: 0x0000000101ea3147 XUL`nsThread::ProcessNextEvent(this=0x000000010072cb00, aMayWait=<unavailable>, aResult=0x00007000003a5dd7) + 1495 at nsThread.cpp:989 frame #12: 0x0000000101ee2653 XUL`NS_ProcessNextEvent(aThread=<unavailable>, aMayWait=false) + 51 at nsThreadUtils.cpp:297 frame #13: 0x00000001022c2acc XUL`mozilla::ipc::MessagePumpForNonMainThreads::Run(this=0x0000000111095e80, aDelegate=0x00000001007d44e0) + 284 at MessagePump.cpp:326 frame #14: 0x000000010228592c XUL`MessageLoop::Run() [inlined] MessageLoop::RunHandler(this=<unavailable>) + 60 at message_loop.cc:227 frame #15: 0x0000000102285927 XUL`MessageLoop::Run(this=<unavailable>) + 55 at message_loop.cc:201 frame #16: 0x0000000101ea1033 XUL`nsThread::ThreadFunc(aArg=0x000000010072cb00) + 291 at nsThread.cpp:401 frame #17: 0x0000000101b3be79 libnss3.dylib`_pt_root(arg=0x00000001007349f0) + 281 at ptthread.c:212 frame #18: 0x00007fff90f0a9b1 libsystem_pthread.dylib`_pthread_body + 131 frame #19: 0x00007fff90f0a92e libsystem_pthread.dylib`_pthread_start + 168 frame #20: 0x00007fff90f08385 libsystem_pthread.dylib`thread_start + 13 (lldb) frame select 0 frame #0: 0x00000001028f07d0 XUL`mozilla::WebrtcVideoConduit::SelectSendResolution(unsigned short, unsigned short, webrtc::I420VideoFrame*) + 71 at VideoConduit.cpp:1249 1246 mb_height = (mSendingHeight + 15) >> 4; 1247 1248 cur_fs = mb_width * mb_height; -> 1249 max_fps = mCurSendCodecConfig->mEncodingConstraints.maxMbps/cur_fs; 1250 if (max_fps < mSendingFramerate) { 1251 new_framerate = max_fps; 1252 } Issue seems to caused by telemetry polling performed every second by PeerConnectionCtx catching individual PC video conduit in a state where transmission has been already restarted due to processing incoming re-invite (which shouldn't even be changing anything as media direction and previously negotiated PT and its params remain the same), but encoder hasn't yet managed to produce any frames. This situation leads to both VideoConduit::mSendingWidth and VideoConduit::mSendingHeight still set to 0, causing the VideoConduit to perform division by zero. Issue does not reproduce if remote endpoint does not specify max-mbps receiver capability in a=fmtp attribute for H.264 codec. Expected results: Firefox shouldn't crash
1,225,160
10,935,950
This bug was filed from the Socorro interface and is report bp-36559863-e718-4bc5-b2f9-aa5f52151116. ============================================================= We're crashing here: http://hg.mozilla.org/mozilla-central/annotate/48d636f678b0/js/src/jsobj.h#l159 with a null _group and according to crash-reports end up there through here: http://hg.mozilla.org/mozilla-central/annotate/48d636f678b0/js/xpconnect/loader/mozJSComponentLoader.cpp#l1217 I don't really understand how that is possible. But it's annoying - I am repeatedly crashing while trying to use the browser debugger in the course of my normal work. The browser debugger stays up but the process dies underneath me. It tends to happen while I'm stopped on a breakpoint in the debugger. I don't have reliable STR, but I've crashed 3 times in the last 20 minutes, and it's starting to get on my nerves. bhackett, ejpbruel says you might know more about what's going on here?
1,252,058
11,203,033
Created attachment 8724701 bug "new folder".mp4 [Affected versions]: Firefox Nightly 47.0a1(2016-02-25) [Affected platforms]: Mac OS X 10.10 [Steps to reproduce]: 1. Open Nightly with a new profile and sign in with a Firefox account. 2. Right click on a link and choose "Bookmark this link". -> The New bookmark dialog opens. 3. Click on "Show all the bookmarks folders" down arrow. 4. Click on the "New folder" button several times to create new folders. [Expected result]: On every click on the "New Folder" button a new folder is created. [Actual result]: After 3-4 clicks the browser freezes, to close it you need to force quit. [Regression range]: Last good revision: 5b2baa5e9356644a7ed0b73e422eaff62e159ffb (2016-02-24) First bad revision: c1e0d1890cfee9d86c8d566b0490053f21e0afc6 (2016-02-25) Pushlog: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=5b2baa5e9356644a7ed0b73e422eaff62e159ffb&tochange=c1e0d1890cfee9d86c8d566b0490053f21e0afc6 [Additional notes]: This behavior is reproduce it only on Mac OS, on other operating systems the button "new folder" becomes unavailable. You can see bug 1250445 Please see the attachement.
1,228,938
10,972,925
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:42.0) Gecko/20100101 Firefox/42.0 Build ID: 2015103000 Steps to reproduce: Every time, I open the mp4 video, firefox crashes. Firefox does not have any problems opening other mp4 files coded with h264/mp3 that were created in the same way. Actual results: crash of firefox, I have attached the mp4 file, that makes the problem Expected results: firefox should have played the movie
1,240,760
11,087,494
Created attachment 8709456 ff-crash-datachannel.html User Agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:43.0) Gecko/20100101 Firefox/43.0 Build ID: 20160106231438 Steps to reproduce: Load the attached page Actual results: The page loads, redirects to mozilla.org, and after ~20 seconds, Firefox crashes. This is reproducible with any other navigation action, including a simple reload. from my quick tests, it only happens when 2 data channels are open, with the 2nd set to use the same id as the one the first one automatically gets; it's probably somewhat related to https://bugzilla.mozilla.org/show_bug.cgi?id=1017462 Expected results: Firefox should not have crashed
1,198,815
10,661,446
Created attachment 8652917 YouTube's video frame after HTML5 playback has failed.png User Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:43.0) Gecko/20100101 Firefox/43.0 Build ID: 20150824030206 Steps to reproduce: I watched this YouTube video: https://youtu.be/hSVCuOPlkpQ Actual results: FireFox has crashed: https://crash-stats.mozilla.com/report/index/28a8eb47-6ad1-465d-a99f-ef1f72150826 The playback has failed even after restart, but without crashing whole browser. I just got "Activate Adobe Flash" message from YouTube after HTML5 playback has died shortly after video playback has started (see attached screenshot). (Playback via Flash has worked fine for this video). This was not the first video where HTML5 playback has failed like that, but it was the first time where browser has crashed, so I have a crash report for that. Expected results: Normal continuous playback via HTML5.
1,200,085
10,675,893
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_3) AppleWebKit/600.6.3 (KHTML, like Gecko) Version/8.0.6 Safari/600.6.3 Steps to reproduce: This crash happened after start,stop video several times crash link: https://crash-stats.mozilla.com/report/index/f4648e5e-a469-499c-a3f3-8186b2150826
1,202,424
10,702,505
This bug was filed from the Socorro interface and is report bp-f31ef803-8e2c-4d95-9081-8412f2150907. ============================================================= Reproducible with latest 43.0a1 (from 2015-09-07) *only* with e10s enabled Affected platforms: 2 machines with Windows 7 x64, Windows 10 x64 - build 10532, Ubuntu 14.04 x32 Steps to reproduce: 1. Launch Firefox and navigate to http://mozilla.github.io/webrtc-landing/gum_test.html 2. Click on Video or Audio&Video button. 3. Share devices when prompted. 4. Close Firefox. Additional notes: 1. With the same STR on latest Developer Edition the process remains active & the global indicator visible, but no crash. Same as with latest Nightly, it does not reproduce with e10s disabled. Should I file a separate bug for this issue? Or is it enough to track it here? 2. Unable to reproduce on Mac OS X 10.10.4. 3. More reports: https://crash-stats.mozilla.com/report/list?product=Firefox&signature=%3CT%3E%3A%3Aoperator%28%29
1,218,326
10,871,967
Created attachment 8678749 UAF_AutoSPSLock_Repro.html Reproduce test case: <html><script> var rtcConfig = { "iceServers": [{ "url": "stun:stun.l.google.com:19302" }] }; var pc0 = new RTCPeerConnection(rtcConfig); var pc1 = new RTCPeerConnection(rtcConfig); pc1.onsignalingstatechange = function (e) {dataChan0 = pc1.createDataChannel("DataChanName0");}; var dataChan0 = pc0.createDataChannel("DataChanName0");; pc1.close(); setTimeout(function(){location.reload()},270); </script></html> Steps to reproduce: 1. Open the attached test case (UAF_AutoSPSLock_Repro.html) in Firefox browser. 2. Firefox crashes in js::AutoSPSLock::~AutoSPSLock(): First-chance exception at 0x0F7A536F (nss3.dll) in firefox.exe: 0xC0000005: Access violation reading location 0x5A5A5A62. Unhandled exception at 0x0F7A536F (nss3.dll) in firefox.exe: 0xC0000005: Access violation reading location 0x5A5A5A62. The address pattern 0x5A5A5A indicates an Use After Free. Firefox version: 44.0a1 (2015-10-03) Variables: + lock 0x5a5a5a5a {links={next=??? prev=??? } owner=??? waitQ={next=??? prev=??? } ...} PRLock * + me 0x0769a000 {state=2 priority=PR_PRIORITY_NORMAL (1) arg=0x00000000 ...} PRThread * me->flags 136 unsigned int + suspendAllThread 0x00000000 <NULL> PRThread * Registers: EAX = 5A5A5A5A EBX = 00000001 ECX = FE4FD000 EDX = FFFFFFFF ESI = 011C39A0 EDI = 0019495C EIP = 0F7A536F ESP = 0115EC8C EBP = 0115EC90 EFL = 00010206 0x5a5a5a62 = 00000000 Call Stack: > nss3.dll!PR_Unlock(PRLock * lock) Line 322 C xul.dll!js::AutoSPSLock::~AutoSPSLock() Line 221 C++ xul.dll!mozilla::BaseAutoLock<mozilla::Mutex>::~BaseAutoLock<mozilla::Mutex>() Line 170 C++ xul.dll!mozilla::DataChannelConnection::Close(mozilla::DataChannel * aChannel) Line 2495 C++ xul.dll!mozilla::DataChannel::Close() Line 2587 C++ xul.dll!nsDOMDataChannel::~nsDOMDataChannel() Line 50 C++ [External Code] xul.dll!mozilla::DOMEventTargetHelper::DeleteCycleCollectable() Line 81 C++ xul.dll!mozilla::DOMEventTargetHelper::cycleCollection::DeleteCycleCollectable(void * p) Line 64 C++ xul.dll!SnowWhiteKiller::~SnowWhiteKiller() Line 2657 C++ xul.dll!nsCycleCollector::FreeSnowWhite(bool aUntilNoSWInPurpleBuffer) Line 2823 C++ xul.dll!nsCycleCollector_doDeferredDeletion() Line 4081 C++ xul.dll!AsyncFreeSnowWhite::Run() Line 144 C++ xul.dll!nsThread::ProcessNextEvent(bool aMayWait, bool * aResult) Line 960 C++ xul.dll!NS_ProcessNextEvent(nsIThread * aThread, bool aMayWait) Line 277 C++ xul.dll!mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate * aDelegate) Line 95 C++ xul.dll!MessageLoop::RunInternal() Line 235 C++ xul.dll!MessageLoop::RunHandler() Line 228 C++ xul.dll!MessageLoop::Run() Line 202 C++ xul.dll!nsBaseAppShell::Run() Line 158 C++ xul.dll!nsAppShell::Run() Line 178 C++ xul.dll!nsAppStartup::Run() Line 281 C++ xul.dll!XREMain::XRE_mainRun() Line 4298 C++ xul.dll!XREMain::XRE_main(int argc, char * * argv, const nsXREAppData * aAppData) Line 4391 C++ xul.dll!XRE_main(int argc, char * * argv, const nsXREAppData * aAppData, unsigned int aFlags) Line 4493 C++ firefox.exe!do_main(int argc, char * * argv, nsIFile * xreDirectory) Line 212 C++ firefox.exe!NS_internal_main(int argc, char * * argv) Line 399 C++ firefox.exe!wmain(int argc, wchar_t * * argv) Line 131 C++ [External Code] [Frames below may be incorrect and/or missing, no symbols loaded for kernel32.dll]
1,203,872
10,719,580
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:40.0) Gecko/20100101 Firefox/40.0 Build ID: 20150826023504 Steps to reproduce: Unsure. 1. Watch an embedded video in firefox 40.0.3 2. Crash report: https://crash-stats.mozilla.com/report/index/33f64c99-2fa2-4b92-b79b-3e4942150911 Actual results: Firefox quit unexpectedly and when it restarted, all profile/cached information was missing. Expected results: No crash, if crash, bookmarks and passwords preserved.
1,298,676
11,661,300
Created attachment 8785686 stacktrace of FF hang on startup Saturday aug 27 windbg.txt restarted firefox about:sessionrestore page appeared - all seems OK. did NOT click restore, and had no interraction with Firefox UI. tabbed away to a different application. came back within a few minutes to a hung firefox and title bar shows "Not Responding". unfortunately I did not check to see how much CPU is being used. Firefox nightly build 20160827 I have never seen a hang after startup like that before. So far, startups after that incident have not hung.
