Bug ID
int64 961
1.91M
| Comment ID
int64 3.98k
17.1M
| Author
stringlengths 8
48
| Comment Text
stringlengths 1
64.3k
⌀ |
---|---|---|---|
493,177 | 4,099,875 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b5pre) Gecko/20090514 Firefox/3.5.0 (.NET CLR 3.5.30729)
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b5pre) Gecko/20090514 Firefox/3.5.0 (.NET CLR 3.5.30729)
When loading certain page, the browser is crashing.
Reproducible: Always
Steps to Reproduce:
1.Start Minefield.Shiretoko with new profile
2.Go URL
3.
Actual Results:
The browser is crashing. with crash report.
Expected Results:
No crash.
Regression range in Minefield(1.9.2):
Works fine:
http://hg.mozilla.org/mozilla-central/rev/68cfe7fb9f31
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2a1pre) Gecko/20090413 Minefield/3.6a1pre (.NET CLR 3.5.30729)
Broken:
http://hg.mozilla.org/mozilla-central/rev/68d9acc70491
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2a1pre) Gecko/20090414 Minefield/3.6a1pre (.NET CLR 3.5.30729)
Pushlog:
http://hg.mozilla.org/mozilla-central/p ... d9acc70491
Crash report:
Firefox 3.6a1pre Crash Report [@ js_Interpret ]
http://crash-stats.mozilla.com/report/i ... 090515?p=1
Regression range in Shiretoko(1.9.1):
Works fine:
http://hg.mozilla.org/releases/mozilla- ... 39d6b3b56d
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b4pre) Gecko/20090418 Shiretoko/3.5b4pre
Broken:
http://hg.mozilla.org/releases/mozilla- ... a5ebd9a59c
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b4pre) Gecko/20090419 Shiretoko/3.5b4pre
Pushlog:
http://hg.mozilla.org/releases/mozilla- ... a5ebd9a59c
Crash report:
Firefox 3.5b4pre Crash Report [@ js_Interpret ]
http://crash-stats.mozilla.com/report/i ... 090514?p=1
There is no check-in which overlaps between 1.9.1 and 1.9.2.
But Crash Report [@ js_Interpret ] is same.
And reported in http://forums.mozillazine.org/viewtopic.php?p=6487075#p6487075 , http://forums.mozillazine.org/viewtopic.php?p=6487095#p6487095
The browser is crashing on Windows Vista SP1 and Windows 7RC also.
|
|
493,281 | 4,100,721 |
Steps to reproduce:
-> Load http://www.tuning.fr/compts/compteurs.php?compts_id=1670&scrw=1680
--> Crashs 1.9.1 opt/debug builds Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b5pre) Gecko/20090515 Shiretoko/3.5b5pre and trunk
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2a1pre) Gecko/20090515 Minefield/3.6a1pre
(fa8.18c): Access violation - code c0000005 (!!! second chance !!!)
eax=3ecb3f57 ebx=7ffdf000 ecx=0012ea4c edx=06389f15 esi=00d0b4e8 edi=00150000
eip=06389f39 esp=0012d934 ebp=0012d950 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
06389f39 3b00 cmp eax,dword ptr [eax] ds:0023:3ecb3f57=????????
The stack trace contains one or more locations for which no symbol or module could be found. This may be a sign of stack corruption.
ChildEBP RetAddr
WARNING: Frame IP not in any known module. Following frames may be wrong.
0012d930 0028b31d 0x6389f39
0012d950 02c6dc49 xpcom_core!nsQueryInterface::operator()+0x2d
0284f81c 6c6c697a gklayout!nsCOMPtr<nsIDOMHTMLDocument>::assign_from_qi+0x19
0284f81c 00000000 0x6c6c697a
quit:
|
|
499,169 | 4,158,869 |
The current topcrash in Firefox 3.5b99 and Firefox 3.5 (all RCs) happens with a signature of js_MonitorLoopEdge(JSContext*, unsigned int&). On trunk, it appears further down in the topcrash list and, currently, doesn't have any crashes on Windows.
It seems to happen across platforms on 1.9.1, however, and the top two frames all appear to be random hex numbers.
Query for Firefox 3.5 (RC) crashes: http://crash-stats.mozilla.com/report/list?product=Firefox&version=Firefox%3A3.5&query_search=signature&query_type=exact&query=&date=&range_value=1&range_unit=weeks&do_query=1&signature=js_MonitorLoopEdge%28JSContext*%2C%20unsigned%20int%26%29
Typically, the crash happens with the following stack, taken from bp-3d4e216c-f4bf-4444-b663-1e82d2090617:
Frame Module Signature [Expand] Source
0 @0x4122c24
1 @0x12ecbb
2 js3250.dll js_MonitorLoopEdge js/src/jstracer.cpp:4862
3 js3250.dll js_Interpret js/src/jsinterp.cpp:3308
However, sometimes it appears with the following stack, taken from bp-b786c839-de39-4468-925b-065b72090618:
Frame Module Signature [Expand] Source
0 @0x162d0c0c
1 @0xbfffc5f7
2 libmozjs.dylib js_MonitorLoopEdge js/src/jstracer.cpp:4862
3 libmozjs.dylib js_Interpret js/src/jsinterp.cpp:3308
4 libmozjs.dylib js_Invoke js/src/jsinterp.cpp:1394
5 libmozjs.dylib js_fun_apply js/src/jsfun.cpp:2074
6 libmozjs.dylib js_Interpret js/src/jsinterp.cpp:5147
7 libmozjs.dylib js_Invoke js/src/jsinterp.cpp:1394
8 libmozjs.dylib js_fun_apply js/src/jsfun.cpp:2074
9 libmozjs.dylib js_Interpret js/src/jsinterp.cpp:5147
10 libmozjs.dylib js_Invoke js/src/jsinterp.cpp:1394
11 libmozjs.dylib js_fun_apply js/src/jsfun.cpp:2074
12 libmozjs.dylib js_Interpret js/src/jsinterp.cpp:5147
13 libmozjs.dylib js_Invoke js/src/jsinterp.cpp:1394
14 libmozjs.dylib js_fun_apply js/src/jsfun.cpp:2074
15 libmozjs.dylib js_Interpret js/src/jsinterp.cpp:5147
16 libmozjs.dylib js_Invoke js/src/jsinterp.cpp:1394
17 libmozjs.dylib js_fun_apply js/src/jsfun.cpp:2074
18 libmozjs.dylib js_Interpret js/src/jsinterp.cpp:5147
19 libmozjs.dylib js_Execute js/src/jsinterp.cpp:1622
20 libmozjs.dylib JS_EvaluateUCScriptForPrincipals js/src/jsapi.cpp:5145
21 XUL nsJSContext::EvaluateString dom/src/base/nsJSEnvironment.cpp:1631
22 XUL nsScriptLoader::EvaluateScript content/base/src/nsScriptLoader.cpp:686
23 XUL nsScriptLoader::ProcessRequest content/base/src/nsScriptLoader.cpp:600
24 XUL nsScriptLoader::ProcessPendingRequests content/base/src/nsScriptLoader.cpp:740
25 XUL nsRunnableMethod<nsScriptLoader>::Run nsThreadUtils.h:264
26 XUL nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:510
27 XUL NS_ProcessNextEvent_P nsThreadUtils.cpp:227
28 XUL nsThread::Shutdown xpcom/threads/nsThread.cpp:465
29 XUL NS_InvokeByIndex_P xpcom/reflect/xptcall/src/md/unix/xptcinvoke_unixish_x86.cpp:179
30 XUL nsProxyObjectCallInfo::Run xpcom/proxy/src/nsProxyEvent.cpp:181
31 XUL nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:510
32 XUL NS_ProcessPendingEvents_P nsThreadUtils.cpp:180
33 XUL nsBaseAppShell::NativeEventCallback widget/src/xpwidgets/nsBaseAppShell.cpp:121
34 XUL nsAppShell::ProcessGeckoEvents widget/src/cocoa/nsAppShell.mm:405
35 CoreFoundation CFRunLoopRunSpecific
36 CoreFoundation CFRunLoopRunInMode
37 HIToolbox RunCurrentEventLoopInMode
38 HIToolbox ReceiveNextEventCommon
39 HIToolbox BlockUntilNextEventMatchingListInMode
40 AppKit _DPSNextEvent
41 AppKit -[NSApplication nextEventMatchingMask:untilDate:inMode:dequeue:]
42 AppKit -[NSApplication run]
43 XUL nsAppShell::Run widget/src/cocoa/nsAppShell.mm:720
44 XUL nsAppStartup::Run toolkit/components/startup/src/nsAppStartup.cpp:193
45 XUL XRE_main toolkit/xre/nsAppRunner.cpp:3298
46 firefox-bin main browser/app/nsBrowserApp.cpp:156
47 firefox-bin firefox-bin@0x1541
48 firefox-bin firefox-bin@0x1468
49 @0x1
Filing as security-sensitive for now just to be safe.
|
|
501,605 | 4,177,638 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.9.1) Gecko/20090624 Firefox/3.5
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.9.1) Gecko/20090624 Firefox/3.5
I have tried firefox 3.5 final version today. It starts up very very slow(almost morethen two minutes). I have a very powerfull machine at work (Q6600 with 4 GB Ram). HEre is what i have done to resolve the issues
- Cleared all the cache (also from ie just in case as i read somewhere that ie cache can also have an impact on startup)
- disable update check for all three things
- Tried to compact the data base by Vacuum command
and finally when things didnt go well I removed the profile fodler from Documents and settings (removed mozilla folder)
Even after doing all the things above i still have a very slow startup of firefox for the first time(after reboot), subsequent startups are fine (3-4)secs. I have also been experimenting with earlier releases beta 2,3,4 rc1 the problem started after beta 4 as far as i can remember.
Reproducible: Always
Steps to Reproduce:
1. Stat firefox after reboot
2.
3.
Actual Results:
starts up in 2 mins
Expected Results:
should start up in under 10 secs
I also tried clean install with no plugins/extensins that didnt help either.
|
|
502,148 | 4,181,705 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.10) Gecko/2009042316 Firefox/3.0.10
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.10) Gecko/2009042316 Firefox/3.0.10
<html>
<script>
var buf ="AAAAAAAAAAAAAAAAAAAAA";
buf +=buf;
buf +=buf;
buf +=buf;
buf +=buf;
buf +=buf;
buf +=buf;
buf +=buf;
buf +=buf;
buf +=buf;
buf +=buf;
buf +=buf;
buf +=buf;
buf +=buf;
buf +=buf;
buf +=buf;
buf +=buf;
buf +=buf;
buf +=buf;
buf +=buf;
buf +=buf;
buf +=buf;
var sec ="AAAAAAAAAAAAAAAAAAAAA";
sec+=sec;
sec+=sec;
sec+=sec;
sec+=sec;
sec+=sec;
sec+=sec;
sec+=sec;
sec+=sec;
sec+=sec;
sec+=sec;
sec+=sec;
sec+=sec;
sec+=sec;
sec+=sec;
sec+=sec;
sec+=sec;
sec+=sec;
sec+=sec;
sec+=sec;
sec+=sec;
var third="AAAAAAAAAAAAAAAAAAAAA";
third+=third;
third+=third;
third+=third;
third+=third;
third+=third;
third+=third;
third+=third;
third+=third;
third+=third;
third+=third;
third+=third;
third+=third;
third+=third;
third+=third;
var four ="AAAAAAAAAAAAAAAAAAAAA";
four+= four;
four+= four;
four+= four;
four+= four;
four+= four;
four+= four;
four+= four;
four+= four;
four+= four;
four+= four;
four+= four;
four+= four;
four+= four;
var five ="AAAAAAAAAAAAAAAAAAAAA";
five+=five;
five+=five;
five+=five;
five+=five;
five+=five;
five+=five;
five+=five;
five+=five;
var six ="AAAAAAAAAAAAAAAAAAAAA";
six+=six;
six+=six;
six+=six;
six+=six;
six+=six;
six+=six;
six+=six;
var seven ="AAAAAAAAAAAAAAAAAAAAA";
seven+=seven;
seven+=seven;
var nine ="AAAAAAAAAAAAAAAAAAAAA";
nine += nine;
document.write(buf+sec+third+four+five+six+seven+nine+"AAAAA");
</script>
</html>
you can control ecx and edx with the vaules above "A"
Reproducible: Sometimes
Steps to Reproduce:
1.produce a buffer of size 21,to the power of 23
2. use document.write(buf)
3.values of buf change eip address, possable dos looking for address fa******, with value "a"
Actual Results:
it displayed a error saying firefox is going to close
Expected Results:
free the buf like what it would do if you enter alot more "A", which doesn't crash
mozcrt19_free and xull.dll 6052065b
|
|
498,619 | 4,154,117 |
Steps to reproduce:
1. Open two or three pages
2. Open some page in new window and close it
3. Point History -> Recently Closed Windows
4. Move mouse upward on History menu
Actual result:
Page list on History menu is disappeared.
Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2a1pre) Gecko/20090616 Minefield/3.6a1pre
|
|
507,292 | 4,223,252 |
BuildID=20090727101705
Steps to reproduce: Load http://www.warcraftlatino.com/ulduar/rank.html
(c20.bb4): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=04859130 ebx=7ffdf000 ecx=072a0410 edx=c0000005 esi=0000000f edi=00c8f6f0
eip=00519bd4 esp=0012e718 ebp=0012ee44 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010206
js3250!js_Interpret+0x103b4:
00519bd4 8b02 mov eax,dword ptr [edx] ds:0023:c0000005=????????