1,299,150
11,666,564
Created attachment 8786355 Client 30-08-16 17-00.crash Build: master 5a63555e5a Device: iPad Air 2 iOS: 9.3.3 Steps to reproduce: 1. Swipe down to open notification menu 2. Open Fennec by taping the New Tab button Actual results: - The application will crash. Note: - This issue was reproduced only on iPads.
1,295,033
11,623,728
This bug was filed from the Socorro interface and is report bp-74fc5f2a-51f9-4552-b25d-adc782160814. ============================================================= Crash seen in early betas that has risen to #10 in Beta 3. Since it has no bug associated with it, filing to get it on the radar for tracking: http://bit.ly/2aLJ9PR. Perhaps terrence has some ideas as to what might be the root cause, adding ni.
1,290,280
11,583,509
Build Identifier: https://hg.mozilla.org/mozilla-central/rev/db3ed1fdbbeaf5ab1e8fe454780146e7499be3db Mozilla/5.0 (Windows NT 10.0; WOW64; rv:50.0) Gecko/20100101 Firefox/50.0 ID:20160728030208 The crash is only reproducible on Windows10 IP x64 build 14393.5 (on VMware Workstation Player12). Disabling anti-virus does not fix. Disabling e10s fixes the crash. However, I can not reproduce the crash on [1] and [2]. [1] Windows10 x64 build 10115 actual machine [2] Windows8.1 x64 (on VMware Workstation Player12) Reproducible: 100% always Steps To Reproduce: 1. Set "When Nightly starts : Show my windows and tabs from last time" in about:preferences 2. Open only one tab (e.g. about:home) 3. Exit Browser and restart Actual Results: Tab crashes bp-67ced0f8-2e87-4b72-a677-5770f2160728 Expected Results: Tab should be restored properly Regression window: https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=84b5a1027550faf65534d67dc02372ba09508550&tochange=80ab1089a326e4a35d32cd6f52ed0194eba89ecf Regressed by: Bug 1261842
1,292,869
11,604,095
User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:50.0) Gecko/20100101 Firefox/50.0 SeaMonkey/2.47a1 Build ID: 20160731003204 Steps to reproduce: Navigate to http://directory.libsyn.com/categories Wait several seconds. There will be on the page a spinny-thing that everyone knows means wait for something. Actual results: Seamonkey crashes. Every time I've tried. Expected results: Seamonkey should show the webpage and whatever one is waiting for. The page that crashes behaves like the main page, directory.libsyn.com , but that doesn't crash. Crash reports (newest first): bp-f63d4103-f08d-45db-9726-69a5f2160806 bp-4a24a1e6-3ef4-457c-9274-9662f2160806 bp-eb599c1b-8f38-4695-bfbc-cff152160806
1,305,035
11,732,545
This bug was filed from the Socorro interface and is report bp-b1485431-8530-4162-8db0-78f522160922. ============================================================= [Affected versions]: - latest Developer Edition 51.0a2 - latest Nightly 52.0a1 [Affected platforms]: - Mac OS X 10.10.5 - Mac OS X 10.11.6 - Mac OS X 10.12 [Steps to reproduce]: 1. Start Firefox 2. Visit http://webglsamples.org/WebGL2Samples/ 3. Click on texture_etc2_eac demo [Expected result]: - Demo is properly displayed [Actual result]: - Tab crashes [Regression range]: - Don't know if this is a regression, will check ASAP. [Additional notes]: - Needinfo-ing me so it stays on my radar for finding regression. - Other crash reports with similar or same signatures: bp-b1485431-8530-4162-8db0-78f522160922 bp-3885da3a-55e7-45e4-88e4-b389e2160922 bp-1c4b074a-a420-4586-af80-b610a2160922 bp-d7cc2bb5-f492-4532-9cec-200f12160922 bp-2fba0932-4f7c-4acb-a0d4-ae90e2160922 bp-dcea9c08-decc-45d8-8e32-bedb32160922 bp-26c1a120-4750-4fbb-b598-87b582160922 bp-0e18d58f-f789-46b0-a59d-0b0952160922 bp-71a89134-d766-4a35-86ed-b3e3b2160922 bp-803a816f-e9a3-4665-afef-2394d2160922 bp-d3dd1a35-5cb4-41c6-862a-6a0112160922 bp-0915425f-2103-4d83-b7cc-485652160923
1,305,208
11,734,763
Created attachment 8794468 steal.html User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/602.1.50 (KHTML, like Gecko) Version/10.0 Safari/602.1.50 Steps to reproduce: Reader-mode in Firefox for iOS is hosted on a local web server and readerized web pages can be accessed through following URL. http://localhost:6571/reader-mode/page?url=https://blog.mozilla.org/security/ This local server runs while in foreground but then background application can access it too. This means that it can be used for stealing user private web contents from other application. If you run Firefox for iOS on a Similator on macOS you can reproduce an attack scenario like this. 1) Log in to Github by Firefox for iOS on Simulator 2) Launch terminal application on macOS. 3) Execute "curl http://localhost:6571/reader-mode/page?url=https://github.com/notifications" twice 4) The curl response may contain your private Github notification messages If you want to reproduce an attack scenario on your device, you need to install an application that implements similar logic to the above. You can also reproduce it by using "Mercury Browser" application like this. 1) Log in to Facebook on Firefox for iOS 2) Install Mercury Browser on your iOS device 3) Send "steal.html" to your device as an e-mail attachment 4) Open steal.html by Mercury Browser 5) Push the button in steal.html 6) You can see your Facebook contents on Mercury Browser though you've never log in to Facebook on Mercury The following URL is a video I reproduced these steps on my iPhone. https://drive.google.com/open?id=0Bw1n4kKdVB6SQklMMEFmRnZVOXc Actual results: See above. Expected results: Readerized pages should not be accessed from other application.
1,306,247
11,746,508
This bug was filed from the Socorro interface and is report bp-54231df3-0050-4141-8887-bbb452160929. ============================================================= [Affected versions]: - Firefox 50.0b2, Firefox 51.0a2 (2016-09-28), Firefox 52.0a1 (2016-09-28) [Affected platforms]: - Mac OS X 10.11.6, Mac OS X 10.12.1 [Steps to reproduce]: Prerequisites: An USB external Mic is plugged in. 1. Go to a communication site that require a microphone (Eg. https://meet.jit.si/) and start a conversation. 2. Select the external Mic when the share microphone pop-up is displayed. 3. After the conversation started, unplug the external Mic. [Expected result]: The default Mic from the Mac is enabled. [Actual result]: Firefox crashes. The issue is caused by switching to the built in Mic. [Regression range]: This is a regression. I will follow up asap. [Notes]: - The issue is not reproducible on Mac OS X 10.9, or on Mac OS X 10.10. - The issue is not reproducible on Firefox 49.0.1. - Note that the crash is reproducible if the Mic from a webcam is used. - If a Mic is connected to the Mac with jack, the crash is not reproducible.
1,307,546
11,759,345
Caused by bug 1258870, tested by mozregression. I can reproduce it on Fx50b4 ~ Nightly 52, whatever e10s and 32/64bit. Steps to reproduce: Install the https://greasyfork.org/scripts/22441-bilibili-html5%E6%92%AD%E6%94%BE%E5%99%A8 to activating HTML5 mode for bilibili.com. You can turn off it after the first visit. Open the http://www.bilibili.com/video/av6535800/ (I only found this example). Click the video to play, wait at least ten seconds, as well as observe the Firefox's process footprint. Actual results: Within 10 seconds of the start of the playback, the content process occupies many CPU resources, and the UI stops responding, the memory usage of the content process is growing. Expected results: Smooth playback, low CPU and memory usage.
1,289,001
11,571,571
This bug was filed from the Socorro interface and is report bp-1f2056b1-5998-465e-bdc3-46ed22160725. ============================================================= New crash, first seen in Nightly 20160722030235 and it is the #9 topcrash in that build. It has occurred 36 times across multiple installations, on both Windows and Mac. In all the crash reports thread 0 is reported as the crashing thread, but the stack trace varies widely across the different crash report and so appears to be unrelated. The processor notes field says 'Signature replaced with an IPC Channel Error, was: "<func>"'. The full abort message is "Value error: message was deserialized, but contained an illegal value". I'm not sure how to interpret this one. mrbkap, any ideas from the IPC side? Valentin, any ideas from the Necko side?
1,302,470
11,706,688
Created attachment 8790813 screenshot
1,303,322
11,715,143
Created attachment 8791952 Client 16-09-16 14-35.crash Build: 0295d92db2 Device: iPad Pro iOS: 9.3.5 Steps to reproduce: 1. Open Nightly and tap on the New tab "+" button 2. While tapping on the "+" button, rapidly tap the "x" button on a tab to close it Actual results: - Firefox will crash See video for more information: https://www.youtube.com/watch?v=6VjBDmgD_rc
1,304,243
11,724,334
Steps to reproduce: 1. Go to https://dl.dropboxusercontent.com/u/95157096/85f61cf7/qozqxd7g72.html. 2. Open the <select> element. Actual results: The selected value does not appear when open the <select> popup. Screenshot https://dl.dropboxusercontent.com/u/95157096/85f61cf7/uufncl2zhw.png
1,152,517
10,133,055
Created attachment 8589863 Screenshot showing the issue User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:37.0) Gecko/20100101 Firefox/37.0 Build ID: 20150402191859 Steps to reproduce: 1. Have a contact list that contains multiple people with names starting with "Ma" 2. Compose a new message 3. Click inside the "To:" field (then leave the mouse there) 4. Type "Ma" 5. Several names will appear in a dropdown list, and the first one will already be pre-filled in. 6. The first one is the one I wanted, handy! I guess I'm ready to write my message. 7. I move the mouse down and click inside the body. Actual results: In the process of moving the mouse down, another name in the dropdown list may be higlighted, despite the first name still being filled in to the To: field. Then if you press return or tab, everything's fine, the first name stays selected. But if you CLICK anywhere outside the To: field, it will use the highlighted name from the dropdown field, overwriting the first name that was there before! Expected results: It is very counter-intuitive if the field gets filled in with something else than what you last saw there. People may accidently send messages to the wrong person, because they didn't notice it changed. (It has happened multiple times already to a friend of mine.) Took a while to explain,.. but the screenshot summarizes the problem!
1,158,467
10,198,591
User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:25.3) Gecko/20150323 Firefox/31.9 PaleMoon/25.3.1 Build ID: 20150323170640 Steps to reproduce: Signed AMO add-ons as pushed out today cause issues in some versions of Firefox and derivatives (among other things: crashes of the affected browsers). This seems to be directly caused by not adhering to the JAR signing specification in XPI files. http://docs.oracle.com/javase/7/docs/technotes/guides/jar/jar.html#Signature_File Your supplied .sf files are missing file information as is required by the spec. They only have a manifest digest in them, and no individual file listings to verify.
1,129,388
9,879,118
Created attachment 8559060 Logs with both with and without "strongly typed enum classes" User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2292.0 Safari/537.36 Steps to reproduce: 1. Run start-shell-msvc2010.bat from MozillaBuild 1.11.0 2. Change directory to /c/mozilla-build/mozilla-beta of Firefox 36b6/36b5 source downloaded from ftp://ftp.mozilla.org/pub/firefox/releases/36.0b6/ 3. Run ./mach build Actual results: We are working on the Norton Toolbar extension which uses XPCOM C++ for its implementation. While building the Firefox SDK in Visual Studio 2010 SP1 we encountered the below failures. Due to the usage of "strongly typed enum classes" in dom/media/mediasource/MediaSource.h and dom/media/mediasource/MediaSourceDecoder.h the build fails with the following error. [1423046191.501, "build_output", {"line": "d:\\mozilla-build\\mozilla-beta\\dom\\media\\mediasource\\MediaSourceDecoder.h(24) : error C2059: syntax error : ';'"}] [1423046191.505, "build_output", {"line": "d:\\mozilla-build\\mozilla-beta\\dom\\media\\mediasource\\MediaSourceDecoder.h(60) : error C2061: syntax error : identifier 'MSRangeRemovalAction'"}] [1423046191.51, "build_output", {"line": "d:\\mozilla-build\\mozilla-beta\\dom\\media\\mediasource\\MediaSourceDecoder.h(90) : error C2061: syntax error : identifier 'MSRangeRemovalAction'"}] [1423046191.515, "build_output", {"line": "d:\\mozilla-build\\mozilla-beta\\obj-i686-pc-mingw32\\dist\\include\\mozilla/dom/Element.h(198) : fatal error C1903: unable to recover from previous error(s); stopping compilation"}] [1423046191.521, "build_output", {"line": ""}] I removed the usage of "strongly typed enum classes" and it ended up in throwing the following error. [1423046875.17, "build_output", {"line": "['c:/Program Files (x86)/BullseyeCoverage/bin/x86_amd64/cl.exe', '-Foservice64_resolver.obj', '-c', '-DUNICODE', '-DAB_CD=en-US', '-DNO_NSPR_10_SUPPORT', '-Ic:/mozilla-build/mozilla-beta/security/sandbox/win/wow_helper', '-I.', '-Ic:/mozilla-build/mozilla-beta/security/sandbox/win/wow_helper/../../', '-Ic:/mozilla-build/mozilla-beta/security/sandbox/win/wow_helper/../../../', '-Ic:/mozilla-build/mozilla-beta/security/sandbox/win/wow_helper/../../chromium/', '-I../../../../dist/include', '-Ic:/mozilla-build/mozilla-beta/obj-i686-pc-mingw32/dist/include/nspr', '-Ic:/mozilla-build/mozilla-beta/obj-i686-pc-mingw32/dist/include/nss', '-MT', '-TP', '-nologo', '-D_HAS_EXCEPTIONS=0', '-W3', '-Gy', '-wd4251', '-wd4244', '-wd4267', '-wd4345', '-wd4351', '-wd4482', '-wd4800', '-wd4819', '-we4553', '-GR-', '-DDEBUG', '-DTRACING', '-Zi', '-O1', '-Oi', '-Oy-', '-Fdgenerated.pdb', 'c:/mozilla-build/mozilla-beta/security/sandbox/chromium/sandbox/win/wow_helper/service64_resolver.cc', '-showIncludes']"}] [1423046875.191, "build_output", {"line": "Traceback (most recent call last):"}] [1423046875.192, "build_output", {"line": " File \"c:\\mozilla-build\\python\\Lib\\runpy.py\", line 162, in _run_module_as_main"}] [1423046875.193, "build_output", {"line": " \"__main__\", fname, loader, pkg_name)"}] [1423046875.193, "build_output", {"line": " File \"c:\\mozilla-build\\python\\Lib\\runpy.py\", line 72, in _run_code"}] [1423046875.194, "build_output", {"line": " exec code in run_globals"}] [1423046875.194, "build_output", {"line": " File \"c:\\mozilla-build\\mozilla-beta\\python\\mozbuild\\mozbuild\\action\\cl.py\", line 122, in <module>"}] [1423046875.195, "build_output", {"line": " sys.exit(main(sys.argv[1:]))"}] [1423046875.195, "build_output", {"line": " File \"c:\\mozilla-build\\mozilla-beta\\python\\mozbuild\\mozbuild\\action\\cl.py\", line 119, in main"}] [1423046875.196, "build_output", {"line": " return InvokeClWithDependencyGeneration(args)"}] [1423046875.198, "build_output", {"line": " File \"c:\\mozilla-build\\mozilla-beta\\python\\mozbuild\\mozbuild\\action\\cl.py\", line 94, in InvokeClWithDependencyGeneration"}] [1423046875.199, "build_output", {"line": " p.run()"}] [1423046875.2, "build_output", {"line": " File \"c:\\mozilla-build\\mozilla-beta\\testing\\mozbase\\mozprocess\\mozprocess\\processhandler.py\", line 670, in run"}] [1423046875.2, "build_output", {"line": " self.proc = self.Process([self.cmd] + self.args, **args)"}] [1423046875.201, "build_output", {"line": " File \"c:\\mozilla-build\\mozilla-beta\\testing\\mozbase\\mozprocess\\mozprocess\\processhandler.py\", line 97, in __init__"}] [1423046875.202, "build_output", {"line": " universal_newlines, startupinfo, creationflags)"}] [1423046875.202, "build_output", {"line": " File \"c:\\mozilla-build\\python\\Lib\\subprocess.py\", line 710, in __init__"}] [1423046875.203, "build_output", {"line": " errread, errwrite)"}] [1423046875.204, "build_output", {"line": " File \"c:\\mozilla-build\\mozilla-beta\\testing\\mozbase\\mozprocess\\mozprocess\\processhandler.py\", line 234, in _execute_child"}] [1423046875.205, "build_output", {"line": " cwd, startupinfo)"}] [1423046875.205, "build_output", {"line": " File \"c:\\mozilla-build\\mozilla-beta\\testing\\mozbase\\mozprocess\\mozprocess\\winprocess.py\", line 184, in ErrCheckCreateProcess"}] [1423046875.206, "build_output", {"line": " ErrCheckBool(result, func, args)"}] [1423046875.207, "build_output", {"line": " File \"c:\\mozilla-build\\mozilla-beta\\testing\\mozbase\\mozprocess\\mozprocess\\winprocess.py\", line 51, in ErrCheckBool"}] [1423046875.207, "build_output", {"line": " raise WinError()"}] [1423046875.208, "build_output", {"line": "WindowsError: [Error 2] The system cannot find the file specified."}] [1423046875.208, "build_output", {"line": ""}] [1423046875.211, "build_output", {"line": "In the directory /c/mozilla-build/mozilla-beta/obj-i686-pc-mingw32/security/sandbox/win/wow_helper"}] [1423046875.212, "build_output", {"line": "The following command failed to execute properly:"}] Is it expected that VS 2010 SP1 support has been completely stopped for Firefox builds going forward? Is there any workaround for building Firefox in VS 2010 SP1 without any errors? I tried using the SDK built from VS2012 in VS 2010 extension but it doesn't work because of incompatible VS versions.
1,112,822
9,706,525
This bug was filed from the Socorro interface and is report bp-c39012c0-8b1c-4864-8230-5b5492141217. ============================================================= Application Basics ------------------ Name: Firefox Version: 37.0a1 User Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:37.0) Gecko/20100101 Firefox/37.0 Multiprocess Windows: 1/1 Crash Reports for the Last 3 Days --------------------------------- Report ID: bp-6192743e-18da-4c69-99c8-c7c982141217 Submitted: 2 minutes ago Report ID: bp-c39012c0-8b1c-4864-8230-5b5492141217 Submitted: 51 minutes ago All Crash Reports Extensions ---------- Graphics -------- Adapter Description: Mobile Intel(R) HD Graphics Adapter Drivers: igdumd64 igd10umd64 igd10umd64 igdumdx32 igd10umd32 igd10umd32 Adapter RAM: Unknown Device ID: 0x0126 Direct2D Enabled: Blocked for your graphics driver version. DirectWrite Enabled: false (6.2.9200.16571) Driver Date: 5-19-2011 Driver Version: 8.830.7.0 GPU #2 Active: false GPU Accelerated Windows: 0/1 Basic (OMTC) Blocked for your graphics driver version. Subsys ID: 00000000 Vendor ID: 0x8086 WebGL Renderer: Blocked for your graphics driver version. windowLayerManagerRemote: true AzureCanvasBackend: skia AzureContentBackend: cairo AzureFallbackCanvasBackend: cairo AzureSkiaAccelerated: 0 STR: 1. https://www.youtube.com/watch?v=-pRHO1psAYY 2. Switch to 2160p 3. The other active tab was playing https://www.youtube.com/watch?v=EOlkWAwbos4 Shortly this I also crashed in a different stack - https://crash-stats.mozilla.com/report/index/571706c5-7236-4bc7-9b51-f66652141217. Adding bholley and cpearce since looks like they touched code related to the crash stack
1,279,146
11,474,736
Created attachment 8761474 UAF_socket_thread.html Steps to reproduce: 1.Open repro UAF_socket_thread.html in Firefox browser. 2.Firefox crashes at corrupted address in nr_ice_peer_ctx_find_component() in socket thread. Firefox version: 50.0a1 (2016-06-09) Exception thrown: read access violation. pstr was 0x2FE07494. > xul.dll!nr_ice_peer_ctx_find_component(nr_ice_peer_ctx_ * pctx, nr_ice_media_stream_ * str, int component_id, nr_ice_component_ * * compp) Line 717 C xul.dll!nr_ice_media_stream_send(nr_ice_peer_ctx_ * pctx, nr_ice_media_stream_ * str, int component, unsigned char * data, int len) Line 734 C xul.dll!mozilla::NrIceMediaStream::SendPacket(int component_id, const unsigned char * data, unsigned int len) Line 568 C++ xul.dll!mozilla::TransportLayerIce::SendPacket(const unsigned char * data, unsigned int len) Line 172 C++ xul.dll!mozilla::TransportLayerNSPRAdapter::Write(const void * buf, int length) Line 114 C++ xul.dll!mozilla::TransportLayerWrite(PRFileDesc * f, const void * buf, int length) Line 142 C++ xul.dll!mozilla::TransportLayerSend(PRFileDesc * f, const void * buf, int amount, int flags, unsigned int to) Line 234 C++ nss3.dll!ssl_DefSend(sslSocketStr * ss, const unsigned char * buf, int len, int flags) Line 103 C nss3.dll!ssl3_SendRecord(sslSocketStr * ss, ssl3CipherSpec * cwSpec, SSL3ContentType type, const unsigned char * pIn, int nIn, int flags) Line 3234 C nss3.dll!SSL3_SendAlert(sslSocketStr * ss, SSL3AlertLevel level, SSL3AlertDescription desc) Line 3528 C nss3.dll!ssl_SecureClose(sslSocketStr * ss) Line 777 C nss3.dll!ssl_Close(PRFileDesc * fd) Line 2507 C nss3.dll!PR_Close(PRFileDesc * fd) Line 104 C xul.dll!mozilla::TransportLayerDtls::~TransportLayerDtls() Line 374 C++ [External Code] xul.dll!mozilla::TransportFlow::ClearLayers(std::deque<mozilla::TransportLayer *,std::allocator<mozilla::TransportLayer *> > * layers) Line 58 C++ xul.dll!mozilla::TransportFlow::DestroyFinal(nsAutoPtr<std::deque<mozilla::TransportLayer *,std::allocator<mozilla::TransportLayer *> > > layers) Line 45 C++ xul.dll!mozilla::runnable_args_func<void (__cdecl*)(nsAutoPtr<std::deque<mozilla::TransportLayer *,std::allocator<mozilla::TransportLayer *> > >),nsAutoPtr<std::deque<mozilla::TransportLayer *,std::allocator<mozilla::TransportLayer *> > > >::Run() Line 118 C++ xul.dll!mozilla::TransportFlow::~TransportFlow() Line 39 C++ xul.dll!mozilla::TransportFlow::Release() Line 19 C++ xul.dll!nsProxyReleaseEvent<mozilla::TransportFlow>::Run() Line 33 C++ xul.dll!nsThread::ProcessNextEvent(bool aMayWait, bool * aResult) Line 1029 C++ xul.dll!NS_ProcessNextEvent(nsIThread * aThread, bool aMayWait) Line 290 C++ xul.dll!mozilla::net::nsSocketTransportService::Run() Line 914 C++ xul.dll!nsThread::ProcessNextEvent(bool aMayWait, bool * aResult) Line 1029 C++ xul.dll!NS_ProcessNextEvent(nsIThread * aThread, bool aMayWait) Line 290 C++ xul.dll!mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate * aDelegate) Line 354 C++ xul.dll!MessageLoop::RunHandler() Line 229 C++ xul.dll!MessageLoop::Run() Line 209 C++ xul.dll!nsThread::ThreadFunc(void * aArg) Line 468 C++ nss3.dll!_PR_NativeRunThread(void * arg) Line 419 C nss3.dll!pr_root(void * arg) Line 95 C [External Code] [Frames below may be incorrect and/or missing, no symbols loaded for ucrtbase.dll]
1,279,171
11,474,958
This bug was filed from the Socorro interface and is report bp-c247f6cb-8978-45ec-b5a6-291bc2160608. ============================================================= Crashing Thread (0) Frame Module Signature Source 0 mfplat.dll CMFPropertyStore::CreatePropertyStore(CMFPropertyStore**) 1 mfplat.dll LFPoolObjectLockAcquire 2 mfplat.dll MFLfx::CPoolLockT<0, 1>::Lock(int) 3 mfplat.dll MFLfx::CAutoLockT<MFLfx::CPoolLockT<0, 1>, 1>::CAutoLockT<MFLfx::CPoolLockT<0, 1>, 1>(MFLfx::CPoolLockT<0, 1>*) 4 mfplat.dll CWorkQueue::AddThread() 5 mfplat.dll CWorkQueue::Initialize(int, long (*)(CWorkQueueClock*, CCompletionPort**)) 6 mfplat.dll CMFPresentationDescriptor::Release() 7 mfplat.dll CPlatform::Initialize(unsigned long, unsigned long) 8 mfplat.dll MFStartup 9 xul.dll mozilla::wmf::MFStartup() dom/media/platforms/wmf/WMFUtils.cpp:217 10 xul.dll mozilla::CanCreateMFTDecoder dom/media/platforms/wmf/WMFDecoderModule.cpp:142 11 xul.dll mozilla::CanCreateWMFDecoder<CLSID_CMSAACDecMFT> dom/media/platforms/wmf/WMFDecoderModule.cpp:162 12 xul.dll mozilla::WMFDecoderModule::SupportsMimeType(nsACString_internal const&) dom/media/platforms/wmf/WMFDecoderModule.cpp:220 13 xul.dll mozilla::HasGMPFor dom/media/platforms/agnostic/gmp/GMPDecoderModule.cpp:105 14 xul.dll mozilla::GMPDecoderModule::UpdateUsableCodecs() dom/media/platforms/agnostic/gmp/GMPDecoderModule.cpp:151 15 nss3.dll PR_Unlock nsprpub/pr/src/threads/combined/prulock.c:328 16 xul.dll nsAppShell::ProcessNextNativeEvent(bool) widget/windows/nsAppShell.cpp:402 this crash is exclusive to windows 7 & occurring on startup in 75% of cases. it has been around for a while on a low level, but judging from early 47.0 data its volume may be on the increase in 47. in correlation data, a few modules stick out for this signature: CMFPropertyStore::CreatePropertyStore|EXCEPTION_ACCESS_VIOLATION_READ (26 crashes) 100% (26/26) vs. 1% (126/13230) SortServer2003Compat.dll 100% (26/26) vs. 2% (214/13230) shunimpl.dll 100% (26/26) vs. 2% (290/13230) AcGenral.dll 100% (26/26) vs. 5% (618/13230) AcLayers.dll 100% (26/26) vs. 6% (817/13230) sfc.dll 100% (26/26) vs. 8% (1108/13230) sfc_os.dll
1,280,105
11,483,586
This bug was filed from the Socorro interface and is report bp-eab116fe-b52c-4106-b8dc-e81512160604. ============================================================= This crash first appeared in Nightly 20160603030242. Since then it has occurred 37 times. jryans, any ideas?