0:000> !exploitable -v
HostMachine\HostUser
Executing Processor Architecture is x86
Debuggee is in User Mode
Debuggee is a live user mode debugging session on the local machine
Event Type: Exception
Exception Faulting Address: 0xffffffffc0000005
First Chance Exception Type: STATUS_ACCESS_VIOLATION (0xC0000005)
Exception Sub-Type: Read Access Violation
Faulting Instruction:00519bd4 mov eax,dword ptr [edx]
Basic Block:
00519bd4 mov eax,dword ptr [edx]
Tainted Input Operands: edx
00519bd6 mov ecx,dword ptr [eax+0ch]
Tainted Input Operands: eax
00519bd9 call ecx
Tainted Input Operands: ecx, edx
Exception Hash (Major/Minor): 0x2a690d26.0x1548251d
Stack Trace:
js3250!js_Interpret+0x103b4
js3250!js_Execute+0x2e6
js3250!JS_EvaluateUCScriptForPrincipals+0xe7
gklayout!nsJSContext::EvaluateString+0x2c0
gklayout!nsScriptLoader::EvaluateScript+0x37a
gklayout!nsScriptLoader::ProcessRequest+0xfd
gklayout!nsScriptLoader::ProcessScriptElement+0x1040
gklayout!nsScriptElement::MaybeProcessScript+0x149
gklayout!nsHTMLScriptElement::MaybeProcessScript+0x24
gklayout!nsHTMLScriptElement::DoneAddingChildren+0x1f
gklayout!HTMLContentSink::ProcessSCRIPTEndTag+0xcf
gklayout!SinkContext::CloseContainer+0x31d
gklayout!HTMLContentSink::CloseContainer+0xa0
gkparser!CNavDTD::CloseContainer+0x18a
gkparser!CNavDTD::HandleEndToken+0x214
gkparser!CNavDTD::HandleToken+0x4ae
gkparser!CNavDTD::BuildModel+0x298
gkparser!nsParser::BuildModel+0xe2
gkparser!nsParser::ResumeParse+0x1bc
gkparser!nsParser::ContinueInterruptedParsing+0xe5
gklayout!nsContentSink::ContinueInterruptedParsingIfEnabled+0x54
gklayout!nsRunnableMethod<nsContentSink>::Run+0x24
xpcom_core!nsThread::ProcessNextEvent+0x1fa
xpcom_core!NS_ProcessNextEvent_P+0x53
gkwidget!nsBaseAppShell::Run+0x5d
tkitcmps!nsAppStartup::Run+0x6b
xul!XRE_main+0x3000
firefox!NS_internal_main+0x2b2
firefox!wmain+0x119
firefox!__tmainCRTStartup+0x1a6
firefox!wmainCRTStartup+0xd
kernel32!BaseProcessStart+0x23
Instruction Address: 0x0000000000519bd4
Description: Data from Faulting Address controls Code Flow
Short Description: TaintedDataControlsCodeFlow
Exploitability Classification: PROBABLY_EXPLOITABLE
Recommended Bug Title: Probably Exploitable - Data from Faulting Address controls Code Flow starting at js3250!js_Interpret+0x00000000000103b4 (Hash=0x2a690d26.0x1548251d)
The data from the faulting address is later used as the target for a branch.
|
|
507,389 | 4,224,103 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.1.1) Gecko/20090718 Shiretoko/3.5.1
Build Identifier: bugzilla-3.4
User can see all products even he has no access to them.
Reproducible: Always
Steps to Reproduce:
1. create 2 products: prod1 and prod2
2. restrict user1 access only to prod1
3. try to edit own bug and see all products in combobox
Actual Results:
user can see full product list
Expected Results:
user can see allowed product list
product list page works ok.
problem affects only combo and listboxes on new chart and editbug pages
|
|
511,752 | 4,258,500 |
STEPS TO REPRODUCE:
0. (Probably best to start with a fresh profile)
1. Add a master password to your profile, if you don't already have one.
2. Install Weave "experimental version", linked on http://labs.mozilla.com/weave/
3. Click "New Account" on Weave's firstrun page
4. Fill out the form with information for a new account
5. Click "Next"
6. Cancel the master password dialog that appears (presumably because Weave wants to save my new password/passphrase)
7. Sign out of Weave (via Firefox's tray)
ACTUAL RESULTS:
Weave returns to the login page, but the **password and passphrase are displayed in cleartext!!!**
EXPECTED RESULTS:
Weave shouldn't display my password / passphrase in cleartext.
NOTE: From here, I can repeat steps 5-7 (sign in/out) and reproduce this bug over and over. If I actually enter my master password in one of these trials, the password/passphrase will be hidden with bullets from that point forward. (desired behavior) But until then, they're printed as plain text.
|
|
478,299 | 3,971,736 |
Seen while running Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.1b3pre) Gecko/20090212 Shiretoko/3.1b3pre.
STR:
1. Visit http://tinyvid.tv/show/22axtzbrwetr4 and while the video is still loading, hit the pause button.
2. I crash, 100% reproducible. I also crash trying the same steps on other videos on that same page.
Machine is 32 bit Windows Vista Ultimate with SP 1, 4 GB RAM.
|
|
479,143 | 3,979,737 |
Created attachment 362996
Apple crash report
Seen while running Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090218 Firefox.
STR:
1. I had ~50 tabs open. I left my machine for a moment and came back and had this crash.
Breakpad: http://crash-stats.mozilla.com/report/index/7ec9b82d-a667-4c3a-9a43-688cd2090218
stephend has also seen this crash a number of times today.
I also got a an Apple crash report, which has some different info than breakpad so I will attach it for reference.
|
|
479,198 | 3,980,453 |
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_6; en-us) AppleWebKit/525.27.1 (KHTML, like Gecko) Version/3.2.1 Safari/525.27.1
Build Identifier: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b2) Gecko/20081201 Firefox/3.1b3pre
It appears that under some circumstances JavaScript memory may not be properly synchronized so that seemingly impossible conditions occur. This is causing TIBCO General Interface Builder 3.7 to fail to load.
I've spent a lot of time debugging and the issue seems exceedingly complicated. Whether the bug shows up or not seems to be related to whether and how many logging statements are sent to a separate browser window and the number of sync and async XHR requests. The only consistent way to prevent the bug is to turn off jit.client in about:config.
I'm attaching both the 3.7 GA release and a version of Model.js that I have used to debug this issue. In the modified file the "impossible" condition is shown on lines 455-458.
var try1 = this.getServer();
jsx3.log("Hello world!");
var try2 = this.getServer();
jsx3.log(try1 + " " + try2);
"try1" logs null while "try2" logs the server object. However, the implementation of getServer() clearly does nothing to affect the state of memory (line 563):
Model_prototype.getServer = function() {
var node = this;
while (node) {
if (node._jsxserver) return node._jsxserver;
node = node._jsxparent;
}
return null;
};
The call to jsx3.log() modifies some parts of memory and may call browser DOM methods but it certainly does not modify anything that might affect the getServer() method.
Reproducible: Always
Steps to Reproduce:
1. Unzip attachment
2. Launch GI_Builder.html in Firefox 3.1+ with jit.client enabled
3. Click through security warnings (suggest selecting "remember")
Actual Results:
Start-up fails. Error console shows "objServer is null" or "x.getServer() is null" usually in Model.js.
Or, replace JSX/js/jsx3/app/Model.js with the attached file and then launch GI_Builder. In this case a long red stack track shows up in the Application Monitor external window. Just above it you can see the logging messages corresponding to Model.js lines 455-458:
23:17:15.526 global (INFO) - Hello world!
23:17:15.527 global (INFO) - null @jsx3.app.Server GI_Builder:jsx3.IDE
Expected Results:
Start-up completes with no such errors. This is the case in Firefox 3.0 or 3.1 with jit.client disabled.
Testing on a dual-core mac book and able to reproduce in XP running in Fusion with two cores enabled.
|
|
473,552 | 3,929,789 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.1b2) Gecko/20090113 Gentoo Firefox/3.1b2
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.1b2) Gecko/20090113 Gentoo Firefox/3.1b2
Firefox 3.1b2 terminates with SIGILL on loading any page containing JavaScript. The illegal instruction, according to gdb, is nopl. My processor, VIA C3-2 Nehemiah, is among those that do not support nopl even though they probably should, being 686s.
Related discussion for binutils: http://sourceware.org/bugzilla/show_bug.cgi?id=6957
("There is also another related issue with i686 class CPUs. Some do not actually
support the NOPL instruction. Examples include Via C3, Via Eden, AMD Geode LX
(as used in OLPC), Transmeta Crusoe and it appears broken on Virtual PC.")
Also: http://kerneltrap.org/mailarchive/linux-kernel/2008/9/16/3313464
Reproducible: Always
Steps to Reproduce:
1. On e.g. a VIA C3-2 Nehemiah system, start Firefox 3.1b2 with javascript.options.jit.content enabled.
2. Visit a site containing JavaScript (reddit.com will do).
Actual Results:
Program received signal SIGILL, Illegal instruction.
[Switching to Thread 0xb6333710 (LWP 27571)]
0xb5d70eb0 in ?? ()
(gdb) disas 0xb5d70eb0 0xb5d70eb1
Dump of assembler code from 0xb5d70eb0 to 0xb5d70eb1:
0xb5d70eb0: nopl (%eax)
End of assembler dump.
(gdb) bt
#0 0xb5d70eb0 in ?? ()
#1 0xb7047acc in js_ExecuteTree () from /usr/lib/xulrunner-1.9/libmozjs.so
#2 0xb70526e9 in js_MonitorLoopEdge () from /usr/lib/xulrunner-1.9/libmozjs.so
#3 0xb6ff8532 in js_Interpret () from /usr/lib/xulrunner-1.9/libmozjs.so
#4 0xb6ffaa4a in js_Execute () from /usr/lib/xulrunner-1.9/libmozjs.so
#5 0xb6fbf1f3 in JS_EvaluateUCScriptForPrincipals () from /usr/lib/xulrunner-1.9/libmozjs.so
#6 0xb790b0af in nsJSContext::EvaluateString () from /usr/lib/xulrunner-1.9/libxul.so
[...]
Workaround: Disable javascript.options.jit.* by editing prefs.js (Firefox will crash before you can go to about:config).
|
|
475,396 | 3,946,172 |
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090126 Shiretoko/3.1b3pre
Build Identifier: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090126 Shiretoko/3.1b3pre
http://crash-stats.mozilla.com/report/index/7f217050-1d75-4671-9cea-6899c2090126
Reproducible: Always
Steps to Reproduce:
1. go to http://www.opodo.fr/
2. fill the form departure by for exemple montreal
3. fill the form departure by for exemple los angeles
4. try to select the date by the javascript script
5. when the popup open double click on a date
Actual Results:
crash
could be a duplicate bug of https://bugzilla.mozilla.org/show_bug.cgi?id=462091
|
|
475,916 | 3,951,068 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.9.2a1pre) Gecko/20090128 Minefield/3.2a1pre
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.9.2a1pre) Gecko/20090128 Minefield/3.2a1pre
After clicking on the search box of http://www.facebook.com at upper right hand corner, firefox will crash.
Crash even with new profile with no plugin, but it will not crash in Safe Mode.
Reproducible: Always
Steps to Reproduce:
1.browse to http://www.facebook.com and logon
2.click on the search box on the upper right hand corner
3.crash without typing anything
Actual Results:
crashed
Expected Results:
allow to type the search string
start appear in hourly build 20090128 (I am using 20090128190032)
|
|
476,292 | 3,954,619 |
https://crash-stats.mozilla.com reports 124 of these over the last 96 hours (98 on Mac and 26 on Linux). This is equivalent to 784 crashes over two weeks, and probably makes this a topcrasher. (I can't get crash-stats to report over a longer period than 96 hours.)
http://crash-stats.mozilla.com/?do_query=1&product=Firefox&query_search=stack&query_type=exact&query=nsNavBookmarks%3A%3AIsRealBookmark(long%20long)&date=&range_value=96&range_unit=hours
I just saw a couple of these myself (with yesterday's Shiretoko nightly, on two different Macs, on startup). Here are my Breakpad IDs:
bp-c9a68bb9-cb71-4af5-840a-ff1db2090131
bp-924b3999-f091-4c70-9e1b-8403a2090130
|
|
484,035 | 4,022,156 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b3) Gecko/20090305 Firefox/3.1b3
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2a1pre) Gecko/20090318 Minefield/3.6a1pre
In Firefox 3.0.7 and earlier betas of Firefox 3.1, the browser would detect an infinite loop scenario and put up an "Unresponsive Script" alert asking the user if the script should be stopped.
In Firefox 3.1b3 and the latest 3.6 nightlies this does not occur. An infinite loop on a browser page will permanently hang Firefox.
Reproducible: Always
Steps to Reproduce:
1. Type "javascript:while(1){}" into the location bar
Actual Results:
Browser hangs and never recovers.
Expected Results:
After a short while the "Unresponsive Script" dialog should display as it does in Firefox 3.0.7.
The browser hangs in a new profile, with no extensions or plugins installed (scanning for plugins disabled such that none display in the Add-ons window or about:plugins)
Strangely though, if I run in "-safe-mode" it does display the "Unresponsive Script" dialog.
I'm not sure what difference there is between a new profile with no extensions or plug-ins and "-safe-mode".
|
|
487,215 | 4,049,275 |
Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2a1pre) Gecko/20090407 Minefield/3.6a1pre
Steps to reproduce:
1. Open the URL.
Actual result:
Crashes.
BuildID=20090406035346 SourceStamp=b14428284d51 works fine
BuildID=20090407030745 SourceStamp=f0507c4d0abb fails
Crash Report:
http://crash-stats.mozilla.com/report/index/84fe518c-c2c1-4a6b-9168-18c422090407
|
|
471,101 | 3,907,953 |
[@ nsMenuItemIconX::OnStopRequest] is currently the #1 topcrash on trunk.