1,270,607
11,386,220
This bug was filed from the Socorro interface and is report bp-21904d1c-73aa-4ceb-b8f0-38dd82160505. ============================================================= I hit this crash once when trying to repro DASH.js crash bug 1268694, but there are 15 crash reports. 13 are from Amazon, 1 from imdb.com, and my DASH.js crash. Curiously, of the 13 Amazon crash reports: 8 are from amazon.de, 3 from amazon.co.uk, and only 1 is from amazon.com. They don't appear to be the same users because each crash report has a different Firefox install time. Is there something different about Amazon's video player outside the US? I don't think this is an artifact of crash report processing for easterly time zones because most of the crash reports are many days old. List of crash reports including URLs and install times: https://is.gd/SefnKs 0 XUL mozilla::SamplesWaitingForKey::WaitIfKeyNotUsable(mozilla::MediaRawData*) mfbt/RefPtr.h:261 1 XUL mozilla::EMEDecryptor::Input(mozilla::MediaRawData*) dom/media/platforms/agnostic/eme/EMEDecoderModule.cpp:48 2 XUL nsRunnableMethodImpl<nsresult (mozilla::MediaDataDecoder::*)(mozilla::MediaRawData*), true, RefPtr<mozilla::MediaRawData> >::Run xpcom/glue/nsThreadUtils.h:676 3 XUL mozilla::TaskQueue::Runner::Run() xpcom/threads/TaskQueue.cpp:170 4 XUL nsThreadPool::Run() xpcom/threads/nsThreadPool.cpp:227 5 XUL non-virtual thunk to nsThreadPool::Run() xpcom/threads/nsThreadPool.cpp:154 6 XUL nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp:994 7 XUL NS_ProcessNextEvent(nsIThread*, bool) xpcom/glue/nsThreadUtils.cpp:297 8 XUL mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:355 9 XUL MessageLoop::Run() ipc/chromium/src/base/message_loop.cc:234 10 XUL nsThread::ThreadFunc(void*) xpcom/threads/nsThread.cpp:396 11 libnss3.dylib _pt_root nsprpub/pr/src/pthreads/ptthread.c:216
1,270,686
11,387,121
[Tracking Requested - why for this release]: This bug was filed from the Socorro interface and is report bp-9e1546a6-57a7-4743-9fe0-9e3062160429. ============================================================= Both 47.0b1 and 47.0b2 have had significantly more crashes with signature TppTimerpExecuteCallback (see also bug 964351) than other recent beta/release versions. All of these crashes happen on ATI graphics cards (every single one has vendor ID 0x1002), and they have an interesting distribution of install age (which I believe is time from Firefox install to crash) peaking around 40 seconds, with the oldest being around 100 seconds. A decent number of individual users have submitted 2 crash reports, although relatively small numbers have submitted more than that. It seems like it may be the sort of crash that is preventing these users from ever starting Firefox, although I'm not sure (I'd have expected slightly more repeat-submission in that case, although that's just intuition). The dominant OS is Windows 8.1 (at 90.5%), although there are some crashes from Windows 10 (7%) and Windows 8 (2.5%). The top of the distribution of adapter device IDs is: Rank Adapter device id Count % 1 0x9851 182 26.07 % 2 0x9834 97 13.90 % 3 0x9853 66 9.46 % 4 0x9830 54 7.74 % 5 0x9832 47 6.73 % 6 0x9838 32 4.58 % 7 0x983d 19 2.72 % 8 0x9839 15 2.15 % 9 0x9850 15 2.15 % 10 0x990b 14 2.01 % 11 0x9809 12 1.72 % 12 0x9852 12 1.72 %
1,255,732
11,238,655
[Note]: - Initially reproduced this crash normally browsing while testing on a Nightly try build on a Child account https://archive.mozilla.org/pub/firefox/try-builds/[email protected]/ [Affected versions]: Firefox 44.0.2 Firefox 47.0a1 Firefox 48.0a1 [Affected platforms]: Windows 8.1 [Steps to reproduce]: 1. Launch Firefox 2. Navigate YouTube and start playing any video (https://www.youtube.com/) 3. Navigate to Yahoo movies and start playing any trailer (https://www.yahoo.com/movies/) 4. Navigate to Vimeo start playing any video and click repeatedly on the Share button (https://vimeo.com/) [Expected result]: The tab where the Vimeo video is opened should not crash (on the latest Nightly). Firefox should not crash (Firefox 44.0.2). [Actual result]: The Vimeo tab is crashing with the signatures: - The 47.0a1 try build provided above crashes with the signature: https://crash-stats.mozilla.com/report/index/8c47030e-e45f-4954-8128-de6042160310 - The regular nightly 48.0a1 downloaded from (https://archive.mozilla.org/pub/firefox/nightly/latest-mozilla-central/) crashes with the signature: https://crash-stats.mozilla.com/report/index/294063a9-eb80-4f09-a12a-8b5332160310 - Firefox 44.0.2 crashes with the signature: https://crash-stats.mozilla.com/report/index/590a21ee-a002-4255-a950-033682160310 [Regression range]: - According with the Socorro reports the crash is present since Firefox 18 [@ atidxx32.dll@0x742c7] and Firefox 25 [@ atiumdva.dll@0x14137 ]. If a more in depth regression is needed, please let me know. [Additional notes]: - the crash is reproducible also on an administrator account. - the crash is more easy to reproduce on a child account on the latest Nightly. Graphics Adapter Description AMD Radeon HD 5450 Adapter Description (GPU #2) Intel(R) HD Graphics 4600 Adapter Drivers aticfx32 aticfx32 aticfx32 atiumdag atidxx32 atiumdva Adapter Drivers (GPU #2) igdumdim32 igd10iumd32 igd10iumd32 Adapter RAM 1024 Adapter RAM (GPU #2) Unknown Asynchronous Pan/Zoom wheel input enabled; touch input enabled Device ID 0x68f9 Device ID (GPU #2) 0x0412 Direct2D Enabled true DirectWrite Enabled true (6.3.9600.18123) Driver Date 7-4-2014 Driver Date (GPU #2) 8-4-2015 Driver Version 13.251.9001.1001 Driver Version (GPU #2) 10.18.14.4264 GPU #2 Active false GPU Accelerated Windows 1/1 Direct3D 11 (OMTC) Subsys ID 254a1458 Subsys ID (GPU #2) 0000000c Supports Hardware H264 Decoding Yes Vendor ID 0x1002 Vendor ID (GPU #2) 0x8086 WebGL Renderer Google Inc. -- ANGLE (AMD Radeon HD 5450 Direct3D11 vs_5_0 ps_5_0) windowLayerManagerRemote true AzureCanvasBackend direct2d 1.1 AzureContentBackend direct2d 1.1 AzureFallbackCanvasBackend cairo AzureSkiaAccelerated 0
1,255,737
11,238,720
We are crashing on shutdown for some users due to the async shutdown timeout abort. That indicates this code can block shutdown for a minute. A couple example crashes from Nightly: https://crash-stats.mozilla.com/report/index/2a9ac8f3-5ec8-4266-8923-85e9a2160311 https://crash-stats.mozilla.com/report/index/bea387c7-463c-44c9-b11b-cabdf2160310 I've seen this crash in all the recent versions while investigating bug 1250424. This is the second most common cause of shutdown aborts (20% of shutdown aborts). It would be worth fixing this and uplifting a fix, crashing on shutdown after blocking firefox for one minute is not a pleasant experience for our users.
1,259,236
11,272,678
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_4) AppleWebKit/601.5.17 (KHTML, like Gecko) Version/9.1 Safari/601.5.17 Steps to reproduce: Using FF 45 (and nightly) and with adapter.js loaded: 1) Request user media (providing gumStream) 2) Create new peer connection (pc) 3) Create new media stream (generatedStream) 4) Run generatedStream.addTrack(gumStream.getTracks()[0]) 5) Use pc.addTrack(generatedStream.getTracks()[0], generatedStream) 6) Perform signaling to start peer connection with Chrome (tested with stable) Actual results: Once the peer connection is established, Firefox crashes. Crash report: https://crash-stats.mozilla.com/report/index/bbb92b38-1103-4d32-8115-d96972160323 Only happens from FF to Chrome. FF to FF works. Chrome to FF works. Expected results: Expected peer connection to establish and begin flowing the single track. Why create the intermediary media stream? I was originally experimenting with working around FF requiring the stream parameter in addTrack() by creating one when needed. I did wonder if the intermediate stream was getting garbage collected and causing the issue, but even with keeping a reference I got crashes.
1,275,062
11,430,874
As per https://bugzilla.mozilla.org/show_bug.cgi?id=1271102#c9, reporting as a separate entry from bug 1271102, even though the crashing line is same as in that bug. A deterministic crash on current Nightly on Windows at least, a crash in call stack mozilla::ipc::ProcessLink::SendMessageW mozilla::ipc::MessageChannel::Send mozilla::dom::indexedDB::PBackgroundIDBRequestParent::Send__delete__ mozilla::dom::indexedDB::`anonymous namespace'::NormalTransactionOp::SendSuccessResult mozilla::dom::indexedDB::`anonymous namespace'::TransactionDatabaseOperationBase::RunOnOwningThread mozilla::dom::indexedDB::`anonymous namespace'::TransactionDatabaseOperationBase::Run nsThread::ProcessNextEvent can occur related to IDB operations on large byte arrays. This is similar to bug 1274075. Crash reports: https://crash-stats.mozilla.com/report/index/dde0e9ed-3e6b-43cd-be32-bef4e2160523 https://crash-stats.mozilla.com/report/index/2f3e25be-1ed2-47eb-a11a-455a42160523 https://crash-stats.mozilla.com/report/index/8485b481-c264-4804-8e34-428a22160523
1,275,339
11,434,370
This bug was filed from the Socorro interface and is report bp-ca9ae074-6b5c-42f9-81eb-0080f2160524. ============================================================= Firefox 46 consistently crashes with SIGSEGV when playing HTML5 video, or sometimes when merely loading HTML5 video elements.
1,276,488
11,446,557
This bug was filed from the Socorro interface and is report bp-81611011-ce24-41f3-b56a-764c32160527. ============================================================= There are a decent number of these crashes floating around on various versions. They're crashes early in startup, and users sometimes submit a large number of them. I debugged the minidump for bp-81611011-ce24-41f3-b56a-764c32160527, and the MSVC debugger says we're crashing because gCacheData is null. The MSVC debugger also says sPreferences is null, and sShutdown is false. This suggests that the codepath from AddBoolVarCache calling GetBool calling GetBool calling InitStaticMembers didn't actually work right -- I'm guessing because the do_GetService somehow failed. The stack in the MSVC debugger isn't any better than in crash-stats. However, Linux crashes like bp-563a3c80-2340-4bda-a49a-81d2d2160525 have a full stack. Is there something obvious here that might cause the do_GetService to fail?
1,273,372
11,413,373
This bug was filed from the Socorro interface and is report bp-0d607c08-d6fc-4bb8-a49a-97a0d2160515. ============================================================= We're still seeing a low volume of crashes in mozilla::gmp::GMPChild::ProcessingError. I can reproduce this crash if I have my Firefox profile dir behind a junction on my D: drive. i.e.: mklink /J c:\Users\cpearce\Desktop\d-firefox d:\firefox # .. unzip a Nightly into ~/Desktop\d-firefox cd ~/Desktop/d-firefox/firefox/ ./firefox --profile profile --no-remote # Netflix fails with F7702-1003-8053000B error. Looking in about:crashes, I see this crash report: https://crash-stats.mozilla.com/report/index/eb2527e0-7466-42c3-b0ce-fb0a82160517 This is similar (or pretty much the same as) bug 1236680. There's 3 crashes in 48, and one of those was me. We had twenty-something crashes in 45, and none in 46. Presumably because users who had this in 45 gave up watching Netflix in Firefox.
305,181
2,585,201
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b4) Gecko/20050818 Firefox/1.0+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b4) Gecko/20050818 Firefox/1.0+ I get a crash when I navigate between my Gmail inbox and another URL. Both with branch and trunk. TB8513919M TB8513834Q TB8513943M Reproducible: Always Steps to Reproduce: 1. Go to Gmail Inbox. 2. Click the toolbar Home button or a bookmark. 3. Click Back (Firefox goes back to inbox) 4. Click Back (nothing happens) 5. Click Back (crash) Actual Results: Firefox should go the the first page. Expected Results: It crashed.
300,404
2,548,741
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b3) Gecko/20050711 Firefox/1.0+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b3) Gecko/20050711 Firefox/1.0+ After firefox has downloaded an update it restarts to apply it. I see the progress bar as it applies the update then this window closes but firefox does not start. I can start firefox manually. This has happened twice out of about eight times I have updated. Reproducible: Sometimes Steps to Reproduce:
300,936
2,553,019
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.8) Gecko/20050712 Firefox/1.0.4 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.8) Gecko/20050712 Firefox/1.0.4 mozilla/modules/libpr0n/decoders/xbm/nsXBMDecoder.cpp: *** nsresult nsXBMDecoder::ProcessData(const char* aData, PRUint32 aCount) { [...] // Check for X11 flavor if (strstr(mPos, " char ")) mIsX10 = PR_FALSE; // Check for X10 flavor else if (strstr(mPos, " short ")) mIsX10 = PR_TRUE; else // Neither identifier found. Return for now, waiting for more data. return NS_OK; [...] if (mState == RECV_DATA) { PRUint32 bpr; mFrame->GetImageBytesPerRow(&bpr); PRUint32 abpr; mFrame->GetAlphaBytesPerRow(&abpr); PRBool hiByte = PR_TRUE; do { PRUint32 pixel = strtoul(mPos, &endPtr, 0); [...] [1] while (*endPtr && isspace(*endPtr)) endPtr++; // skip whitespace looking for comma if (*endPtr && (*endPtr != ',')) { [5] *endPtr = '\0'; mState = RECV_DONE; // strange character (or ending '}') } (...) if (!mIsX10 || !hiByte) [2] mPos = endPtr; // go to next value only when done with this one [...] [3] mPos++; [4] } while (*mPos && (mState == RECV_DATA)); *** The ProcessData function of the nsXBMDecoder class parse the data of an XBM's format image. The bug happens during the re-processing of this image format within the libpr0n, a module activated by default : At [1] endPtr is incremented until the null terminating character if it's fill by ' ' space. At [2] mPos is set to endPtr if mIsX10 and hiByte are null. There are option taken from the XBM format's image. At [3], mPos is incremented without checking if *mPos is null. Thus the boucle at [4] can not stop depending on the state of the heap. I found it is possible to craft such an XBM image to put the heap layout in a predictable state and exploit the bug reliably. An attacker could execute arbitrary code on mozilla, firefox if a web page is viewed or even within an e-mail with a IFRAME tag. Reproducible: Always Steps to Reproduce: #0 nsXBMDecoder::ProcessData (this=0x870b2e0, aData=0x81c3e44 "#define gopher_binary_width 20\n#define gopher_binary_height 23\nstatic char gopher_binary_bits[] = {\n 0x00, 0x00, 0x00, 0x00 , 0x00, 0x00, 0x00, 0 x00, 0x00, 0x00, 0x00, 0x00,\n 0xff, 0x3f, 0x00, 0x01"..., aCount=254) at nsXBMDecoder.cpp:142 #1 0x41fc11d9 in nsXBMDecoder::ReadSegCb (aIn=0x8680e2c, aClosure=0x870b2e0, aFromRawSegment=0x81c3e44 "#define gopher_binary_width 20\n#define gopher_binary_height 23\nstatic char gopher_binary_bits[] = {\n 0x00, 0x00, 0x00, 0x00, 0x00, 0x0 0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n 0xff, 0x3f, 0x00, 0x01"..., aToOffset=0, aCount=254, aWriteCount=0xbfffe844) at nsXBMDecoder.cpp:129 #2 0x401942a2 in nsPipeInputStream::ReadSegments (this=0x8680e2c, writer=0x41fc11a0 <nsXBMDecoder::ReadSegCb(nsIInputStream*, void*, char const*, unsigned int, unsigned int, unsigned int*)>, closure=0x870b2e0, c ount=254, readCount=0xbfffe8c8) at nsPipe3.cpp:761 #3 0x41fc1223 in nsXBMDecoder::WriteFrom (this=0x870b2e0, aInStr=0x8680e2c, aCount=254, aRetval=0xbfffe8c8) at nsXBMDecoder.cpp:134 #4 0x41fadc8f in imgRequest::OnDataAvailable (this=0x87e60d8, aRequest=0x8798458, ctxt=0x0, inStr=0x8680e2c, sourceOffset=0, count=254) at imgReques t.cpp:796 #5 0x41fa5f50 in ProxyListener::OnDataAvailable (this=0x8285b98, aRequest=0x8798458, ctxt=0x0, inStr=0x8680e2c, sourceOffset=0, count=254) at imgLoa der.cpp:862 #6 0x41ca0b8b in nsMediaDocumentStreamListener::OnDataAvailable (this=0x871a678, request=0x8798458, ctxt=0x0, inStr=0x8680e2c, sourceOffset=0, count =254) at nsMediaDocument.cpp:114 #7 0x415e7688 in nsDocumentOpenInfo::OnDataAvailable (this=0x873e740, request=0x8798458, aCtxt=0x0, inStr=0x8680e2c, sourceOffset=0, count=254) at n sURILoader.cpp:344 #8 0x40bb6933 in nsFileChannel::OnDataAvailable (this=0x8798458, req=0x8748a20, ctx=0x0, stream=0x8680e2c, offset=0, count=254) at nsFileChannel.cpp :594 #9 0x40b2d258 in nsInputStreamPump::OnStateTransfer (this=0x8748a20) at nsInputStreamPump.cpp:433 #10 0x40b2ce88 in nsInputStreamPump::OnInputStreamReady (this=0x8748a20, stream=0x8680e2c) at nsInputStreamPump.cpp:336 #11 0x401983f7 in nsInputStreamReadyEvent::EventHandler (plevent=0x86cadf4) at nsStreamUtils.cpp:118 #12 0x401bbf9b in PL_HandleEvent (self=0x86cadf4) at plevent.c:673 #13 0x401bbe50 in PL_ProcessPendingEvents (self=0x80d0fd0) at plevent.c:608 #14 0x401bf14a in nsEventQueueImpl::ProcessPendingEvents (this=0x80d0ad8) at nsEventQueue.cpp:398 #15 0x409591d0 in event_processor_callback (data=0x80d0ad8, source=4, condition=GDK_INPUT_READ) at nsAppShell.cpp:186 #16 0x40958b7d in our_gdk_io_invoke (source=0x8211540, condition=G_IO_IN, data=0x8210f50) at nsAppShell.cpp:71 #17 0x404284c6 in g_io_add_watch () from /usr/lib/libglib-1.2.so.0 #18 0x40429dd8 in g_get_current_time () from /usr/lib/libglib-1.2.so.0 #19 0x4042a2c1 in g_get_current_time () from /usr/lib/libglib-1.2.so.0 #20 0x4042a5e5 in g_main_run () from /usr/lib/libglib-1.2.so.0 #21 0x4033525f in gtk_main () from /usr/lib/libgtk-1.2.so.0 #22 0x4095961a in nsAppShell::Run (this=0x80d6c48) at nsAppShell.cpp:317 #23 0x408cf8ea in nsAppShellService::Run (this=0x80d56e0) at nsAppShellService.cpp:494 #24 0x0805e5cd in xre_main (argc=1, argv=0xbffff484, aAppData=0x807500c) at nsAppRunner.cpp:1907 #25 0x0805851c in main (argc=1, argv=0xbffff484) at nsBrowserApp.cpp:58 ------------------ #define gopher_binary_width 20 #define gopher_binary_height 23 static char gopher_binary_bits[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0x3f, 0x00, 0x01, 0x60, 0x00, 0x01, 0xa0, 0x00, 0x71, 0x26, 0x01 EOF As you can see, the image end with a space character, when the program assume the image to be clean and contain end tag. Thus, if one is able to control the heap layout, it is possible to execute arbitrary code. Here is some details on how to exploit the bug on Linux : - Use a javascript and allocate a lot of 'local' buffer. I found JC_GC is called at the end of the javascript parsing, before any image are loaded, and will free all 'useless' (because local) buffer. Thus, it is easy to 1) Allocate in some global array a lot of *little bufer* to begin, so we have the heap layout in a predictable state (no hole). 2) Allocate a few big buffer with isdigit()-valid character. Because there is no more heap hole, the 'top chunk' of the heap is expended. 3) When JC_GC return, some memory have been freed, and thus, following allocation will fall in these new heap hole. 4) When the image is processed, the overflowed buffer will be followed by isdigit-character (this is junk in the prev_size field of the next struct malloc_chunk). Then a '\0' will be written on the LSB of the 'next size' field of the next struct malloc_chunk on the heap. Because it is easily possible to inject controlled character on the heap (actually that could have been done in the "few isdigit()-valid buffer"), it is possible to store fake information on the heap, and tricks malloc()/free()/etc to parse them. Still in the scheme of Doug Lea malloc (linux), this will end by triggering the macro UNLINK(), which basically insert a heap chunk in a linked list, thus, writing a controlled pointer of us, to a controlled address of us. One can simply overwrite any function pointer, like GOT entry, saved %eip pointer on the stack, and hijack it to point to some injected shellcode. Exploitation is possible on *BSD / Windows aswell. Actual Results: Ability to execute whatever code you want. Expected Results: Stop me.
309,777
2,620,035
STEPS TO REPRODUCE: 1) Download the stuff in bug 309467 and follow the steps there to reproduce it. 2) Use the file I'm about to attach as the data file. ACTUAL RESULTS: Double-delete, with the following stack (gotten via MALLOC_CHECK_=2): #0 0x00a127a2 in _dl_sysinfo_int80 () from /lib/ld-linux.so.2 #1 0xb7c5f7d5 in raise () from /lib/tls/libc.so.6 #2 0xb7c61149 in abort () from /lib/tls/libc.so.6 #3 0xb7c9e4b5 in free_check () from /lib/tls/libc.so.6 #4 0xb7c99de5 in free () from /lib/tls/libc.so.6 #5 0x00ac2cd3 in operator delete () from /usr/lib/libstdc++.so.5 #6 0xb5c34ca2 in ~CNavDTD (this=0x89a3ea0) at ../../../../mozilla/parser/htmlparser/src/CNavDTD.cpp:250 #7 0xb5c3454d in CNavDTD::Release (this=0x89a3ea0) at ../../../../mozilla/parser/htmlparser/src/CNavDTD.cpp:162 #8 0xb5c4db02 in CParserContext::~CParserContext () at ../../../../mozilla/parser/htmlparser/src/nsScanner.cpp:54 #9 0xb5c44306 in ~nsParser (this=0x89989c8) at ../../../../mozilla/parser/htmlparser/src/nsParser.cpp:413 #10 0xb5c44623 in nsParser::Release (this=0x89989c8) at ../../../../mozilla/parser/htmlparser/src/nsParser.cpp:423 #11 0xb5ac63de in nsCOMPtr<nsIStreamListener>::~nsCOMPtr () at ../../dist/include/necko/nsIRequestObserver.h:34 #12 0xb5ac3a9b in nsDocumentOpenInfo::OnStopRequest (this=0x8951200, request=0x8950930, aCtxt=0x0, aStatus=0) at ../../../mozilla/uriloader/base/nsURILoader.cpp:389 #13 0xb7759134 in nsFileChannel::OnStopRequest (this=0x8950900, req=0x8951488, ctx=0x0, status=0) at ../../../../../mozilla/netwerk/protocol/file/src/nsFileChannel.cpp:548 #14 0xb76c9ede in nsInputStreamPump::OnStateStop (this=0x8951488) at ../../../../mozilla/netwerk/base/src/nsInputStreamPump.cpp:506 #15 0xb76c97f5 in nsInputStreamPump::OnInputStreamReady (this=0x8951488, stream=0x8951244) at ../../../../mozilla/netwerk/base/src/nsInputStreamPump.cpp:343 #16 0xb7f72695 in nsInputStreamReadyEvent::EventHandler (plevent=0x89515d4) at ../../../mozilla/xpcom/io/nsStreamUtils.cpp:119 #17 0xb7f96a30 in PL_HandleEvent (self=0x89515d4) at ../../../mozilla/xpcom/threads/plevent.c:688 #18 0xb7f968d1 in PL_ProcessPendingEvents (self=0x81fef10) at ../../../mozilla/xpcom/threads/plevent.c:623 #19 0xb7f99dea in nsEventQueueImpl::ProcessPendingEvents (this=0x81feec8) at ../../../mozilla/xpcom/threads/nsEventQueue.cpp:419
309,897
2,620,942
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8b4) Gecko/20050908 Firefox/1.4 Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8b4) Gecko/20050908 Firefox/1.4 If you use E4X in a long running script, the browser doesn't pop up an alert that it is "running slowly" - it just crashes. Reproducible: Always Steps to Reproduce: click on stress test in test file
310,426
2,639,875
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20050928 Firefox/1.6a1 Steps to reproduce: 1. Load the testcase. 2. Close the tab, close the window, or reload. Result: Crash [@ DoDeletingFrameSubtree]. TB9854206G. I think this crash is exploitable. (I know there is *an* exploitable crash [@ DoDeletingFrameSubtree], but I'm not sure *this* crash is exploitable.) I can't reproduce this crash on the Gecko 1.8 branch.