I think I'm hitting this on more than 1 in 1000 startups.
|
|
471,307 | 3,909,693 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9) Gecko/2008052906 Firefox/3.0
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b3pre) Gecko/20081227 Lightning/1.0pre
Folder index files are being corrupted when right-clicking a folder and doing "Properties... --> General Information --> Rebuild Index". The messages are still listed, but their content is no longer viewable. Once this occurs, the only solution is to shutdown Shredder and manually delete the associated .msf file.
Regression Range:
Works: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b3pre) Gecko/20081219 Shredder/3.0b2pre
Broken: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b3pre) Gecko/20081220 Shredder/3.0b2pre
Reproducible: Always
Steps to Reproduce:
1. Right-click a folder (containing messages) and select "Properties... --> General Information --> Rebuild Index"
2. Click a different folder then reselect the folder in Step #1 and attempt to view any of the messages. Notice that no message content can be displayed.
3. Shutdown Shredder and delete the corresponding .msf file for the folder
4. Start Shredder and notice that you can now view the message content.
|
|
471,540 | 3,911,936 |
Steps to reproduce:
1. Load http://webapp1.latimes.com/homicide/homicideReport.php
2. Wait one second.
Result:
Assertion failure: cp >= buf, at /Users/jruderman/tracemonkey/js/src/jsnum.cpp:343
|
|
473,120 | 3,926,247 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-NZ; rv:1.9.1b2) Gecko/20081201 Firefox/3.1b2
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-NZ; rv:1.9.1b2) Gecko/20081201 Firefox/3.1b2
Hitting the Escape key while editing the bookmark properties will save any changes.
Reproducible: Always
Steps to Reproduce:
1.Edit a bookmark from right clicking on bookmark toolbar or bookmarks menu entry.
2.Change some text (name or URL).
3.Hit ESC
Actual Results:
Changes to bookmark properties are saved.
Expected Results:
Changes should be ignored.
Tested in safe mode (addons/themes disabled).
|
|
467,747 | 3,878,872 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686 (x86_64); en-US; rv:1.9.1b3pre) Gecko/20081203 Shiretoko/3.1b3pre
Build Identifier: Mozilla/5.0 (X11; U; Linux i686 (x86_64); en-US; rv:1.9.1b3pre) Gecko/20081203 Shiretoko/3.1b3pre
Sometimes, the add-on manager shows no add-ons and searching doesn't work. The add-ons are still present and running because they have their various icons in the status bar.
Reproducible: Sometimes
Steps to Reproduce:
1. Start Firefox
2. Go to Tools->Add-ons
Actual Results:
The window that opens doesn't show add-ons. It also has two extra icons across the top (languages and updates).
Expected Results:
Normal add-ons Window with list of add-ons under extensions.
These two messages appear in the error console:
Error: missing ; before statement
Source File: file:///usr/local/firefox/modules/PluralForm.jsm
Line: 70
Source Code:
let gFunctions = [
Error: uncaught exception: [Exception... "Component returned failure code: 0x80004003 (NS_ERROR_INVALID_POINTER) [nsIPrefBranch2.addObserver]" nsresult: "0x80004003 (NS_ERROR_INVALID_POINTER)" location: "JS frame :: chrome://mozapps/content/extensions/extensions.js :: Startup :: line 989" data: no]
|
|
468,279 | 3,883,744 |
(Using a debug trunk tip build of NSS)
If a program upgrades a cert8 to cert9, and then imports a cert, softoken
imports the cert into the cert8 DB, and then crashes in a VERY confused state.
After debugging this most of the day, I've concluded that after an upgrade,
softoken is really confused about whether it's using cert8 or cert9.
This MUST be fixed for Sun's 3.12 release.
Steps to reproduce:
mkdir -p DB
# create new empty cert8 DB
certutil -N -d DB
# upgrade it to cert9 and import email cert
certutil -E -d sql:DB -n email@address -i email-cert.der -t ',,p'
Expected result:
email cert successfully imported into cert9.db. cert8.db still empty.
Actual result:
cert is imported into cert8.db, then softoken crashes on an assertion.
I did this test using the cert attached to bug 185167. The actual command
I used was:
certutil -E -d sql:DB -n [email protected] -i /tmp/185167b.der -t ',,p'
Here is some info from debugging.
Things get really interesting at the point in the NSC_CreateObject where it
tries to "handle" the token object, writing it to the DB. The stack at that
point is:
softokn3.dll!sftkdb_write() Line 1106
softokn3.dll!sftk_handleCertObject() Line 701 + 0x14 bytes
softokn3.dll!sftk_handleObject() Line 1472 + 0xd bytes
softokn3.dll!NSC_CreateObject() Line 3681 + 0xd bytes
nss3.dll!import_object() Line 250 + 0x1b bytes
nss3.dll!nssToken_ImportCertificate() Line 579 + 0x18 bytes
nss3.dll!PK11_ImportCert() Line 907 + 0x3a bytes
certutil.exe!AddCert() Line 189 + 0x15 bytes
certutil.exe!certutil_main() Line 2803 + 0x3d bytes
certutil.exe!main() Line 2934 + 0xf bytes
When sftkdb_write calls db->sdb_Begin,
crv = (*db->sdb_Begin)(db);
the function it actually calls is lg_Begin.
When sftkdb_write calls sftkdb_lookupObject
/* Find any copies that match this particular object */
crv = sftkdb_lookupObject(db, object->objclass, &id, template, count);
that function finds the SMIME object (!?) as if it is already in the DB.
So, sftkdb_write calls:
/* object already exists, modify it's attributes */
*objectID = id;
crv = sftkdb_setAttributeValue(arena, handle, db, id, template, count);
which eventually calls into lg_SetSingleAttribute. The stack looks like:
lg_SetSingleAttribute() Line 1729
lg_SetAttributeValue() Line 1786 + 0x17 bytes
sftkdb_setAttributeValue() Line 1070 + 0x18 bytes
sftkdb_write() Line 1148 + 0x1d bytes
lg_SetSingleAttribute handles some classes of objects, but not SMIME objects.
For unhandled object classes, it returns CKR_ATTRIBUTE_READ_ONLY, and that's
just what it does for this SMIME object.
So, back in sftkdb_write, it goes to loser, bypassing the call to
crv = (*db->sdb_Commit)(db);
At loser, it calls:
loser:
if (inTransaction) {
(*handle->db->sdb_Abort)(handle->db);
This is a call to sdb_Abort (not to lg_Abort). Perhaps this is because
it calls handle->db->sdb_Abort instead of calling db->sdb_Abort.
sdb_Abort calls sdb_complete, which crashes on this assertion:
/* We must have a transation database, or we shouldn't have arrived here */
PR_EnterMonitor(sdb_p->dbMon);
-> PORT_Assert(sdb_p->sqlXactDB);
Now, it's bad enough that sftkdb_write is confused about whether it's using
the legacy DB or the new one, and it would be an improvement just to make
it be consistent. But it really should not be using the legacy DB at all
after NSS_Initialize completes the upgrade. Yet it does.
Other discoveries:
PK11_SaveSMimeProfile adds 1 to the length of the string it passes for
the CKA_NETSCAPE_EMAIL attribute, apparently to include the trailing NUL
character (?!). But the stored email address does not have a trailing NUL
character, so the string being stored always mismatches the string already
stored because their lengths differ by 1. I think the "+1" in this line
PK11_SETATTRS(attrs, CKA_NETSCAPE_EMAIL,
emailAddr, PORT_Strlen(emailAddr)+1); attrs++;
of PK11_SaveSMimeProfile is wrong.
Finally, I found one other major error in lg_mkHandle. Here is patch for it;
/* there is only one KRL, use a fixed handle for it */
- if (handle != LG_TOKEN_KRL_HANDLE) {
+ if (handle == LG_TOKEN_KRL_HANDLE) {
lg_XORHash(hashBuf,dbKey->data,dbKey->len);
handle = (hashBuf[0] << 24) | (hashBuf[1] << 16) |
(hashBuf[2] << 8) | hashBuf[3];
handle = class | (handle & ~(LG_TOKEN_TYPE_MASK|LG_TOKEN_MASK));
|
|
468,393 | 3,884,707 |
BUILD: Current trunk build
STEPS TO REPRODUCE:
1) Load https://bugzilla.mozilla.org/attachment.cgi?id=351645
2) Hit Command-S before the alert comes up and start typing a filename
3) When the alert comes up dismiss it
4) Finish typing the filename
5) Hit "OK" in the filepicker
ACTUAL RESULTS: Crash with this stack: http://crash-stats.mozilla.com/report/index/ae98fc08-603c-4d92-9357-dd0012081207 (and focus is very screwed up after step 3)
EXPECTED RESULTS: probably prevent the alert from coming up while the filepicker is active, like we do for XUL modal dialogs in general. Certainly _don't_ crash.
|
|
468,840 | 3,888,212 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b3pre) Gecko/20081209 Shiretoko/3.1b3pre (.NET CLR 3.5.30729)
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1b3pre) Gecko/20081209 Shiretoko/3.1b3pre (.NET CLR 3.5.30729)
The referenced page does image evolution in client-side Javascript. With JIT content enabled, the page eventually hangs my browser (after ~20 minutes). CPU goes to 100% and the browser becomes non-responsive.
As far as I can tell, this doesn't occur with JIT content disabled.
I have JIT chrome disabled.
This is reproducible on at least two machines, both Windows XP running the latest Shiretoko.
Reproducible: Always
Steps to Reproduce:
1. Load page.
2. Hit "Start"
3. Wait.
|
|
480,270 | 3,990,847 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.1b2) Gecko/20081201 Firefox/3.1b2 (.NET CLR 3.5.30729)
Build Identifier: 0.2.105
After the upgrade to 0.2.105 each computer does a server wipe data, and this is incorrect.
Reproducible: Always
Steps to Reproduce:
1. Upgrade Computer1 to 0.2.105
2. After FF restart, do a sync
3. Weave on Computer1 does a server wipe data calls (OK)
4. After sync finishes, upgrade Copmuter2
5. After restart Weave on Copmuter2 does a server wipe data againg, although Computer1 already done so. (not OK)
Actual Results:
As a result of the two time wiping, the client list gets inconsistent. On Copmuter1 you have both Computer1 and Computer2 listed, and on Computer2 client list consist of only Computer2. Also I suspect on the server files only Computer2 is in the client list, because after Computer2 wiped the data, the record for Computer1 was lost, and the client on that computer does not reconize this.
Expected Results:
Weave should wipe server data, only after the upgrade of the first client. Each other client upgraded after that should just wipe client data, and do a full sync from server to client
|
|
483,179 | 4,014,498 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.9.1b4pre) Gecko/20090313 SeaMonkey/2.0b1pre
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.9.1b4pre) Gecko/20090313 SeaMonkey/2.0b1pre
If you assign the value of "this" to a JavaScript object's private variable, and then read that variable's value, it is - under certain circumstances - referring to *another* object of the same class.
Reproducible: Always
Steps to Reproduce:
See attached testcase. The testcase contains a loop over 20 individual instances of the same class.
Actual Results:
The values of "this.id" and "thisObject.id" should be identical for all the individual objects.
Expected Results:
In some of the objects those values are different.
This bug happens in SeaMonkey 2.0 only. Neither Seamonkey 1.x nor Firefox 3.0 show this behaviour.
|
|
619,594 | 5,145,820 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.13) Gecko/20101212 Gentoo Firefox/3.6.13
Build Identifier: Bugzilla-3.6.3, as well as the version running on bugzilla.mozilla.org
To Whom It May Concern,
the Bugzilla 3.6.3, the bugzilla.mozilla.org website, and likely other versions and instances of Bugzilla contain a critical vulnerability that can be used to recover a password reset token for any account. An attacker with an account on the bugzilla system can request a password reset for any other account and through efficient bruteforce recover the token, the attacker can use the token to changethe password of the victim's account and login as the victim.
A Quick explanation.
Bugzilla uses rand and srand in perl, which are based on srand48 and drand48 on Linux (and possibly other OS's) srand48 is seeded with at most 32 bit of entropy. Using a modern machine one can go through these 32bits in a very short amount of time, less than 10 minutes on my machine.
Bugzilla uses (s)rand to generate their tokens and to generate their login cookie. When accessing token.cgi with the attackers login credentials Bugzilla will login the attacker and send him a login cookie made using generate_random_password, the attacker can recover the seed used for srand from this, and use it to know the full internal state of the random number generator.
The same request is used by the attacker to request a password reset for the account the attackers wants to take over. For the reset procedure a token will be generated and send to the victim, if the attacker can find this token he can reset the victims password. Since the token is also created using generate_random_password and uses the internal random state that was left after making the login cookie the attacker can easily deduce the token send to the victim.
Steps for a succesful attack:
request a password reset for the victim account, while logging into to Bugzilla:
POST /token.cgi
---
Bugzilla_login=<ATTACKER_LOGIN>&Bugzilla_password=<ATTACKER_PASSWORD>&Bugzilla_remember=on&loginname=<VICTIMLOGINNAME>&a=reqpw
the response from the server will contain:
Set-Cookie: Bugzilla_logincookie=LPfN86mTdY; path=/; expires=Fri, 01-Jan-2038 00:00:00 GMT; secure; HttpOnly
while the victim will be sent an email with a token in it.
Next the attacker finds the random state used to generate his login Cookie and calculates the next token that BugZilla generated:
./randfindclean LPfN86mTdY
found at seed: -43631713 // fd663b9f
YKWG0y4oQT
(randfindclean finds the seed used to make the logincookie, and then calculates the token based on rand state)
and uses the token to login as the victim and change their password.