306,788
2,598,183
BUILD: Current trunk debug build STEPS TO REPRODUCE: 1) Load http://www.cloud9sales.com/test/raining_NSMozFail.htm 2) Click the "All Products" link NOTE: What the page is doing is: prodRainTapThr[0] = new Array("Airedale","","ATPAIR.jpg",125,151,"Multi","RcP","$59.95",339); ... prodRainTapThr[58] = new Array("Yorkie","","ATPYOR.jpg",150,114,"Multi","RcL","$59.95",396); prodRainTapThr.sort(); We crash inside Array.sort like so: (gdb) frame 0 #0 0xb7e6fb09 in js_CompareStrings (str1=0xb32460e0, str2=0x83ae120) at ../../../mozilla/js/src/jsstr.c:2800 2800 s1 = JSSTRING_CHARS(str1), s2 = JSSTRING_CHARS(str2); (gdb) p *str1 $9 = {length = 3671775962, chars = 0xdadadada} The problem is the code at http://bonsai.mozilla.org/cvsblame.cgi?file=mozilla/js/src/jsarray.c&rev=3.60&mark=816,817#812 -- astr can get GCed when we create bstr. I've verified that if I lock astr around the creation of bstr the crash goes away.
307,259
2,602,019
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.8) Gecko/20050416 Epiphany/1.2.8 Build Identifier: I have found a format string vulnerability within Firefox 1.0.6 which allows for arbitrary code execution. Affect Versions: Firefox Linux 1.0.6 Firefox Win32 1.0.6 Deer Park Latest Build Below is a url to reproduce this issue: http://www.security-protocols.com/firefoxwin32-death.html If you need any further information, please let me know. Thanks, Tom Ferris Researcher www.security-protocols.com Key fingerprint = 0DFA 6275 BA05 0380 DD91 34AD C909 A338 D1AF 5D78 Reproducible: Always Steps to Reproduce:
307,662
2,604,843
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6 checksetup fails when upgrading my 2.18.3 db to 2.20rc2+ (BUGZILLA-2_20-BRANCH) ...# ./checksetup.pl Checking perl modules ... Checking for AppConfig (v1.52) ok: found v1.56 Checking for CGI (v2.93) ok: found v3.04 Checking for Data::Dumper (any) ok: found v2.121 Checking for Date::Format (v2.21) ok: found v2.22 Checking for DBI (v1.38) ok: found v1.46 Checking for File::Spec (v0.84) ok: found v0.87 Checking for File::Temp (any) ok: found v0.14 Checking for Template (v2.08) ok: found v2.14 Checking for Text::Wrap (v2001.0131) ok: found v2001.09291 Checking for Mail::Mailer (v1.65) ok: found v1.67 Checking for Storable (any) ok: found v2.12 The following Perl modules are optional: Checking for GD (v1.20) ok: found v2.23 Checking for Chart::Base (v1.0) ok: found v2.3 Checking for XML::Parser (any) ok: found v2.34 Checking for GD::Graph (any) ok: found v1.43 Checking for GD::Text::Align (any) ok: found v1.18 Checking for PatchReader (v0.9.4) ok: found v0.9.5 Checking user setup ... Removing existing compiled templates ... Precompiling templates ... Checking for DBD::mysql (v2.9003) ok: found v2.9006 Checking for MySQL (v3.23.41) ok: found v4.1.11-Debian_4sarge1-log Checking for Net::LDAP (any) ok: found v0.32 Checking for GraphViz (any) ok: found Renaming indexes... Removing index 'creator_2' from the series table... Renaming index bug_id to attachments_bug_id_idx... Renaming index creation_ts to attachments_creation_ts_idx... Renaming index bug_id to bug_group_map_bug_id_idx... Renaming index group_id to bug_group_map_group_id_idx... Renaming index priority to bugs_priority_idx... Renaming index reporter to bugs_reporter_idx... Renaming index product_id to bugs_product_id_idx... Renaming index creation_ts to bugs_creation_ts_idx... Renaming index assigned_to to bugs_assigned_to_idx... Renaming index qa_contact to bugs_qa_contact_idx... Renaming index short_desc to bugs_short_desc_idx... Renaming index votes to bugs_votes_idx... Renaming index bug_severity to bugs_bug_severity_idx... Renaming index bug_status to bugs_bug_status_idx... Renaming index delta_ts to bugs_delta_ts_idx... Renaming index version to bugs_version_idx... Renaming index component_id to bugs_component_id_idx... Renaming index resolution to bugs_resolution_idx... Renaming index target_milestone to bugs_target_milestone_idx... Renaming index alias to bugs_alias_idx... Renaming index op_sys to bugs_op_sys_idx... Renaming index bug_id to bugs_activity_bug_id_idx... Renaming index bug_when to bugs_activity_bug_when_idx... Renaming index fieldid to bugs_activity_fieldid_idx... Renaming index category_id to category_group_map_category_id_idx... Renaming index bug_id to cc_bug_id_idx... Renaming index who to cc_who_idx... Renaming index product_id to components_product_id_idx... Renaming index name to components_name_idx... Renaming index blocked to dependencies_blocked_idx... Renaming index dependson to dependencies_dependson_idx... Renaming index sortkey to fielddefs_sortkey_idx... Renaming index name to fielddefs_name_idx... Renaming index type_id to flagexclusions_type_id_idx... Renaming index type_id to flaginclusions_type_id_idx... Renaming index bug_id to flags_bug_id_idx... Renaming index setter_id to flags_setter_id_idx... Renaming index requestee_id to flags_requestee_id_idx... Renaming index product_id to group_control_map_product_id_idx... Renaming index group_id to group_control_map_group_id_idx... Renaming index member_id to group_group_map_member_id_idx... Renaming index name to groups_name_idx... Renaming index name to keyworddefs_name_idx... Renaming index keywordid to keywords_keywordid_idx... Renaming index bug_id to keywords_bug_id_idx... Renaming index lastused to logincookies_lastused_idx... Renaming index bug_id to longdescs_bug_id_idx... Renaming index bug_when to longdescs_bug_when_idx... Renaming index who to longdescs_who_idx... Renaming index thetext to longdescs_thetext_idx... Renaming index product_id to milestones_product_id_idx... Renaming index userid to namedqueries_userid_idx... Renaming index name to products_name_idx... Renaming index login_name to profiles_login_name_idx... Renaming index userid to profiles_activity_userid_idx... Renaming index profiles_when to profiles_activity_profiles_when_idx... Renaming index fieldid to profiles_activity_fieldid_idx... Renaming index creator to series_creator_idx... Renaming index name to series_categories_name_idx... Renaming index series_id to series_data_series_id_idx... Renaming index userid to tokens_userid_idx... Renaming index user_id to user_group_map_user_id_idx... Renaming index bug_id to votes_bug_id_idx... Renaming index who to votes_who_idx... Renaming index watcher to watch_watcher_idx... Renaming index watched to watch_watched_idx... Updating column public in table series ... New: tinyint NOT NULL DEFAULT 0 Updating column isactive in table bug_status ... New: tinyint NOT NULL DEFAULT 1 Updating column isactive in table rep_platform ... New: tinyint NOT NULL DEFAULT 1 Updating column isactive in table resolution ... New: tinyint NOT NULL DEFAULT 1 Updating column isactive in table op_sys ... New: tinyint NOT NULL DEFAULT 1 Updating column isactive in table bug_severity ... New: tinyint NOT NULL DEFAULT 1 Updating column isactive in table priority ... New: tinyint NOT NULL DEFAULT 1 Updating column approved in table quips ... New: tinyint NOT NULL DEFAULT 1 Adding group editclassifications ... Adding group bz_canusewhines ... Adding group bz_canusewhineatothers ... DBD::mysql::db selectrow_array failed: Unknown column 'grant_type' in 'where clause' [for Statement "SELECT 1 FROM group_group_map WHERE member_id = ? AND grantor_id = ? AND grant_type = ?"] at ./checksetup.pl line 4067 Reproducible: Always Steps to Reproduce:
299,547
2,542,052
XUL Error Pages should work well even if fastback is enabled. I'm not sure what the state is currently.
302,536
2,565,360
User-Agent: Mozilla/5.0 (Windows; U; Win95; en-US; rv:1.8b4) Gecko/20050727 SeaMonkey/1.0a Build Identifier: Mozilla/5.0 (Windows; U; Win95; en-US; rv:1.8b4) Gecko/20050727 SeaMonkey/1.0a Every day my dad would go to www.vdab.be to look for job offers. Almost every day SeaMonkey would crash during his visit. The visit is such a routine that he doesn't know what he did prior to the crash. Today I noticed it crashing when printing a page on the site. I could reproduce it. Printing Google works fine, though. Yet when I was initially typing this bug report, SeaMonkey also crashed by having the site in a tab. I've included TalkBack IDs. There are a lot of them. Reproducible: Always Steps to Reproduce: 1. Go to http://www.vdab.be/ 2. Click "Werk Zoeken" 3. Choose selections from the pulldown menus 4. Click "Zoeken" 5. Click "Toon Jobs" 6. Click on one of the offers 7. Print the page Actual Results: SeaMonkey will crash a few seconds after sending the commands to the printer driver. Expected Results: Not have crashed. TB7353636Z TB7426469Y TB7503541E TB7812815M TB7885445H TB7886042W TB7889075K TB7889605X
303,336
2,571,524
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8b4) Gecko/20050725 MultiZilla/1.8.0.1h SeaMonkey/1.0a Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8b4) Gecko/20050726 MultiZilla/1.8.0.1h SeaMonkey/1.0a When I try to open an attached message that was forwarded to me as an attachment, the SeaMonkey application stops responding and eventually crashes. If there were more attached messages the application crashes quicker. The problem started to appear in SeaMonkey 2005-07-26 and appears till current nightly (2005-08-03-06-trunk). The problem is not in SeaMonkey 2005-07-25 and prior versions. I am on Windows 2000 and I am getting my email through IMAP on Microsoft Exchange. Reproducible: Always Steps to Reproduce: 1. Forward a message as an attachment to myself or let somebody send it to you. 2. Try to open that attached message. 3. SeaMonkey crashes. Actual Results: Crash Expected Results: Open the attached message. No talkback appeared, no errors, nothing, the SeaMonkey application just disappeared.
303,901
2,575,310
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8b3) Gecko/20050712 Firefox/1.0+ Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8b3) Gecko/20050712 Firefox/1.0+ When accessing a malformed .html page, Deer Park 2 will segfault. I have attached the malformed .html file for your review. This only seems to affect the Linux version of Deer Park 2. Thanks, -- Tom Ferris Researcher www.security-protocols.com Key fingerprint = 0DFA 6275 BA05 0380 DD91 34AD C909 A338 D1AF 5D78 Reproducible: Always Steps to Reproduce: 1. Browse to the malformed .html via a webserver. Actual Results: Deer Park 2 will segfault. Expected Results: Should properly parse the .html page.
307,989
2,606,960
Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.9a1) Gecko/20050910 Firefox/1.6a1 Steps to reproduce: 1. Open the very evil testcase. 2. Select some text and start dragging it. (You can use the keyboard to select all before dragging with the mouse.) 3. Wait until the page changes. 4. Drop. Result: More often than not, the browser crashes [@ nsIView::GetViewFor] [@ GetWrapperFor]. The top of the stack is a random address. I'm pretty sure this is exploitable. TB9234593K, TB9234571Z Please keep this security-sensitive until a Firefox release with this fix has gone out and both bug 306663 and bug 306939 have become public.