---- copy paste from the victims email ---
You have (or someone impersonating you has) requested to change your
Bugzilla password. To complete the change, visit the following link:
https://bugzilla.mozilla.org/token.cgi?t=YKWG0y4oQT&a=cfmpw
-----
If there are any questions, please don't hesitate to contact me,
Willem Pinckaers.
Reproducible: Always
Steps to Reproduce:
1.login while requestion a password change for the victim
2.based on logincookie, calculate the password token
3.change the victim password and login as the victim
Actual Results:
Got access to the victim's account
Expected Results:
r
|
|
620,122 | 5,149,949 |
crash [@ nsContentList::PopulateSelf(unsigned int)]
only wndows OS matches this stack.
Mac crash bp-e2dff7a3-62e4-4276-ac1b-442502101218 doesn't match up
bp-e88ee015-44cc-4953-a96d-2ce092101211
EXCEPTION_ACCESS_VIOLATION_READ
0x14
0 xul.dll nsContentList::PopulateSelf content/base/src/nsContentList.cpp:868
1 xul.dll nsContentList::BringSelfUpToDate content/base/src/nsContentList.cpp:933
2 xul.dll nsContentList::IndexOf content/base/src/nsContentList.cpp:526
3 xul.dll nsContentUtils::GenerateStateKey content/base/src/nsContentUtils.cpp:2137
4 xul.dll nsDocument::GetLayoutHistoryState content/base/src/nsDocument.cpp:7109
5 xul.dll nsGenericHTMLElement::GetPrimaryPresState content/html/content/src/nsGenericHTMLElement.cpp:1368
6 @0x8
7 @0x3e333330
8 mozcrt19.dll arena_dalloc obj-firefox/memory/jemalloc/crtsrc/jemalloc.c:4284
9 mozcrt19.dll free obj-firefox/memory/jemalloc/crtsrc/jemalloc.c:6121
10 xul.dll ReleaseData xpcom/string/src/nsSubstring.cpp:122
11 xul.dll nsHTMLInputElement::SaveState content/html/content/src/nsHTMLInputElement.cpp:3205
12 xul.dll nsGenericElement::UnbindFromTree content/base/src/nsGenericElement.cpp:3045
13 xul.dll nsGenericHTMLFormElement::UnbindFromTree content/html/content/src/nsGenericHTMLElement.cpp:2483
14 xul.dll nsHTMLInputElement::UnbindFromTree content/html/content/src/nsHTMLInputElement.cpp:2543
15 xul.dll nsGenericElement::UnbindFromTree content/base/src/nsGenericElement.cpp:3041
|
|
621,664 | 5,162,003 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; sk-SK; rv:1.9.2.13) Gecko/20101203 Firefox/3.6.13
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
I am developing my own PKCS#11 module to sign my e-mail. Everything works when C_SignInit returns CKR_OK. But when it returns CKR_FUNCTION_CANCELED, Thunderbird crashes. Tried other CKR_ return codes such ask CKR_FUNCTION_NOT_SUPPORTED, the crash remains. (this is to implement authentication on the side of the device - when it fails, the module returns CKR_FUNCTION_CANCELED). I can see C_CloseSession being called after C_SignInit (see the pkcs11-spy log).
Reproducible: Always
Steps to Reproduce:
1. Load a PKCS#11 module which returns CKR_FUNCTION_CANCELED in C_SignInit
2. Set up your digital signature properties as usual
3. Compose a new message, choose Security - Digitally sign this message
4. Send your e-mail and see the crash.
Actual Results:
Sometimes Visual C++ Runtime Error, sometimes a black little window behind the window with progress bar, sometimes Mozilla Crash Reporter dialog. See the screenshot: http://img4.glowfoto.com/images/2010/12/10-1150202661L.png
Expected Results:
Display an error message box that the message cannot be sent.
-------- pkcs11-spy log with unneeded information omitted ------
42: C_GetAttributeValue
[in] hSession = 0x1
[in] hObject = 0x2
[in] pTemplate[1]:
CKA_PRIVATE requested with 1 buffer
[out] pTemplate[1]:
CKA_PRIVATE True
Returned: 0 CKR_OK
43: C_OpenSession
[in] slotID = 0x0
[in] flags = 0x4
pApplication=068E8400
Notify=61A6A378
[out] *phSession = 0x2
Returned: 0 CKR_OK
44: C_SignInit
[in] hSession = 0x2
pMechanism->type=CKM_RSA_PKCS
[in] hKey = 0x2
Returned: 80 CKR_FUNCTION_CANCELED
45: C_CloseSession
[in] hSession = 0x2
Returned: 0 CKR_OK
-------------- pks11-spy log end (TB crashed here) -----------
----- call stack begin -----
> thunderbird.exe!nsGlobalWindow::SetNewDocument(nsIDocument * aDocument=0x00a02c00, nsISupports * aState=0x00000000, int aClearScopeHint=0x00000001, int aIsInternalCall=0x0000000b) Line 1760 + 0x3 bytes C++
thunderbird.exe!nsGlobalWindow::SetNewDocument(nsIDocument * aDocument=0x00a02c00, nsISupports * aState=0x00000000, int aClearScopeHint=0x00000001) Line 1569 C++
thunderbird.exe!DocumentViewerImpl::InitInternal(nsIWidget * aParentWidget=0x04e498c0, nsISupports * aState=0x00000000, const nsIntRect & aBounds={...}, int aDoCreation=0x00000001, int aInPrintPreview=0x00000000, int aNeedMakeCX=0x00000001) Line 960 C++
thunderbird.exe!DocumentViewerImpl::Init(nsIWidget * aParentWidget=0x00a79580, const nsIntRect & aBounds={...}) Line 699 C++
thunderbird.exe!nsDocShell::SetupNewViewer(nsIContentViewer * aNewViewer=0x04e8c3c0) Line 7304 + 0x1b bytes C++
thunderbird.exe!nsDocShell::Embed(nsIContentViewer * aContentViewer=0x04e8c3c0, const char * aCommand=0x01ab0481, nsISupports * aExtraInfo=0x00000000) Line 5472 C++
thunderbird.exe!nsDocShell::CreateContentViewer(const char * aContentType=0x03c37d68, nsIRequest * request=0x050c6740, nsIStreamListener * * aContentHandler=0x050c6740) Line 7090 + 0x15 bytes C++
thunderbird.exe!nsDSURIContentListener::DoContent(const char * aContentType=0x03c37d68, int aIsContentPreferred=0x00000000, nsIRequest * request=0x050c6740, nsIStreamListener * * aContentHandler=0x04effb5c, int * aAbortProcess=0x0045ac48) Line 150 C++
thunderbird.exe!nsDocumentOpenInfo::TryContentListener(nsIURIContentListener * aListener=0x06eb4e80, nsIChannel * aChannel=0x04effb5c) Line 734 C++
thunderbird.exe!nsDocumentOpenInfo::DispatchContent(nsIRequest * request=0x050c6740, nsISupports * aCtxt=0x00000000) Line 434 + 0x15 bytes C++
thunderbird.exe!nsDocumentOpenInfo::OnStartRequest(nsIRequest * request=0x050c6740, nsISupports * aCtxt=0x00000000) Line 287 C++
thunderbird.exe!nsJARChannel::OnStartRequest(nsIRequest * req=0x05bac330, nsISupports * ctx=0x00000000) Line 867 + 0x16 bytes C++
thunderbird.exe!nsInputStreamPump::OnStateStart() Line 445 C++
thunderbird.exe!nsInputStreamPump::OnInputStreamReady(nsIAsyncInputStream * stream=0x04e7cb68) Line 407 C++
xpcom_core.dll!nsOutputStreamReadyEvent::Run() Line 113 C++
xpcom_core.dll!nsThread::ProcessNextEvent(int mayWait=0x00000001, int * result=0x0045aef0) Line 527 + 0x6 bytes C++
xpcom_core.dll!NS_ProcessNextEvent_P(nsIThread * thread=0x00000001, int mayWait=0x00000001) Line 250 + 0xd bytes C++
xpcom_core.dll!nsThread::Shutdown() Line 468 + 0xa bytes C++
thunderbird.exe!nsSound::PurgeLastSound() Line 140 C++
thunderbird.exe!nsSound::~nsSound() Line 135 C++
thunderbird.exe!nsSound::`scalar deleting destructor'() + 0x8 bytes C++
thunderbird.exe!nsIndexedToHTML::Release() Line 62 + 0x18 bytes C++
thunderbird.exe!XPCJSRuntime::GCCallback(JSContext * cx=0x04f1d400, JSGCStatus status=JSGC_END) Line 760 + 0x2a bytes C++
thunderbird.exe!DOMGCCallback(JSContext * cx=0x04f1d400, JSGCStatus status=JSGC_END) Line 3827 + 0x14 bytes C++
thunderbird.exe!XPCCycleCollectGCCallback(JSContext * cx=0x04f1d400, JSGCStatus status=JSGC_END) Line 412 + 0x10 bytes C++
js3250.dll!js_GC(JSContext * cx=0x04f1d400, JSGCInvocationKind gckind=GC_NORMAL) Line 3822 + 0x5 bytes C++
js3250.dll!JS_GC(JSContext * cx=0x04f1d400) Line 2439 + 0x8 bytes C++
thunderbird.exe!nsXPConnect::Collect() Line 479 C++
xpcom_core.dll!nsCycleCollector::Collect(unsigned int aTryCollections=0x00000001) Line 2434 + 0x5 bytes C++
xpcom_core.dll!nsCycleCollector_collect() Line 3130 C++
thunderbird.exe!nsJSContext::CC() Line 3641 + 0x6 bytes C++
thunderbird.exe!nsJSContext::IntervalCC() Line 3730 C++
xpcom_core.dll!nsTimerImpl::Fire() Line 427 + 0x6 bytes C++
xpcom_core.dll!nsTimerEvent::Run() Line 521 C++
xpcom_core.dll!nsThread::ProcessNextEvent(int mayWait=0x00000001, int * result=0x0045f060) Line 527 + 0x6 bytes C++
xpcom_core.dll!NS_ProcessNextEvent_P(nsIThread * thread=0x00000001, int mayWait=0x00000001) Line 250 + 0xd bytes C++
thunderbird.exe!nsXULWindow::ShowModal() Line 416 + 0x9 bytes C++
thunderbird.exe!nsContentTreeOwner::ShowAsModal() Line 529 C++
thunderbird.exe!nsWindowWatcher::OpenWindowJSInternal(nsIDOMWindow * aParent=0x00a47780, const char * aUrl=0x01c5e844, const char * aName=0x01ab0bd0, const char * aFeatures=0x01ab0bd8, int aDialog=0x00000001, nsIArray * argv=0x04e20720, int aCalledFromJS=0x00000000, nsIDOMWindow * * _retval=0x0045f35c) Line 1011 C++
thunderbird.exe!nsWindowWatcher::OpenWindow(nsIDOMWindow * aParent=0x00a47780, const char * aUrl=0x01c5e844, const char * aName=0x01ab0bd0, const char * aFeatures=0x01ab0bd8, nsISupports * aArguments=0x04eef740, nsIDOMWindow * * _retval=0x0045f35c) Line 425 + 0x24 bytes C++
thunderbird.exe!nsPromptService::DoDialog(nsIDOMWindow * aParent=0x04e498c0, nsIDialogParamBlock * aParamBlock=0x04eef740, const char * aChromeURL=0x01c5e844) Line 797 C++
thunderbird.exe!nsPromptService::Alert(nsIDOMWindow * parent=0x00a47780, const wchar_t * dialogTitle=0x04eff8e0, const wchar_t * text=0x0773c268) Line 148 C++
thunderbird.exe!nsPrompt::Alert(const wchar_t * dialogTitle=0x04eff8e0, const wchar_t * text=0x0773c268) Line 199 C++
thunderbird.exe!nsMsgDisplayMessageByString(nsIPrompt * aPrompt=0x06eb4e40, const wchar_t * msg=0x0773c268, const wchar_t * windowTitle=0x04eff8e0) Line 124 C++
thunderbird.exe!nsMsgSendReport::DisplayReport(nsIPrompt * prompt=0x06eb4e40, int showErrorOnly=0x00000001, int dontShowReportTwice=0x00000000, unsigned int * _retval=0x0045f57c) Line 428 + 0xe bytes C++
thunderbird.exe!nsMsgComposeAndSend::Fail(unsigned int failure_code=0x06eb4e40, const wchar_t * error_msg=0x00000000, unsigned int * _retval=0x0045f57c) Line 3812 C++
thunderbird.exe!nsMsgComposeAndSend::GatherMimeAttachments() Line 1147 C++
thunderbird.exe!nsMsgAttachmentHandler::UrlExit(unsigned int status=0x00000000, const wchar_t * aMsg=0x00000000) Line 1315 + 0x4 bytes C++
thunderbird.exe!FetcherURLDoneCallback(unsigned int aStatus=0x00000000, const nsACString_internal & aContentType={...}, const nsACString_internal & aCharset={...}, int totalSize=0x000000f1, const wchar_t * aMsg=0x00000000, void * tagData=0x04e56920) Line 534 + 0xd bytes C++
thunderbird.exe!nsURLFetcher::OnStopRequest(nsIRequest * request=0x04e7ce0c, nsISupports * ctxt=0x00000000, unsigned int aStatus=0x00000000) Line 327 + 0x15 bytes C++
thunderbird.exe!nsDocumentOpenInfo::OnStopRequest(nsIRequest * request=0x04e7ce0c, nsISupports * aCtxt=0x00000000, unsigned int aStatus=0x00000000) Line 324 C++
thunderbird.exe!nsBaseChannel::OnStopRequest(nsIRequest * request=0x04e63b00, nsISupports * ctxt=0x00000000, unsigned int status=0x00000000) Line 681 C++
thunderbird.exe!nsInputStreamPump::OnStateStop() Line 579 C++
thunderbird.exe!nsInputStreamPump::OnInputStreamReady(nsIAsyncInputStream * stream=0x04e7d428) Line 404 C++
xpcom_core.dll!nsOutputStreamReadyEvent::Run() Line 113 C++
xpcom_core.dll!nsThread::ProcessNextEvent(int mayWait=0x00000001, int * result=0x0045f8dc) Line 527 + 0x6 bytes C++
xpcom_core.dll!NS_ProcessNextEvent_P(nsIThread * thread=0x00000001, int mayWait=0x00000001) Line 250 + 0xd bytes C++
thunderbird.exe!nsBaseAppShell::Run() Line 177 + 0x9 bytes C++
thunderbird.exe!nsAppStartup::Run() Line 184 C++
thunderbird.exe!XRE_main(int argc=0x00000001, char * * argv=0x00a110a8, const nsXREAppData * aAppData=0x00a17340) Line 3485 C++
thunderbird.exe!NS_internal_main(int argc=0x00000001, char * * argv=0x00a110a8) Line 102 C++
thunderbird.exe!wmain(int argc=0x00a110a8, wchar_t * * argv=0x00a1b700) Line 122 C++
thunderbird.exe!__tmainCRTStartup() Line 591 + 0x19 bytes C
kernel32.dll!@BaseThreadInitThunk@12() + 0x12 bytes
ntdll.dll!___RtlUserThreadStart@8() + 0x27 bytes
ntdll.dll!__RtlUserThreadStart@8() + 0x1b bytes
------------ call stack end --------------
crashed on a line in nsGlobalWindow.cpp:
nsWindowSH::InvalidateGlobalScopePolluter(cx, currentInner->mJSObject);
saying Uncaught exception occurred.
(debugged using VS2008)
|
|
629,912 | 5,237,726 |
possible new crash on mozilla-central maybe first appearing in
build 2011 01 28 030208
stack looks like
https://crash-stats.mozilla.com/report/index/e944c84d-58d8-4d56-bf6f-5c6632110129
Frame Module Signature [Expand] Source
0 xul.dll NotificationController::TextEnumerator accessible/src/base/NotificationController.cpp:601
1 xul.dll NotificationController::QueueEvent accessible/src/base/NotificationController.cpp:139
2 xul.dll nsTArray<nsAutoPtr<nsPropertyTable>,nsTArrayDefaultAllocator>::~nsTArray<nsAutoPtr<nsPropertyTable>,nsTArrayDefaultAllocator> obj-firefox/dist/include/nsTArray.h:373
3 xul.dll PL_DHashTableEnumerate obj-firefox/xpcom/build/pldhash.c:754
4 xul.dll nsTArray_base<nsTArrayInfallibleAllocator>::ShrinkCapacity obj-firefox/dist/include/nsTArray-inl.h:135
5 xul.dll NotificationController::WillRefresh accessible/src/base/NotificationController.cpp:247
6 xul.dll nsTArray<nsAutoPtr<nsPropertyTable>,nsTArrayDefaultAllocator>::~nsTArray<nsAutoPtr<nsPropertyTable>,nsTArrayDefaultAllocator> obj-firefox/dist/include/nsTArray.h:373
7 xul.dll PresShell::FlushPendingNotifications layout/base/nsPresShell.cpp:4924
8 xul.dll NotificationController::CreateTextChangeEventFor accessible/src/base/NotificationController.cpp:574
9 xul.dll nsRefreshDriver::Notify layout/base/nsRefreshDriver.cpp:254
10 user32.dll user32.dll@0x1baf8
11 user32.dll user32.dll@0x1bd31
12 xul.dll xul.dll@0xa3776f
13 nspr4.dll PR_AssertCurrentThreadOwnsLock nsprpub/pr/src/threads/combined/prulock.c:404
14 xul.dll mozilla::TimeDuration::ToSeconds xpcom/ds/TimeStamp.cpp:63
15 nspr4.dll PR_Unlock
more reports at:
https://crash-stats.mozilla.com/report/list?signature=NotificationController%3A%3ATextEnumerator(nsPtrHashKey<nsIContent>*%2C void*)&version=Firefox%3A4.0b11pre
source at the top of the stack appears to have been recently changed.
2011-01-28 16:42 +0800 Alexander Surkov - Bug 625652 - make sure accessible tree is correct when rendered text is changed, r=davidb, sr=roc, a=roc
2011-01-28 13:15 +0800 Alexander Surkov - Bug 629394, part3 - replace do_QueryObject on AsHyperText, r=fer, a=davidb
2011-01-28 12:37 +0800 Alexander Surkov - Bug 606924, part5 - rename GetCachedAccessible, r=fer, a=final+
2011-01-26 14:35 +0800 Alexander Surkov - Bug 606924, part3 - handing document concept, r=davidb, a=blocking2.0Final+
2011-01-24 10:58 +0800 Alexander Surkov - Bug 606924, part2 - create initial tree, r=davidb, a=blocking2.0Final+
base Alexander Surkov - Bug 498015 - update accessible tree on content insertion after layout, r=davidb, sr=bz, a=blockingBetaN
|
|
635,977 | 5,296,829 |
User-Agent: Mozilla/5.0 (X11; Linux i686 on x86_64; rv:2.0b11) Gecko/20100101 Firefox/4.0b11
Build Identifier: 4.0b11
Firefox 4.0b11 crashes in libxul with a segfault on a bad and possibly controllable read when given an iframe with source address ";%80".
Reproducible: Always
Steps to Reproduce:
1. echo '<iframe src=";%80">' > page.html
2. ...
3. firefox page.html
Actual Results:
Firefox is sorry it followed a bad pointer.
Expected Results:
Firefox should only follow good pointers.
The above minimal case crashes with:
Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 0xeffffb70 (LWP 31736)]
0xf71dafaf in ?? () from ./libxul.so
=> 0xf71dafaf: mov (%edx,%eax,4),%edi
with eax = -1, edx = 0
Different files causing this seem to have edx=0, but eax as different values like -256975184, which make this look less like a harmless null deref. Filing conservatively as a security issue.
|
|
644,069 | 5,361,920 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-GB; rv:1.9.2.16) Gecko/20110319 Firefox/3.6.16
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-GB; rv:1.9.2.16) Gecko/20110319 Firefox/3.6.16
We have a web page using JQuery 1.5.1 that makes a POST ajax request to a REST web service on another domain.
Firefox sends a preflighting OPTIONS request, then the POST.
If the server responds with a header of Access-Control-Max-Age set to a number of seconds longer than it takes to make 100 unique uri requests, firefox crashes.
On the 101st unique URL post request, Firefox makes the 101st OPTIONS request to the server, which replies, then Firefox crashes with the attached crash dump.
Reproducible: Always
Steps to Reproduce:
1. Edit CrossDomainTest.html line 22 to point to a REST webservice
2. Ensure the webservice response includes a header of Access-Control-Max-Age set to something like "1728000" which is 20 days.
3. Open the page in Firefox
4. On the 101 request Firefox crashes.
Actual Results:
Firefox crashed and showed the submit crash dump dialog.
Expected Results:
Firefox should continue to make requests.
This is related to the submitted crash dump
ID: 7636c991-6b98-4abf-b2c4-7ea2c2110322
Module: xul.dll
When no "Access-Control-Max-Age" header is defined in the web service response Firefox continues to make more than 101 requests.
We are unsure if this bug could be exploited so we are setting the "Many users could be harmed" option until further investigation confirms the extent of this issue.
|
|
1,233,556 | 11,015,222 |
This bug was filed from the Socorro interface and is
report bp-695430d9-0b82-4b23-8827-23f332151217.
=============================================================
0 nahimicmsiosd.dll nahimicmsiosd.dll@0x6172
Ø 1 ntdll.dll ntdll.dll@0x12151
Ø 2 ntdll.dll ntdll.dll@0x11d9a
Ø 3 ntdll.dll ntdll.dll@0x11f43
Ø 4 ntdll.dll ntdll.dll@0x11070
Ø 5 ntdll.dll ntdll.dll@0x109b3
Ø 6 ntdll.dll ntdll.dll@0x10df2
Ø 7 ntdll.dll ntdll.dll@0x10f8b
Ø 8 nahimicmsiosd.dll nahimicmsiosd.dll@0x38d4f
Ø 9 ntdll.dll ntdll.dll@0x114da
Ø 10 ntdll.dll ntdll.dll@0x374de
Ø 11 ntdll.dll ntdll.dll@0x89fb
Ø 12 kernelbase.dll kernelbase.dll@0x56bf2
Ø 13 nahimicmsiosd.dll nahimicmsiosd.dll@0x476ef
Ø 14 nahimicmsiosd.dll nahimicmsiosd.dll@0xc5c0
Ø 15 nahimicmsiosd.dll nahimicmsiosd.dll@0x476ef
Ø 16 nahimicmsiosd.dll nahimicmsiosd.dll@0x240f
Ø 17 nahimicmsiosd.dll nahimicmsiosd.dll@0x476ef
Ø 18 nahimicmsiosd.dll nahimicmsiosd.dll@0x6791
Ø 19 nahimicmsiosd.dll nahimicmsiosd.dll@0x448df
Ø 20 nahimicmsiosd.dll nahimicmsiosd.dll@0x448df
Ø 21 nahimicmsiosd.dll nahimicmsiosd.dll@0x5ed9
22 @0x7ffbf5c7ffff
Ø 23 nahimicmsiosd.dll nahimicmsiosd.dll@0x4700f
Ø 24 nahimicmsiosd.dll nahimicmsiosd.dll@0x4708f
25 @0x7ffc0977ffff
Ø 26 nahimicmsiosd.dll nahimicmsiosd.dll@0x3354
Ø 27 nahimicmsiosd.dll nahimicmsiosd.dll@0x4708f
28 @0x7ffc0977ffff
Ø 29 nahimicmsidevprops.dll nahimicmsidevprops.dll@0xa01e
Ø 30 nahimicmsidevprops.dll nahimicmsidevprops.dll@0x3268f
31 nss3.dll PR_WaitCondVar nsprpub/pr/src/threads/combined/prucv.c
32 @0x4f0044004e0048
=============================================================
|
|
1,237,224 | 11,050,428 |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36
Steps to reproduce:
Firefox crashes after series of subsequent re-negotiations in case H.264 has been negotiated and constrained by max-mbps receiver capability.