308,085
2,607,668
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.10) Gecko/20050825 Firefox/1.0.4 (Debian package 1.0.4-2sarge3) Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8b4) Gecko/20050908 Firefox/1.4 The attached html file, when run, first puts up an alert box showing 43 (which is correct) but then, instead of putting up an alert showing CORRECT, it puts up one showing BUG. This indicates that the big switch statement, which has cases for 0 through 244 as well as default, is going to the wrong place. Note, as should be clear, the JavaScript code is machine generated. It doesn't take much of a change to cause the bug to go away (or atleast hide). I marked this bug critical because clearly the JavaScript could do any thing, including causing data to be lost. Reproducible: Always Steps to Reproduce: 1. load the html file 2. click ok on the first alert (showing 43) 3. observe the alert showing BUG Actual Results: You see the BUG alert Expected Results: You should see the CORRECT alert
308,706
2,612,098
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6 Build Identifier: Firefox 1.5 Beta Mac OSX see below for specifics Apple Crash Info below: Machine Model: Power Mac G5 CPU Type: PowerPC G5 (3.0) Number Of CPUs: 2 CPU Speed: 2.5 GHz L2 Cache (per CPU): 512 KB Memory: 2.5 GB Bus Speed: 1.25 GHz Boot ROM Version: 5.1.8f7 Date/Time: 2005-09-15 11:28:07 -0700 OS Version: 10.3.9 (Build 7W98) Report Version: 2 Command: firefox-bin Path: /Applications/Firefox 1.5ß.app/Contents/MacOS/firefox-bin Version: 1.4 (1.4) PID: 706 Thread: 0 Exception: EXC_BAD_ACCESS (0x0001) Codes: KERN_PROTECTION_FAILURE (0x0002) at 0x00000000 Thread 0 Crashed: 0 firefox-bin 0x002125dc _ZN14nsContentUtils14SplitExpatNameEPKtPP7nsIAtomS4_Pi + 0xa8 1 firefox-bin 0x00517618 _ZN18XULContentSinkImpl18HandleStartElementEPKtPS1_jij + 0x8c 2 firefox-bin 0x00518200 _ZN18XULContentSinkImpl11ReportErrorEPKtS1_ + 0x1b8 3 firefox-bin 0x0065d8c8 _ZN13nsExpatDriver11HandleErrorEv + 0x404 4 firefox-bin 0x0065db34 _ZN13nsExpatDriver11ParseBufferEPKcji + 0x220 5 firefox-bin 0x002a2f0c _ZN8nsParser11DidTokenizeEi + 0x88 6 firefox-bin 0x002a2e58 _ZN8nsParser8TokenizeEi + 0x188 7 firefox-bin 0x002a183c _ZN8nsParser11ResumeParseEiii + 0x10c 8 firefox-bin 0x002a2abc _ZN8nsParser13OnStopRequestEP10nsIRequestP11nsISupportsj + 0x50 9 firefox-bin 0x004558ec _ZN12nsJARChannel13OnStopRequestEP10nsIRequestP11nsISupportsj + 0x54 10 firefox-bin 0x004121e8 _ZN17nsInputStreamPump11OnStateStopEv + 0xa0 11 firefox-bin 0x00411d70 _ZN17nsInputStreamPump18OnInputStreamReadyEP19nsIAsyncInputStream + 0x80 12 libxpcom_core.dylib 0x10080ec4 0x10000000 + 0x80ec4 13 libxpcom_core.dylib 0x10045ca4 PL_HandleEvent + 0x24 14 libxpcom_core.dylib 0x10045bc8 PL_ProcessPendingEvents + 0x80 15 libxpcom_core.dylib 0x10047310 _ZN16nsEventQueueImpl20ProcessPendingEventsEv + 0x3c 16 libxpcom_core.dylib 0x1000793c NS_ShutdownXPCOM_P + 0x17c 17 firefox-bin 0x00010090 _ZN18ScopedXPCOMStartupD4Ev + 0x3c 18 firefox-bin 0x000143f0 XRE_main + 0xf88 19 firefox-bin 0x0000f6a8 start + 0x1b0 20 firefox-bin 0x0000f528 start + 0x30 Thread 1: 0 libSystem.B.dylib 0x90018e18 semaphore_timedwait_signal_trap + 0x8 1 libSystem.B.dylib 0x9000e9d4 _pthread_cond_wait + 0x268 2 libnspr4.dylib 0x03017c68 PR_Unlock + 0x12c 3 libnspr4.dylib 0x03017ecc PR_WaitCondVar + 0x88 4 libxpcom_core.dylib 0x1004b4b0 _ZN11TimerThread3RunEv + 0x19c 5 libxpcom_core.dylib 0x100488c4 _ZN8nsThread4MainEPv + 0x38 6 libnspr4.dylib 0x0301cd80 PR_Select + 0x354 7 libSystem.B.dylib 0x90024910 _pthread_body + 0x28 PPC Thread State: srr0: 0x002125dc srr1: 0x0200f030 vrsave: 0x00000000 cr: 0x42024262 xer: 0x00000000 lr: 0x00517618 ctr: 0x10001f24 r0: 0x00000034 r1: 0xbffff010 r2: 0x1008a3b8 r3: 0x00000000 r4: 0xbffff050 r5: 0xbffff180 r6: 0xbffff180 r7: 0xffffffff r8: 0x00000000 r9: 0x019cc030 r10: 0x01a0197f r11: 0x019cbfc8 r12: 0x10001f24 r13: 0x009f0000 r14: 0xbffffd6c r15: 0x00000000 r16: 0x00000001 r17: 0xbffffc40 r18: 0xbffffc30 r19: 0xbffff490 r20: 0xbffff4a8 r21: 0x00000000 r22: 0xbffff150 r23: 0x1008b4e8 r24: 0xbffff140 r25: 0x009f0000 r26: 0xbffff140 r27: 0x00000000 r28: 0xbffff050 r29: 0x019cc048 r30: 0x00000000 r31: 0x019cc032 Binary Images Description: 0x1000 - 0x9c9fff firefox-bin /Applications/Firefox 1.5√ü.app/Contents/MacOS/firefox-bin 0xfbd000 - 0xfd0fff libjsd.dylib /Applications/Firefox 1.5√ü.app/Contents/MacOS/components/libjsd.dylib 0x1845000 - 0x1878fff libxpinstall.dylib /Applications/Firefox 1.5√ü.app/Contents/MacOS/components/libxpinstall.dylib 0x2878000 - 0x287afff com.apple.textencoding.unicode 1.6.4 /System/Library/TextEncodings/Unicode Encodings.bundle/Contents/MacOS/Unicode Encodings 0x3000000 - 0x3032fff libnspr4.dylib /Applications/Firefox 1.5√ü.app/Contents/MacOS/libnspr4.dylib 0x4000000 - 0x400dfff libplds4.dylib /Applications/Firefox 1.5√ü.app/Contents/MacOS/libplds4.dylib 0x5000000 - 0x500efff libplc4.dylib /Applications/Firefox 1.5√ü.app/Contents/MacOS/libplc4.dylib 0x6000000 - 0x6082fff libmozjs.dylib /Applications/Firefox 1.5√ü.app/Contents/MacOS/libmozjs.dylib 0x7000000 - 0x7000fff libxpcom.dylib /Applications/Firefox 1.5√ü.app/Contents/MacOS/libxpcom.dylib 0x8000000 - 0x801bfff libssl3.dylib /Applications/Firefox 1.5√ü.app/Contents/MacOS/libssl3.dylib 0x9000000 - 0x905ffff libnss3.dylib /Applications/Firefox 1.5√ü.app/Contents/MacOS/libnss3.dylib 0xa000000 - 0xa01dfff libsmime3.dylib /Applications/Firefox 1.5√ü.app/Contents/MacOS/libsmime3.dylib 0xb000000 - 0xb07afff libsoftokn3.dylib /Applications/Firefox 1.5√ü.app/Contents/MacOS/libsoftokn3.dylib 0xc000000 - 0xc018fff libxpcom_compat.dylib /Applications/Firefox 1.5√ü.app/Contents/MacOS/libxpcom_compat.dylib 0x10000000 - 0x10084fff libxpcom_core.dylib /Applications/Firefox 1.5√ü.app/Contents/MacOS/libxpcom_core.dylib 0x80830000 - 0x8090efff libxml2.2.dylib /usr/lib/libxml2.2.dylib 0x84372000 - 0x84382fff com.apple.Accelerate.vecLib 3.0.3 (vecLib 3.0.3) /System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vecLib.framework/Versions/A/vecLib 0x88100000 - 0x88236fff com.apple.vImage 1.2.0 /System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vImage.framework/Versions/A/vImage 0x8fd50000 - 0x8fd50fff com.apple.Accelerate 1.0.3 (Accelerate 1.0.3) /System/Library/Frameworks/Accelerate.framework/Versions/A/Accelerate 0x8fe00000 - 0x8fe4ffff dyld /usr/lib/dyld 0x90000000 - 0x9014ffff libSystem.B.dylib /usr/lib/libSystem.B.dylib 0x901c0000 - 0x9026dfff com.apple.CoreFoundation 6.3.8 (299.36) /System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation 0x902b0000 - 0x90529fff com.apple.CoreServices.CarbonCore 10.3.7 /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/CarbonCore.framework/Versions/A/CarbonCore 0x90584000 - 0x905f3fff com.apple.framework.IOKit 1.3.6 (???) /System/Library/Frameworks/IOKit.framework/Versions/A/IOKit 0x90610000 - 0x9069afff com.apple.CoreServices.OSServices 3.0.1 /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/OSServices.framework/Versions/A/OSServices 0x90700000 - 0x90700fff com.apple.CoreServices 10.3 (???) /System/Library/Frameworks/CoreServices.framework/Versions/A/CoreServices 0x907f0000 - 0x907f9fff com.apple.DiskArbitration 2.0.5 /System/Library/PrivateFrameworks/DiskArbitration.framework/Versions/A/DiskArbitration 0x90810000 - 0x90810fff com.apple.ApplicationServices 1.0 (???) /System/Library/Frameworks/ApplicationServices.framework/Versions/A/ApplicationServices 0x90830000 - 0x9089ffff libobjc.A.dylib /usr/lib/libobjc.A.dylib 0x908c5000 - 0x90915fff com.apple.HIServices 1.4.1 (0.0.1d1) /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/HIServices.framework/Versions/A/HIServices 0x90940000 - 0x909b3fff com.apple.DesktopServices 1.2.5 /System/Library/PrivateFrameworks/DesktopServicesPriv.framework/Versions/A/DesktopServicesPriv 0x909f0000 - 0x90a04fff libCGATS.A.dylib /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/CoreGraphics.framework/Versions/A/Resources/libCGATS.A.dylib 0x90a20000 - 0x90b7bfff com.apple.Foundation 6.3.7 (500.59) /System/Library/Frameworks/Foundation.framework/Versions/C/Foundation 0x90d00000 - 0x90d1bfff com.apple.SystemConfiguration 1.7.1 (???) /System/Library/Frameworks/SystemConfiguration.framework/Versions/A/SystemConfiguration 0x90d2c000 - 0x90d43fff com.apple.LangAnalysis 1.5.4 /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/LangAnalysis.framework/Versions/A/LangAnalysis 0x90daf000 - 0x90daffff com.apple.audio.units.AudioUnit 1.3.3 /System/Library/Frameworks/AudioUnit.framework/Versions/A/AudioUnit 0x90db6000 - 0x90dc2fff com.apple.help 1.0.1 /System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/Help.framework/Versions/A/Help 0x90e77000 - 0x90e8ffff com.apple.WebServices 1.1.1 (1.1.0) /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/WebServicesCore.framework/Versions/A/WebServicesCore 0x90ec0000 - 0x90ec0fff com.apple.Cocoa 6.3 (???) /System/Library/Frameworks/Cocoa.framework/Versions/A/Cocoa 0x910b0000 - 0x91101fff com.apple.bom 1.2.5 (63.2) /System/Library/PrivateFrameworks/Bom.framework/Versions/A/Bom 0x9110d000 - 0x91174fff com.apple.audio.CoreAudio 2.1.3 /System/Library/Frameworks/CoreAudio.framework/Versions/A/CoreAudio 0x911d2000 - 0x911dffff com.apple.CommonPanels 1.2.1 (1.0) /System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/CommonPanels.framework/Versions/A/CommonPanels 0x913a0000 - 0x9145ffff ColorSync /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ColorSync.framework/Versions/A/ColorSync 0x915e0000 - 0x91699fff com.apple.QD 3.4.67 (???) /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/QD.framework/Versions/A/QD 0x916e0000 - 0x91773fff com.apple.print.framework.PrintCore 3.3 /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/PrintCore.framework/Versions/A/PrintCore 0x917b6000 - 0x917eefff com.apple.AE 1.4 /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/AE.framework/Versions/A/AE 0x91809000 - 0x91819fff com.apple.ImageCapture 2.1.5 /System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/ImageCapture.framework/Versions/A/ImageCapture 0x91a40000 - 0x91ab3fff com.apple.NavigationServices 3.3.3 /System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/NavigationServices.framework/Versions/A/NavigationServices 0x91b10000 - 0x91b2afff libPDFRIP.A.dylib /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/CoreGraphics.framework/Versions/A/Resources/libPDFRIP.A.dylib 0x91b50000 - 0x91b5ffff libPSRIP.A.dylib /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/CoreGraphics.framework/Versions/A/Resources/libPSRIP.A.dylib 0x91b80000 - 0x91b93fff libRIP.A.dylib /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/CoreGraphics.framework/Versions/A/Resources/libRIP.A.dylib 0x92056000 - 0x92061fff com.apple.securityhi 1.2 (90) /System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/SecurityHI.framework/Versions/A/SecurityHI 0x920c0000 - 0x922a7fff com.apple.security 2.4 (177) /System/Library/Frameworks/Security.framework/Versions/A/Security 0x92430000 - 0x92468fff com.apple.LaunchServices 10.3.5 (98.4) /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/LaunchServices.framework/Versions/A/LaunchServices 0x9247c000 - 0x924cafff com.apple.print.framework.Print 3.3 /System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/Print.framework/Versions/A/Print 0x9278f000 - 0x927b5fff com.apple.FindByContent 1.4 (1.2) /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/FindByContent.framework/Versions/A/FindByContent 0x927c8000 - 0x927d3fff libCSync.A.dylib /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/CoreGraphics.framework/Versions/A/Resources/libCSync.A.dylib 0x927f0000 - 0x92827fff com.apple.CFNetwork 1.2.1 (7) /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/CFNetwork.framework/Versions/A/CFNetwork 0x9283f000 - 0x92852fff com.apple.speech.synthesis.framework 3.2 /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/SpeechSynthesis.framework/Versions/A/SpeechSynthesis 0x92880000 - 0x92c05fff com.apple.HIToolbox 1.3.7 (???) /System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/HIToolbox.framework/Versions/A/HIToolbox 0x92e70000 - 0x9336ffff com.apple.AppKit 6.3.9 (743.41) /System/Library/Frameworks/AppKit.framework/Versions/C/AppKit 0x93920000 - 0x93930fff com.apple.speech.recognition.framework 3.3 /System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/SpeechRecognition.framework/Versions/A/SpeechRecognition 0x939a0000 - 0x939b4fff libcups.2.dylib /usr/lib/libcups.2.dylib 0x93a50000 - 0x93a54fff libmathCommon.A.dylib /usr/lib/system/libmathCommon.A.dylib 0x93b2d000 - 0x93b35fff libbsm.dylib /usr/lib/libbsm.dylib 0x9410d000 - 0x9412afff com.apple.audio.SoundManager 3.9 /System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/CarbonSound.framework/Versions/A/CarbonSound 0x94610000 - 0x9462afff libresolv.9.dylib /usr/lib/libresolv.9.dylib 0x94640000 - 0x94649fff libz.1.dylib /usr/lib/libz.1.dylib 0x946e0000 - 0x9473ffff com.apple.SearchKit 1.0.2 /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/SearchKit.framework/Versions/A/SearchKit 0x94800000 - 0x9488cfff com.apple.ink.framework 101.1.4 (55.12) /System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/Ink.framework/Versions/A/Ink 0x949ba000 - 0x949bafff com.apple.Carbon 10.3 (???) /System/Library/Frameworks/Carbon.framework/Versions/A/Carbon 0x94ea0000 - 0x954a6fff libBLAS.dylib /System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vecLib.framework/Versions/A/libBLAS.dylib 0x95500000 - 0x957d0fff libLAPACK.dylib /System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vecLib.framework/Versions/A/libLAPACK.dylib 0x958e0000 - 0x95900fff libvMisc.dylib /System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vecLib.framework/Versions/A/libvMisc.dylib 0x95a08000 - 0x95ac0fff com.apple.audio.toolbox.AudioToolbox 1.3.4 /System/Library/Frameworks/AudioToolbox.framework/Versions/A/AudioToolbox 0x95b50000 - 0x95c32fff libicucore.A.dylib /usr/lib/libicucore.A.dylib 0x95e40000 - 0x95eadfff libvDSP.dylib /System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vecLib.framework/Versions/A/libvDSP.dylib 0x95f30000 - 0x9601efff libiconv.2.dylib /usr/lib/libiconv.2.dylib 0x962e6000 - 0x96550fff com.apple.QuickTime 7.0.2 /System/Library/Frameworks/QuickTime.framework/Versions/A/QuickTime 0x96980000 - 0x96a46fff libcrypto.0.9.7.dylib /usr/lib/libcrypto.0.9.7.dylib 0x96aa0000 - 0x96acefff libssl.0.9.7.dylib /usr/lib/libssl.0.9.7.dylib 0x96ade000 - 0x96af8fff com.apple.openscripting 1.2.1 (???) /System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/OpenScripting.framework/Versions/A/OpenScripting 0x96b50000 - 0x96bdffff ATS /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ATS.framework/Versions/A/ATS 0x96e80000 - 0x96e90fff com.apple.vecLib 3.0.3 (vecLib 3.0.3) /System/Library/Frameworks/vecLib.framework/Versions/A/vecLib 0x96fdc000 - 0x972b4fff com.apple.CoreGraphics 1.203.30 (???) /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/CoreGraphics.framework/Versions/A/CoreGraphics 0x97335000 - 0x9739efff com.apple.htmlrendering 1.1.2 /System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/HTMLRendering.framework/Versions/A/HTMLRendering Reproducible: Always Steps to Reproduce: 1.Drag n Drop Application to the Applications folder after downloading and expanding 2.Double-click on application icon 3.watch application promptly crash Actual Results: Apple crash reporting application opened and provided above information Expected Results: Executed application. Same download worked OK on my 17" Powerbook See Details Above
247,054
2,176,793
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7) Gecko/20040614 Firefox/0.9 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7) Gecko/20040614 Firefox/0.9 After upgrading from Mozilla 0.8 to 0.9: (using migration wizard) If I go to Tools -> Options and then click on "Downloads" Mozilla crashes. It happens every time. So I cannot change any download options. :-( Reproducible: Always Steps to Reproduce: 1. Install Firefox 0.8 2. Change some download options under Tools -> Options : Downloads 3. Use Firefox 0.8 some time 4. Install some extensions (e.g. tabbrowser extension) 5. Wait for Firefox 0.9 to be released 6. Install Firefox 0.9 7. Migrate configuration from Firefox 0.8 via wizard 8. Open Tools -> Options 9. Click on "Downloads" 10. See crash window :-) Actual Results: A crash window shows up. After clicking ok. Firefox is gone. Expected Results: Show the Downloads configuration as in previous version. Also Submitted a Talkback. Incident ID: TB95673E
247,377
2,178,626
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322) Build Identifier: My username is Björn and I'm using swedish WinXP. Version 0.6 correctly saves/reads my user data in "C:\Documents and Settings\Björn\Application Data\Thunderbird" But Version 0.7 use "C:\Documents and Settings\BJöRN\APPLICATION DATA\Thunderbird" this causes all my accounts to diapear from the program of course and when I first start the program I am promted to create a news or mail account. Reproducible: Always Steps to Reproduce: 1. 2. 3.
243,040
2,146,552
The HTML sanitizer does not properly handle the contents of attribute values. This makes it possible to trick it to show remote images despite that I configured the HTML sanitizer to ignore the src attribute of img elements. Steps to reproduce: 1. Send the testcase to yourself, e.g. by making a manual connection to an SMTP server with telnet (the HTML sanitizer appears not to work with messages opened with Thunderbird's File -> Open Saved Message) 2. Choose View -> Message body as -> Original HTML 3. Choose View -> Message body as -> Simple HTML Actual results: Some text and an image that was not visible in the Original HTML view is displayed. The image is loaded from a remote server. Expected results: The Simple HTML view should be the same as the original HTML view, except that the alt text of the <img> should be displayed instead of the image itself. The alt text should be interpreted as plain text, not HTML. This happens both when the mailnews.display.html_sanitizer.allowed_tags pref is not set, and when the value contains "img(alt,title,longdesc,width,height)" (i.e. src is omitted). I see this using Thunderbird 0.6 on both WinXP and Linux.
243,174
2,147,549
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7b) Gecko/20040421 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7b) Gecko/20040421 Go to the page http://de.selfhtml.org/ Press the link "SELFHTML Suche" At the top left the search input appears. Enter the word browser and press "Suchen" A javscript windows pops up with a ok button. After pressing ok the browser crashes. Reproducible: Always Steps to Reproduce: 1.Go to the page http://de.selfhtml.org/ and press the link "SELFHTML Suche" 2. Enter the word browser at the search input 3. after press "Suchen" a javascript window pops up 4. when pressing ok the browser crashes Actual Results: browser crash Expected Results: should show the search results instead program error: mozilla.exe has generated errors and will be closed by Windows. You will need to restart the program. An error log is being created.
243,482
2,150,355
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.7b) Gecko/20040421 Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8a) Gecko/20040512 Firefox/0.8.0+ Using [Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8a) Gecko/20040512 Firefox/0.8.0+] Try to use the Validate by File Upload field in above mentioned form. On Firefox (since 20040510 ?) the file upload filed downs't display the text (expected 'browse...' ) on the button, and clicking the button doesn't do nothing. Reproducible: Always Steps to Reproduce: 1.Go to http://validator.w3.org/ 2.try to upload file for validation, click on the button 3.nothing happens Actual Results: The button should display some text ('browse...'), clicking on the button should open a sheet to navigate to a file and allow the user to select a file on the local file system. Expected Results: display some text (label) on the button, and allow the user to upload a file
245,553
2,166,905
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7b) Gecko/20040411 Firefox/0.8.0+ (best browser EVAR1!!) Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7) Gecko/20040603 Firefox/0.8.0+ After uninstalling QuickNote (via new EM's Uninstall feature), on first restart of Firefox, the Bookmark toolbar no longer work and Firefox is almost un-responsive (ie. menus aren't clickable etc). Looking into profile directory, the QuickNote files are deleted, but references to it in chrome.rdf and overlayinfo\..\overlays.rdf are left untouched. Reproducible: Always Steps to Reproduce: 1. Install QuickNote from given URL. 2. Restart 3. Open EM, uninstall QuickNote 4. Restart Actual Results: Bookmark Toolbar is empty, menus are not clickable, references to QuickNote left in profile. Expected Results: Remove all references it created, and start up normally. Some extensions are uninstalled ok, including Pike's Show Failed URL, All-in-One gestures.
245,570
2,167,018
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.6) Gecko/20040210 Firelimace/0.8 (User Agent modifie grace a Firesomething. Telechargez Firefox/0.8 en francais sur http://frenchmozilla.org/) Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7) Gecko/20040603 Firefox/0.8.0+ In this page at http://www.topgratuit.com/bienvenue.htm, browser crash when setting a cookie if you click "Cancel" in the dialog. Reproducible: Always Steps to Reproduce: 1. Save your data 2. Go on the page http://www.topgratuit.com/ 3. Click Cancel Actual Results: Browser crash if you didn't visit this site before. Expected Results: Nothing. It crashes only the first time you go on the site. But if you clear your Cookies and reload the page, it crashes again. Crash on latest Firefox 0.9, Mozilla 1.7 rc2 and several other configurations (windows XP, 2000, ME ; not tested in Linux. You can find some discussions about this bug (in french) on the page http://www.geckozone.org/forum/viewtopic.php?t=5362). Doesn't crash with 0.8_fr + TBE
245,722
2,168,182
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; cs-CZ; rv:1.8a2) Gecko/20040524 Firefox/0.8.0+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; cs-CZ; rv:1.8a2) Gecko/20040524 Firefox/0.8.0+ AppName: firefox.exe AppVer: 0.8.0.0 ModName: ntdll.dll ModVer: 5.1.2600.1217 Offset: 00033905 This said me windows. OS: XP prof. With all SP's and updates. Visual Studio Installed. IIS running. Reproducible: Sometimes Steps to Reproduce: 1. depack install 2. run the program for the first time 3. it is. Actual Results: App crashes and exit. Expected Results: Open start up page.
245,742
2,168,306
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X; en-us) AppleWebKit/125.2 (KHTML, like Gecko) Safari/125.7 Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.7) Gecko/20040606 (CVS MOZILLA_1_7_BRANCH and on 1.7 RC2) When I successfully authenticate against my work's NTLM-authenticating Outlook Web Access on Microsoft Exchange 5.5 on IIS 3 (which is why I'm reluctant to give the URL), Mozilla crashes when I proceed further with navigation and at non-repeatable points in the code (using gdb). To the user, this is just a crash, and I had submitted a TalkBack through TalkBack a week or so ago. Using gdb, it looks like the most common crash is "Program received signal EXC_BAD_ACCESS, Could not access memory.," though "Program received signal SIGABRT, Aborted." comes up sometimes, too. I'm currently trying to debug this, but I though I'd at least put this bug here in case if y'all were planning on releasing Mozilla 1.7 soon. I would really like to have this bug fixed first, and please let me know if you're working on this one, too (I'll post more details as I find out more about this bug). I'm going to try to recompile with ElectricFence and see what might be writing out of bounds.. Thinking that the bug might be in mozilla/security/manager/ssl/src/nsNTLMAuthModule.cpp, I pulled down revision 1.6, which was used in Mozilla 1.6 (NTLM on the same site works properly in 1.6), and re-made mozilla/security/manager/ssl. Unfortunately, the crash still occurs, so the bug might be elsewhere. Reproducible: Always Steps to Reproduce: 1. Log in to a web site using NTLM 2. Navigate to another page Actual Results: At the 9km view, Mozilla crashes. Inside of gdb, the crash seems to occur on non-repeatable code segments, potentially indicating memory corruption in the NTLM authentication process somewhere. Expected Results: Quite simply, Mozilla should navigate to the requested page and not crash ;-). Talkback crash ID: TB52990Z Mac OS X Panther 10.3.3 and 10.3.4 PowerPC G4 450MHz (one CPU), 1GB RAM about:buildconfig Build platform target powerpc-apple-darwin7.4.0 Build tools Compiler Version Compiler flags gcc gcc version 3.3 20030304 (Apple Computer, Inc. build 1495) -Wall -W -Wno-unused -Wpointer-arith -Wcast-align -Wno-long-long -fpascal-strings -no-cpp- precomp -fno-common -I/Developer/Headers/FlatCarbon -pipe c++ gcc version 3.3 20030304 (Apple Computer, Inc. build 1495) -fno-rtti -fno-exceptions -Wall -Wconversion -Wpointer-arith -Wcast-align -Woverloaded-virtual -Wsynth -Wno-ctor-dtor-privacy -Wno-non-virtual-dtor -Wno-long-long -fpascal-strings -no-cpp- precomp -fno-common -fshort-wchar -I/Developer/Headers/FlatCarbon -pipe -I/usr/X11R6/include Configure arguments --enable-macos-target=10.3 --enable-official-branding --with-nss --disable-tests --enable- optimize --enable-crypto
246,012
2,170,360
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7) Gecko/20040608 Firefox/0.8.0+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7) Gecko/20040608 Firefox/0.8.0+ When using *[src*="?ad"] { display: none !important } to hide ads in userContent.css firefox and mozilla suite ( FF 0.9rc and Mozilla Suite 1.7rc3) crash when an iframe is present containing : <iframe src="?ad=1"></iframe> Reproducible: Always Steps to Reproduce: 1. Add stylesheet rule to userContent.css 2. load page with iframe 3. press f6 Actual Results: The browser crashed. I've entered a report in the talkback agent (id TB81055W) and made a testcase. Both mozilla suite en firefox were tested with a clean profile.