1. Create PC1 and PC2
2. Let PC2 simulate remote endpoint supporting H.264 with non-interleaved packetization mode only
3. Let PC2 specify max-mbps H.264 receiver capability
4. Add audio and video tracks to both PC1 and PC2
5. Negotiate bidirectional A/V m-lines between PC1 and PC2
6. Remove video track from PC1, re-negotiate unidirectional video m-line
7. Add video track back to PC1, re-negotiate bidirectional video m-line
Can be reproduced by running the following in Nightly 46 - https://jsfiddle.net/9md05c03/
Actual results:
After re-negotiating bidirectional video Firefox crashes with EXC_ARITHMETIC, full backtrace below:
(lldb) bt
* thread #9: tid = 0x6369, 0x00000001028f07d0 XUL`mozilla::WebrtcVideoConduit::SelectSendResolution(unsigned short, unsigned short, webrtc::I420VideoFrame*) + 71 at VideoConduit.cpp:1249, name = 'Socket Thread', stop reason = EXC_ARITHMETIC (code=EXC_I386_DIV, subcode=0x0)
frame #0: 0x00000001028f07d0 XUL`mozilla::WebrtcVideoConduit::SelectSendResolution(unsigned short, unsigned short, webrtc::I420VideoFrame*) + 71 at VideoConduit.cpp:1249
frame #1: 0x00000001028f0789 XUL`mozilla::WebrtcVideoConduit::SelectSendResolution(this=0x000000013e171bb0, width=<unavailable>, height=<unavailable>, frame=0x0000000000000000) + 489 at VideoConduit.cpp:1137
* frame #2: 0x00000001028f0529 XUL`mozilla::WebrtcVideoConduit::GetVideoEncoderStats(this=0x000000013e171bb0, framerateMean=0x00007000003a5778, framerateStdDev=<unavailable>, bitrateMean=<unavailable>, bitrateStdDev=<unavailable>, droppedFrames=<unavailable>) + 345 at VideoConduit.cpp:185
frame #3: 0x000000010293598f XUL`mozilla::PeerConnectionImpl::ExecuteStatsQuery_s(query=0x00000001434c3f10) + 3615 at PeerConnectionImpl.cpp:3304
frame #4: 0x0000000102923d26 XUL`mozilla::EverySecondTelemetryCallback_s(aQueryList=nsAutoPtr<mozilla::Vector<nsAutoPtr<mozilla::RTCStatsQuery>, 0, mozilla::MallocAllocPolicy> > @ 0x00007000003a5af0) + 214 at PeerConnectionCtx.cpp:206
frame #5: 0x0000000102925b30 XUL`mozilla::runnable_args_func<void (*)(nsAutoPtr<mozilla::Vector<nsAutoPtr<mozilla::RTCStatsQuery>, 0ul, mozilla::MallocAllocPolicy> >), nsAutoPtr<mozilla::Vector<nsAutoPtr<mozilla::RTCStatsQuery>, 0ul, mozilla::MallocAllocPolicy> > >::Run() [inlined] void mozilla::detail::RunnableFunctionCallHelper<void>::apply<void (func=<unavailable>)(nsAutoPtr<mozilla::Vector<nsAutoPtr<mozilla::RTCStatsQuery>, 0ul, mozilla::MallocAllocPolicy> >), nsAutoPtr<mozilla::Vector<nsAutoPtr<mozilla::RTCStatsQuery>, 0ul, mozilla::MallocAllocPolicy> >, 0ul>(void (*)(nsAutoPtr<mozilla::Vector<nsAutoPtr<mozilla::RTCStatsQuery>, 0ul, mozilla::MallocAllocPolicy> >), mozilla::Tuple<nsAutoPtr<mozilla::Vector<nsAutoPtr<mozilla::RTCStatsQuery>, 0ul, mozilla::MallocAllocPolicy> > >&, mozilla::IndexSequence<0ul>) + 22 at runnable_utils.h:79
frame #6: 0x0000000102925b1a XUL`mozilla::runnable_args_func<void (*)(nsAutoPtr<mozilla::Vector<nsAutoPtr<mozilla::RTCStatsQuery>, 0ul, mozilla::MallocAllocPolicy> >), nsAutoPtr<mozilla::Vector<nsAutoPtr<mozilla::RTCStatsQuery>, 0ul, mozilla::MallocAllocPolicy> > >::Run(this=<unavailable>) + 10 at runnable_utils.h:118
frame #7: 0x0000000101ea3147 XUL`nsThread::ProcessNextEvent(this=0x000000010072cb00, aMayWait=<unavailable>, aResult=0x00007000003a5c07) + 1495 at nsThread.cpp:989
frame #8: 0x0000000101ee2653 XUL`NS_ProcessNextEvent(aThread=<unavailable>, aMayWait=true) + 51 at nsThreadUtils.cpp:297
frame #9: 0x0000000101fb4250 XUL`nsSocketTransportService::Run(this=0x0000000100727640) + 960 at nsSocketTransportService2.cpp:905
frame #10: 0x0000000101fb4dfd XUL`non-virtual thunk to nsSocketTransportService::Run(this=<unavailable>) + 13 at nsSocketTransportService2.cpp:793
frame #11: 0x0000000101ea3147 XUL`nsThread::ProcessNextEvent(this=0x000000010072cb00, aMayWait=<unavailable>, aResult=0x00007000003a5dd7) + 1495 at nsThread.cpp:989
frame #12: 0x0000000101ee2653 XUL`NS_ProcessNextEvent(aThread=<unavailable>, aMayWait=false) + 51 at nsThreadUtils.cpp:297
frame #13: 0x00000001022c2acc XUL`mozilla::ipc::MessagePumpForNonMainThreads::Run(this=0x0000000111095e80, aDelegate=0x00000001007d44e0) + 284 at MessagePump.cpp:326
frame #14: 0x000000010228592c XUL`MessageLoop::Run() [inlined] MessageLoop::RunHandler(this=<unavailable>) + 60 at message_loop.cc:227
frame #15: 0x0000000102285927 XUL`MessageLoop::Run(this=<unavailable>) + 55 at message_loop.cc:201
frame #16: 0x0000000101ea1033 XUL`nsThread::ThreadFunc(aArg=0x000000010072cb00) + 291 at nsThread.cpp:401
frame #17: 0x0000000101b3be79 libnss3.dylib`_pt_root(arg=0x00000001007349f0) + 281 at ptthread.c:212
frame #18: 0x00007fff90f0a9b1 libsystem_pthread.dylib`_pthread_body + 131
frame #19: 0x00007fff90f0a92e libsystem_pthread.dylib`_pthread_start + 168
frame #20: 0x00007fff90f08385 libsystem_pthread.dylib`thread_start + 13
(lldb) frame select 0
frame #0: 0x00000001028f07d0 XUL`mozilla::WebrtcVideoConduit::SelectSendResolution(unsigned short, unsigned short, webrtc::I420VideoFrame*) + 71 at VideoConduit.cpp:1249
1246 mb_height = (mSendingHeight + 15) >> 4;
1247
1248 cur_fs = mb_width * mb_height;
-> 1249 max_fps = mCurSendCodecConfig->mEncodingConstraints.maxMbps/cur_fs;
1250 if (max_fps < mSendingFramerate) {
1251 new_framerate = max_fps;
1252 }
Issue seems to caused by telemetry polling performed every second by PeerConnectionCtx catching individual PC video conduit in a state where transmission has been already restarted due to processing incoming re-invite (which shouldn't even be changing anything as media direction and previously negotiated PT and its params remain the same), but encoder hasn't yet managed to produce any frames. This situation leads to both VideoConduit::mSendingWidth and VideoConduit::mSendingHeight still set to 0, causing the VideoConduit to perform division by zero. Issue does not reproduce if remote endpoint does not specify max-mbps receiver capability in a=fmtp attribute for H.264 codec.
Expected results:
Firefox shouldn't crash
|
|
1,225,160 | 10,935,950 |
This bug was filed from the Socorro interface and is
report bp-36559863-e718-4bc5-b2f9-aa5f52151116.
=============================================================
We're crashing here:
http://hg.mozilla.org/mozilla-central/annotate/48d636f678b0/js/src/jsobj.h#l159
with a null _group
and according to crash-reports end up there through here:
http://hg.mozilla.org/mozilla-central/annotate/48d636f678b0/js/xpconnect/loader/mozJSComponentLoader.cpp#l1217
I don't really understand how that is possible. But it's annoying - I am repeatedly crashing while trying to use the browser debugger in the course of my normal work. The browser debugger stays up but the process dies underneath me. It tends to happen while I'm stopped on a breakpoint in the debugger. I don't have reliable STR, but I've crashed 3 times in the last 20 minutes, and it's starting to get on my nerves.
bhackett, ejpbruel says you might know more about what's going on here?
|
|
1,252,058 | 11,203,033 |
Created attachment 8724701
bug "new folder".mp4
[Affected versions]:
Firefox Nightly 47.0a1(2016-02-25)
[Affected platforms]:
Mac OS X 10.10
[Steps to reproduce]:
1. Open Nightly with a new profile and sign in with a Firefox account.
2. Right click on a link and choose "Bookmark this link". -> The New bookmark dialog opens.
3. Click on "Show all the bookmarks folders" down arrow.
4. Click on the "New folder" button several times to create new folders.
[Expected result]:
On every click on the "New Folder" button a new folder is created.
[Actual result]:
After 3-4 clicks the browser freezes, to close it you need to force quit.
[Regression range]:
Last good revision: 5b2baa5e9356644a7ed0b73e422eaff62e159ffb (2016-02-24)
First bad revision: c1e0d1890cfee9d86c8d566b0490053f21e0afc6 (2016-02-25)
Pushlog:
https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=5b2baa5e9356644a7ed0b73e422eaff62e159ffb&tochange=c1e0d1890cfee9d86c8d566b0490053f21e0afc6
[Additional notes]:
This behavior is reproduce it only on Mac OS, on other operating systems the button "new folder" becomes unavailable. You can see bug 1250445
Please see the attachement.
|
|
1,228,938 | 10,972,925 |
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:42.0) Gecko/20100101 Firefox/42.0
Build ID: 2015103000
Steps to reproduce:
Every time, I open the mp4 video, firefox crashes. Firefox does not have any problems
opening other mp4 files coded with h264/mp3 that were created in the same way.
Actual results:
crash of firefox, I have attached the mp4 file, that makes the problem
Expected results:
firefox should have played the movie
|
|
1,240,760 | 11,087,494 |
Created attachment 8709456
ff-crash-datachannel.html
User Agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:43.0) Gecko/20100101 Firefox/43.0
Build ID: 20160106231438
Steps to reproduce:
Load the attached page
Actual results:
The page loads, redirects to mozilla.org, and after ~20 seconds, Firefox crashes.
This is reproducible with any other navigation action, including a simple reload.
from my quick tests, it only happens when 2 data channels are open, with the 2nd set to use the same id as the one the first one automatically gets; it's probably somewhat related to https://bugzilla.mozilla.org/show_bug.cgi?id=1017462
Expected results:
Firefox should not have crashed
|
|
1,198,815 | 10,661,446 |
Created attachment 8652917
YouTube's video frame after HTML5 playback has failed.png
User Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:43.0) Gecko/20100101 Firefox/43.0
Build ID: 20150824030206
Steps to reproduce:
I watched this YouTube video: https://youtu.be/hSVCuOPlkpQ
Actual results:
FireFox has crashed: https://crash-stats.mozilla.com/report/index/28a8eb47-6ad1-465d-a99f-ef1f72150826
The playback has failed even after restart, but without crashing whole browser. I just got "Activate Adobe Flash" message from YouTube after HTML5 playback has died shortly after video playback has started (see attached screenshot). (Playback via Flash has worked fine for this video).
This was not the first video where HTML5 playback has failed like that, but it was the first time where browser has crashed, so I have a crash report for that.
Expected results:
Normal continuous playback via HTML5.
|
|
1,200,085 | 10,675,893 |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_3) AppleWebKit/600.6.3 (KHTML, like Gecko) Version/8.0.6 Safari/600.6.3
Steps to reproduce:
This crash happened after start,stop video several times
crash link: https://crash-stats.mozilla.com/report/index/f4648e5e-a469-499c-a3f3-8186b2150826
|
|
1,202,424 | 10,702,505 |
This bug was filed from the Socorro interface and is
report bp-f31ef803-8e2c-4d95-9081-8412f2150907.
=============================================================
Reproducible with latest 43.0a1 (from 2015-09-07) *only* with e10s enabled
Affected platforms: 2 machines with Windows 7 x64, Windows 10 x64 - build 10532, Ubuntu 14.04 x32
Steps to reproduce:
1. Launch Firefox and navigate to http://mozilla.github.io/webrtc-landing/gum_test.html
2. Click on Video or Audio&Video button.
3. Share devices when prompted.
4. Close Firefox.
Additional notes:
1. With the same STR on latest Developer Edition the process remains active & the global indicator visible, but no crash. Same as with latest Nightly, it does not reproduce with e10s disabled. Should I file a separate bug for this issue? Or is it enough to track it here?
2. Unable to reproduce on Mac OS X 10.10.4.
3. More reports: https://crash-stats.mozilla.com/report/list?product=Firefox&signature=%3CT%3E%3A%3Aoperator%28%29
|
|
1,218,326 | 10,871,967 |
Created attachment 8678749
UAF_AutoSPSLock_Repro.html
Reproduce test case:
<html><script>
var rtcConfig = { "iceServers": [{ "url": "stun:stun.l.google.com:19302" }] };
var pc0 = new RTCPeerConnection(rtcConfig);
var pc1 = new RTCPeerConnection(rtcConfig);
pc1.onsignalingstatechange = function (e) {dataChan0 = pc1.createDataChannel("DataChanName0");};
var dataChan0 = pc0.createDataChannel("DataChanName0");;
pc1.close();
setTimeout(function(){location.reload()},270);
</script></html>
Steps to reproduce:
1. Open the attached test case (UAF_AutoSPSLock_Repro.html) in Firefox browser.
2. Firefox crashes in js::AutoSPSLock::~AutoSPSLock():
First-chance exception at 0x0F7A536F (nss3.dll) in firefox.exe: 0xC0000005: Access violation reading location 0x5A5A5A62.
Unhandled exception at 0x0F7A536F (nss3.dll) in firefox.exe: 0xC0000005: Access violation reading location 0x5A5A5A62.
The address pattern 0x5A5A5A indicates an Use After Free.
Firefox version: 44.0a1 (2015-10-03)
Variables:
+ lock 0x5a5a5a5a {links={next=??? prev=??? } owner=??? waitQ={next=??? prev=??? } ...} PRLock *
+ me 0x0769a000 {state=2 priority=PR_PRIORITY_NORMAL (1) arg=0x00000000 ...} PRThread *
me->flags 136 unsigned int
+ suspendAllThread 0x00000000 <NULL> PRThread *
Registers:
EAX = 5A5A5A5A EBX = 00000001 ECX = FE4FD000 EDX = FFFFFFFF ESI = 011C39A0 EDI = 0019495C EIP = 0F7A536F ESP = 0115EC8C EBP = 0115EC90 EFL = 00010206
0x5a5a5a62 = 00000000
Call Stack:
> nss3.dll!PR_Unlock(PRLock * lock) Line 322 C
xul.dll!js::AutoSPSLock::~AutoSPSLock() Line 221 C++
xul.dll!mozilla::BaseAutoLock<mozilla::Mutex>::~BaseAutoLock<mozilla::Mutex>() Line 170 C++
xul.dll!mozilla::DataChannelConnection::Close(mozilla::DataChannel * aChannel) Line 2495 C++
xul.dll!mozilla::DataChannel::Close() Line 2587 C++
xul.dll!nsDOMDataChannel::~nsDOMDataChannel() Line 50 C++
[External Code]
xul.dll!mozilla::DOMEventTargetHelper::DeleteCycleCollectable() Line 81 C++
xul.dll!mozilla::DOMEventTargetHelper::cycleCollection::DeleteCycleCollectable(void * p) Line 64 C++
xul.dll!SnowWhiteKiller::~SnowWhiteKiller() Line 2657 C++
xul.dll!nsCycleCollector::FreeSnowWhite(bool aUntilNoSWInPurpleBuffer) Line 2823 C++
xul.dll!nsCycleCollector_doDeferredDeletion() Line 4081 C++
xul.dll!AsyncFreeSnowWhite::Run() Line 144 C++
xul.dll!nsThread::ProcessNextEvent(bool aMayWait, bool * aResult) Line 960 C++
xul.dll!NS_ProcessNextEvent(nsIThread * aThread, bool aMayWait) Line 277 C++
xul.dll!mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate * aDelegate) Line 95 C++
xul.dll!MessageLoop::RunInternal() Line 235 C++
xul.dll!MessageLoop::RunHandler() Line 228 C++
xul.dll!MessageLoop::Run() Line 202 C++
xul.dll!nsBaseAppShell::Run() Line 158 C++
xul.dll!nsAppShell::Run() Line 178 C++
xul.dll!nsAppStartup::Run() Line 281 C++
xul.dll!XREMain::XRE_mainRun() Line 4298 C++
xul.dll!XREMain::XRE_main(int argc, char * * argv, const nsXREAppData * aAppData) Line 4391 C++
xul.dll!XRE_main(int argc, char * * argv, const nsXREAppData * aAppData, unsigned int aFlags) Line 4493 C++
firefox.exe!do_main(int argc, char * * argv, nsIFile * xreDirectory) Line 212 C++
firefox.exe!NS_internal_main(int argc, char * * argv) Line 399 C++
firefox.exe!wmain(int argc, wchar_t * * argv) Line 131 C++
[External Code]
[Frames below may be incorrect and/or missing, no symbols loaded for kernel32.dll]
|
|
1,203,872 | 10,719,580 |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:40.0) Gecko/20100101 Firefox/40.0
Build ID: 20150826023504
Steps to reproduce:
Unsure.
1. Watch an embedded video in firefox 40.0.3
2. Crash
report: https://crash-stats.mozilla.com/report/index/33f64c99-2fa2-4b92-b79b-3e4942150911
Actual results:
Firefox quit unexpectedly and when it restarted, all profile/cached information was missing.
Expected results:
No crash, if crash, bookmarks and passwords preserved.
|
|
1,298,676 | 11,661,300 |
Created attachment 8785686
stacktrace of FF hang on startup Saturday aug 27 windbg.txt
restarted firefox
about:sessionrestore page appeared - all seems OK.
did NOT click restore, and had no interraction with Firefox UI.
tabbed away to a different application.
came back within a few minutes to a hung firefox and title bar shows "Not Responding".
unfortunately I did not check to see how much CPU is being used.
Firefox nightly build 20160827
I have never seen a hang after startup like that before.
So far, startups after that incident have not hung.
|
|
1,299,150 | 11,666,564 |
Created attachment 8786355
Client 30-08-16 17-00.crash
Build: master 5a63555e5a
Device: iPad Air 2
iOS: 9.3.3
Steps to reproduce:
1. Swipe down to open notification menu
2. Open Fennec by taping the New Tab button
Actual results:
- The application will crash.
Note:
- This issue was reproduced only on iPads.
|
|
1,295,033 | 11,623,728 |
This bug was filed from the Socorro interface and is
report bp-74fc5f2a-51f9-4552-b25d-adc782160814.
=============================================================
Crash seen in early betas that has risen to #10 in Beta 3. Since it has no bug associated with it, filing to get it on the radar for tracking: http://bit.ly/2aLJ9PR.
Perhaps terrence has some ideas as to what might be the root cause, adding ni.
|
|
1,290,280 | 11,583,509 |
Build Identifier:
https://hg.mozilla.org/mozilla-central/rev/db3ed1fdbbeaf5ab1e8fe454780146e7499be3db
Mozilla/5.0 (Windows NT 10.0; WOW64; rv:50.0) Gecko/20100101 Firefox/50.0 ID:20160728030208
The crash is only reproducible on Windows10 IP x64 build 14393.5 (on VMware Workstation Player12).
Disabling anti-virus does not fix.
Disabling e10s fixes the crash.
However, I can not reproduce the crash on [1] and [2].
[1] Windows10 x64 build 10115 actual machine
[2] Windows8.1 x64 (on VMware Workstation Player12)
Reproducible: 100% always
Steps To Reproduce:
1. Set "When Nightly starts : Show my windows and tabs from last time" in about:preferences
2. Open only one tab (e.g. about:home)
3. Exit Browser and restart
Actual Results:
Tab crashes
bp-67ced0f8-2e87-4b72-a677-5770f2160728
Expected Results:
Tab should be restored properly
Regression window:
https://hg.mozilla.org/integration/autoland/pushloghtml?fromchange=84b5a1027550faf65534d67dc02372ba09508550&tochange=80ab1089a326e4a35d32cd6f52ed0194eba89ecf
Regressed by: Bug 1261842
|
|
1,292,869 | 11,604,095 |
User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:50.0) Gecko/20100101 Firefox/50.0 SeaMonkey/2.47a1
Build ID: 20160731003204
Steps to reproduce:
Navigate to http://directory.libsyn.com/categories
Wait several seconds. There will be on the page a spinny-thing that everyone knows means wait for something.
Actual results:
Seamonkey crashes. Every time I've tried.
Expected results:
Seamonkey should show the webpage and whatever one is waiting for.
The page that crashes behaves like the main page, directory.libsyn.com , but that doesn't crash.
Crash reports (newest first):
bp-f63d4103-f08d-45db-9726-69a5f2160806
bp-4a24a1e6-3ef4-457c-9274-9662f2160806
bp-eb599c1b-8f38-4695-bfbc-cff152160806
|
|
1,305,035 | 11,732,545 |
This bug was filed from the Socorro interface and is
report bp-b1485431-8530-4162-8db0-78f522160922.
=============================================================
[Affected versions]:
- latest Developer Edition 51.0a2
- latest Nightly 52.0a1
[Affected platforms]:
- Mac OS X 10.10.5
- Mac OS X 10.11.6
- Mac OS X 10.12
[Steps to reproduce]:
1. Start Firefox
2. Visit http://webglsamples.org/WebGL2Samples/
3. Click on texture_etc2_eac demo
[Expected result]:
- Demo is properly displayed
[Actual result]:
- Tab crashes
[Regression range]:
- Don't know if this is a regression, will check ASAP.
[Additional notes]:
- Needinfo-ing me so it stays on my radar for finding regression.
- Other crash reports with similar or same signatures:
bp-b1485431-8530-4162-8db0-78f522160922
bp-3885da3a-55e7-45e4-88e4-b389e2160922
bp-1c4b074a-a420-4586-af80-b610a2160922
bp-d7cc2bb5-f492-4532-9cec-200f12160922
bp-2fba0932-4f7c-4acb-a0d4-ae90e2160922
bp-dcea9c08-decc-45d8-8e32-bedb32160922
bp-26c1a120-4750-4fbb-b598-87b582160922
bp-0e18d58f-f789-46b0-a59d-0b0952160922
bp-71a89134-d766-4a35-86ed-b3e3b2160922
bp-803a816f-e9a3-4665-afef-2394d2160922
bp-d3dd1a35-5cb4-41c6-862a-6a0112160922
bp-0915425f-2103-4d83-b7cc-485652160923
|
|
1,305,208 | 11,734,763 |
Created attachment 8794468
steal.html
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/602.1.50 (KHTML, like Gecko) Version/10.0 Safari/602.1.50
Steps to reproduce:
Reader-mode in Firefox for iOS is hosted on a local web server and readerized web pages can be accessed through following URL.
http://localhost:6571/reader-mode/page?url=https://blog.mozilla.org/security/
This local server runs while in foreground but then background application can access it too.
This means that it can be used for stealing user private web contents from other application.
If you run Firefox for iOS on a Similator on macOS you can reproduce an attack scenario like this.
1) Log in to Github by Firefox for iOS on Simulator
2) Launch terminal application on macOS.
3) Execute "curl http://localhost:6571/reader-mode/page?url=https://github.com/notifications" twice
4) The curl response may contain your private Github notification messages
If you want to reproduce an attack scenario on your device, you need to install an application that implements similar logic to the above.
You can also reproduce it by using "Mercury Browser" application like this.
1) Log in to Facebook on Firefox for iOS
2) Install Mercury Browser on your iOS device
3) Send "steal.html" to your device as an e-mail attachment
4) Open steal.html by Mercury Browser
5) Push the button in steal.html
6) You can see your Facebook contents on Mercury Browser though you've never log in to Facebook on Mercury
The following URL is a video I reproduced these steps on my iPhone.
https://drive.google.com/open?id=0Bw1n4kKdVB6SQklMMEFmRnZVOXc
Actual results:
See above.
Expected results:
Readerized pages should not be accessed from other application.
|
|
1,306,247 | 11,746,508 |
This bug was filed from the Socorro interface and is
report bp-54231df3-0050-4141-8887-bbb452160929.
=============================================================
[Affected versions]:
- Firefox 50.0b2, Firefox 51.0a2 (2016-09-28), Firefox 52.0a1 (2016-09-28)
[Affected platforms]:
- Mac OS X 10.11.6, Mac OS X 10.12.1
[Steps to reproduce]:
Prerequisites: An USB external Mic is plugged in.
1. Go to a communication site that require a microphone (Eg. https://meet.jit.si/) and start a conversation.
2. Select the external Mic when the share microphone pop-up is displayed.
3. After the conversation started, unplug the external Mic.
[Expected result]:
The default Mic from the Mac is enabled.
[Actual result]:
Firefox crashes. The issue is caused by switching to the built in Mic.
[Regression range]:
This is a regression. I will follow up asap.
[Notes]:
- The issue is not reproducible on Mac OS X 10.9, or on Mac OS X 10.10.
- The issue is not reproducible on Firefox 49.0.1.
- Note that the crash is reproducible if the Mic from a webcam is used.
- If a Mic is connected to the Mac with jack, the crash is not reproducible.
|
|
1,307,546 | 11,759,345 |
Caused by bug 1258870, tested by mozregression.
I can reproduce it on Fx50b4 ~ Nightly 52, whatever e10s and 32/64bit.
Steps to reproduce:
Install the https://greasyfork.org/scripts/22441-bilibili-html5%E6%92%AD%E6%94%BE%E5%99%A8 to activating HTML5 mode for bilibili.com. You can turn off it after the first visit.
Open the http://www.bilibili.com/video/av6535800/ (I only found this example).
Click the video to play, wait at least ten seconds, as well as observe the Firefox's process footprint.
Actual results:
Within 10 seconds of the start of the playback, the content process occupies many CPU resources, and the UI stops responding, the memory usage of the content process is growing.
Expected results:
Smooth playback, low CPU and memory usage.
|
|
1,289,001 | 11,571,571 |
This bug was filed from the Socorro interface and is
report bp-1f2056b1-5998-465e-bdc3-46ed22160725.
=============================================================
New crash, first seen in Nightly 20160722030235 and it is the #9 topcrash in that build. It has occurred 36 times across multiple installations, on both Windows and Mac.
In all the crash reports thread 0 is reported as the crashing thread, but the stack trace varies widely across the different crash report and so appears to be unrelated. The processor notes field says 'Signature replaced with an IPC Channel Error, was: "<func>"'.
The full abort message is "Value error: message was deserialized, but contained an illegal value".
I'm not sure how to interpret this one. mrbkap, any ideas from the IPC side? Valentin, any ideas from the Necko side?
|
|
1,302,470 | 11,706,688 |
Created attachment 8790813
screenshot
|
|
1,303,322 | 11,715,143 |
Created attachment 8791952
Client 16-09-16 14-35.crash
Build: 0295d92db2
Device: iPad Pro
iOS: 9.3.5
Steps to reproduce:
1. Open Nightly and tap on the New tab "+" button
2. While tapping on the "+" button, rapidly tap the "x" button on a tab to close it
Actual results:
- Firefox will crash
See video for more information:
https://www.youtube.com/watch?v=6VjBDmgD_rc
|
|
1,304,243 | 11,724,334 |
Steps to reproduce:
1. Go to https://dl.dropboxusercontent.com/u/95157096/85f61cf7/qozqxd7g72.html.
2. Open the <select> element.
Actual results:
The selected value does not appear when open the <select> popup.
Screenshot https://dl.dropboxusercontent.com/u/95157096/85f61cf7/uufncl2zhw.png
|
|
1,152,517 | 10,133,055 |
Created attachment 8589863
Screenshot showing the issue
User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:37.0) Gecko/20100101 Firefox/37.0
Build ID: 20150402191859
Steps to reproduce:
1. Have a contact list that contains multiple people with names starting with "Ma"
2. Compose a new message
3. Click inside the "To:" field (then leave the mouse there)
4. Type "Ma"
5. Several names will appear in a dropdown list, and the first one will already be pre-filled in.
6. The first one is the one I wanted, handy! I guess I'm ready to write my message.
7. I move the mouse down and click inside the body.
Actual results:
In the process of moving the mouse down, another name in the dropdown list may be higlighted, despite the first name still being filled in to the To: field.
Then if you press return or tab, everything's fine, the first name stays selected. But if you CLICK anywhere outside the To: field, it will use the highlighted name from the dropdown field, overwriting the first name that was there before!
Expected results:
It is very counter-intuitive if the field gets filled in with something else than what you last saw there. People may accidently send messages to the wrong person, because they didn't notice it changed. (It has happened multiple times already to a friend of mine.)
Took a while to explain,.. but the screenshot summarizes the problem!
|
|
1,158,467 | 10,198,591 |
User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:25.3) Gecko/20150323 Firefox/31.9 PaleMoon/25.3.1
Build ID: 20150323170640
Steps to reproduce:
Signed AMO add-ons as pushed out today cause issues in some versions of Firefox and derivatives (among other things: crashes of the affected browsers).
This seems to be directly caused by not adhering to the JAR signing specification in XPI files.
http://docs.oracle.com/javase/7/docs/technotes/guides/jar/jar.html#Signature_File
Your supplied .sf files are missing file information as is required by the spec.
They only have a manifest digest in them, and no individual file listings to verify.
|
|
1,129,388 | 9,879,118 |
Created attachment 8559060
Logs with both with and without "strongly typed enum classes"
User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2292.0 Safari/537.36
Steps to reproduce:
1. Run start-shell-msvc2010.bat from MozillaBuild 1.11.0
2. Change directory to /c/mozilla-build/mozilla-beta of Firefox 36b6/36b5 source downloaded from ftp://ftp.mozilla.org/pub/firefox/releases/36.0b6/
3. Run ./mach build
Actual results:
We are working on the Norton Toolbar extension which uses XPCOM C++ for its implementation. While building the Firefox SDK in Visual Studio 2010 SP1 we encountered the below failures.
Due to the usage of "strongly typed enum classes" in dom/media/mediasource/MediaSource.h and dom/media/mediasource/MediaSourceDecoder.h the build fails with the following error.
[1423046191.501, "build_output", {"line": "d:\\mozilla-build\\mozilla-beta\\dom\\media\\mediasource\\MediaSourceDecoder.h(24) : error C2059: syntax error : ';'"}]
[1423046191.505, "build_output", {"line": "d:\\mozilla-build\\mozilla-beta\\dom\\media\\mediasource\\MediaSourceDecoder.h(60) : error C2061: syntax error : identifier 'MSRangeRemovalAction'"}]
[1423046191.51, "build_output", {"line": "d:\\mozilla-build\\mozilla-beta\\dom\\media\\mediasource\\MediaSourceDecoder.h(90) : error C2061: syntax error : identifier 'MSRangeRemovalAction'"}]
[1423046191.515, "build_output", {"line": "d:\\mozilla-build\\mozilla-beta\\obj-i686-pc-mingw32\\dist\\include\\mozilla/dom/Element.h(198) : fatal error C1903: unable to recover from previous error(s); stopping compilation"}]
[1423046191.521, "build_output", {"line": ""}]
I removed the usage of "strongly typed enum classes" and it ended up in throwing the following error.
[1423046875.17, "build_output", {"line": "['c:/Program Files (x86)/BullseyeCoverage/bin/x86_amd64/cl.exe', '-Foservice64_resolver.obj', '-c', '-DUNICODE', '-DAB_CD=en-US', '-DNO_NSPR_10_SUPPORT', '-Ic:/mozilla-build/mozilla-beta/security/sandbox/win/wow_helper', '-I.', '-Ic:/mozilla-build/mozilla-beta/security/sandbox/win/wow_helper/../../', '-Ic:/mozilla-build/mozilla-beta/security/sandbox/win/wow_helper/../../../', '-Ic:/mozilla-build/mozilla-beta/security/sandbox/win/wow_helper/../../chromium/', '-I../../../../dist/include', '-Ic:/mozilla-build/mozilla-beta/obj-i686-pc-mingw32/dist/include/nspr', '-Ic:/mozilla-build/mozilla-beta/obj-i686-pc-mingw32/dist/include/nss', '-MT', '-TP', '-nologo', '-D_HAS_EXCEPTIONS=0', '-W3', '-Gy', '-wd4251', '-wd4244', '-wd4267', '-wd4345', '-wd4351', '-wd4482', '-wd4800', '-wd4819', '-we4553', '-GR-', '-DDEBUG', '-DTRACING', '-Zi', '-O1', '-Oi', '-Oy-', '-Fdgenerated.pdb', 'c:/mozilla-build/mozilla-beta/security/sandbox/chromium/sandbox/win/wow_helper/service64_resolver.cc', '-showIncludes']"}]
[1423046875.191, "build_output", {"line": "Traceback (most recent call last):"}]
[1423046875.192, "build_output", {"line": " File \"c:\\mozilla-build\\python\\Lib\\runpy.py\", line 162, in _run_module_as_main"}]
[1423046875.193, "build_output", {"line": " \"__main__\", fname, loader, pkg_name)"}]
[1423046875.193, "build_output", {"line": " File \"c:\\mozilla-build\\python\\Lib\\runpy.py\", line 72, in _run_code"}]
[1423046875.194, "build_output", {"line": " exec code in run_globals"}]
[1423046875.194, "build_output", {"line": " File \"c:\\mozilla-build\\mozilla-beta\\python\\mozbuild\\mozbuild\\action\\cl.py\", line 122, in <module>"}]
[1423046875.195, "build_output", {"line": " sys.exit(main(sys.argv[1:]))"}]
[1423046875.195, "build_output", {"line": " File \"c:\\mozilla-build\\mozilla-beta\\python\\mozbuild\\mozbuild\\action\\cl.py\", line 119, in main"}]
[1423046875.196, "build_output", {"line": " return InvokeClWithDependencyGeneration(args)"}]
[1423046875.198, "build_output", {"line": " File \"c:\\mozilla-build\\mozilla-beta\\python\\mozbuild\\mozbuild\\action\\cl.py\", line 94, in InvokeClWithDependencyGeneration"}]
[1423046875.199, "build_output", {"line": " p.run()"}]
[1423046875.2, "build_output", {"line": " File \"c:\\mozilla-build\\mozilla-beta\\testing\\mozbase\\mozprocess\\mozprocess\\processhandler.py\", line 670, in run"}]
[1423046875.2, "build_output", {"line": " self.proc = self.Process([self.cmd] + self.args, **args)"}]
[1423046875.201, "build_output", {"line": " File \"c:\\mozilla-build\\mozilla-beta\\testing\\mozbase\\mozprocess\\mozprocess\\processhandler.py\", line 97, in __init__"}]
[1423046875.202, "build_output", {"line": " universal_newlines, startupinfo, creationflags)"}]
[1423046875.202, "build_output", {"line": " File \"c:\\mozilla-build\\python\\Lib\\subprocess.py\", line 710, in __init__"}]
[1423046875.203, "build_output", {"line": " errread, errwrite)"}]
[1423046875.204, "build_output", {"line": " File \"c:\\mozilla-build\\mozilla-beta\\testing\\mozbase\\mozprocess\\mozprocess\\processhandler.py\", line 234, in _execute_child"}]
[1423046875.205, "build_output", {"line": " cwd, startupinfo)"}]
[1423046875.205, "build_output", {"line": " File \"c:\\mozilla-build\\mozilla-beta\\testing\\mozbase\\mozprocess\\mozprocess\\winprocess.py\", line 184, in ErrCheckCreateProcess"}]
[1423046875.206, "build_output", {"line": " ErrCheckBool(result, func, args)"}]
[1423046875.207, "build_output", {"line": " File \"c:\\mozilla-build\\mozilla-beta\\testing\\mozbase\\mozprocess\\mozprocess\\winprocess.py\", line 51, in ErrCheckBool"}]
[1423046875.207, "build_output", {"line": " raise WinError()"}]
[1423046875.208, "build_output", {"line": "WindowsError: [Error 2] The system cannot find the file specified."}]
[1423046875.208, "build_output", {"line": ""}]
[1423046875.211, "build_output", {"line": "In the directory /c/mozilla-build/mozilla-beta/obj-i686-pc-mingw32/security/sandbox/win/wow_helper"}]
[1423046875.212, "build_output", {"line": "The following command failed to execute properly:"}]
Is it expected that VS 2010 SP1 support has been completely stopped for Firefox builds going forward?
Is there any workaround for building Firefox in VS 2010 SP1 without any errors?
I tried using the SDK built from VS2012 in VS 2010 extension but it doesn't work because of incompatible VS versions.
|
|
1,112,822 | 9,706,525 |
This bug was filed from the Socorro interface and is
report bp-c39012c0-8b1c-4864-8230-5b5492141217.
=============================================================
Application Basics
------------------
Name: Firefox
Version: 37.0a1
User Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:37.0) Gecko/20100101 Firefox/37.0
Multiprocess Windows: 1/1
Crash Reports for the Last 3 Days
---------------------------------
Report ID: bp-6192743e-18da-4c69-99c8-c7c982141217
Submitted: 2 minutes ago
Report ID: bp-c39012c0-8b1c-4864-8230-5b5492141217
Submitted: 51 minutes ago
All Crash Reports
Extensions
----------
Graphics
--------
Adapter Description: Mobile Intel(R) HD Graphics
Adapter Drivers: igdumd64 igd10umd64 igd10umd64 igdumdx32 igd10umd32 igd10umd32
Adapter RAM: Unknown
Device ID: 0x0126
Direct2D Enabled: Blocked for your graphics driver version.
DirectWrite Enabled: false (6.2.9200.16571)
Driver Date: 5-19-2011
Driver Version: 8.830.7.0
GPU #2 Active: false
GPU Accelerated Windows: 0/1 Basic (OMTC) Blocked for your graphics driver version.
Subsys ID: 00000000
Vendor ID: 0x8086
WebGL Renderer: Blocked for your graphics driver version.
windowLayerManagerRemote: true
AzureCanvasBackend: skia
AzureContentBackend: cairo
AzureFallbackCanvasBackend: cairo
AzureSkiaAccelerated: 0
STR:
1. https://www.youtube.com/watch?v=-pRHO1psAYY
2. Switch to 2160p
3. The other active tab was playing https://www.youtube.com/watch?v=EOlkWAwbos4
Shortly this I also crashed in a different stack - https://crash-stats.mozilla.com/report/index/571706c5-7236-4bc7-9b51-f66652141217.
Adding bholley and cpearce since looks like they touched code related to the crash stack
|
|
1,279,146 | 11,474,736 |
Created attachment 8761474
UAF_socket_thread.html
Steps to reproduce:
1.Open repro UAF_socket_thread.html in Firefox browser.
2.Firefox crashes at corrupted address in nr_ice_peer_ctx_find_component() in socket thread.
Firefox version: 50.0a1 (2016-06-09)
Exception thrown: read access violation.
pstr was 0x2FE07494.
> xul.dll!nr_ice_peer_ctx_find_component(nr_ice_peer_ctx_ * pctx, nr_ice_media_stream_ * str, int component_id, nr_ice_component_ * * compp) Line 717 C
xul.dll!nr_ice_media_stream_send(nr_ice_peer_ctx_ * pctx, nr_ice_media_stream_ * str, int component, unsigned char * data, int len) Line 734 C
xul.dll!mozilla::NrIceMediaStream::SendPacket(int component_id, const unsigned char * data, unsigned int len) Line 568 C++
xul.dll!mozilla::TransportLayerIce::SendPacket(const unsigned char * data, unsigned int len) Line 172 C++
xul.dll!mozilla::TransportLayerNSPRAdapter::Write(const void * buf, int length) Line 114 C++
xul.dll!mozilla::TransportLayerWrite(PRFileDesc * f, const void * buf, int length) Line 142 C++
xul.dll!mozilla::TransportLayerSend(PRFileDesc * f, const void * buf, int amount, int flags, unsigned int to) Line 234 C++
nss3.dll!ssl_DefSend(sslSocketStr * ss, const unsigned char * buf, int len, int flags) Line 103 C
nss3.dll!ssl3_SendRecord(sslSocketStr * ss, ssl3CipherSpec * cwSpec, SSL3ContentType type, const unsigned char * pIn, int nIn, int flags) Line 3234 C
nss3.dll!SSL3_SendAlert(sslSocketStr * ss, SSL3AlertLevel level, SSL3AlertDescription desc) Line 3528 C
nss3.dll!ssl_SecureClose(sslSocketStr * ss) Line 777 C
nss3.dll!ssl_Close(PRFileDesc * fd) Line 2507 C
nss3.dll!PR_Close(PRFileDesc * fd) Line 104 C
xul.dll!mozilla::TransportLayerDtls::~TransportLayerDtls() Line 374 C++
[External Code]
xul.dll!mozilla::TransportFlow::ClearLayers(std::deque<mozilla::TransportLayer *,std::allocator<mozilla::TransportLayer *> > * layers) Line 58 C++
xul.dll!mozilla::TransportFlow::DestroyFinal(nsAutoPtr<std::deque<mozilla::TransportLayer *,std::allocator<mozilla::TransportLayer *> > > layers) Line 45 C++
xul.dll!mozilla::runnable_args_func<void (__cdecl*)(nsAutoPtr<std::deque<mozilla::TransportLayer *,std::allocator<mozilla::TransportLayer *> > >),nsAutoPtr<std::deque<mozilla::TransportLayer *,std::allocator<mozilla::TransportLayer *> > > >::Run() Line 118 C++
xul.dll!mozilla::TransportFlow::~TransportFlow() Line 39 C++
xul.dll!mozilla::TransportFlow::Release() Line 19 C++
xul.dll!nsProxyReleaseEvent<mozilla::TransportFlow>::Run() Line 33 C++
xul.dll!nsThread::ProcessNextEvent(bool aMayWait, bool * aResult) Line 1029 C++
xul.dll!NS_ProcessNextEvent(nsIThread * aThread, bool aMayWait) Line 290 C++
xul.dll!mozilla::net::nsSocketTransportService::Run() Line 914 C++
xul.dll!nsThread::ProcessNextEvent(bool aMayWait, bool * aResult) Line 1029 C++
xul.dll!NS_ProcessNextEvent(nsIThread * aThread, bool aMayWait) Line 290 C++
xul.dll!mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate * aDelegate) Line 354 C++
xul.dll!MessageLoop::RunHandler() Line 229 C++
xul.dll!MessageLoop::Run() Line 209 C++
xul.dll!nsThread::ThreadFunc(void * aArg) Line 468 C++
nss3.dll!_PR_NativeRunThread(void * arg) Line 419 C
nss3.dll!pr_root(void * arg) Line 95 C
[External Code]
[Frames below may be incorrect and/or missing, no symbols loaded for ucrtbase.dll]
|
|
1,279,171 | 11,474,958 |
This bug was filed from the Socorro interface and is
report bp-c247f6cb-8978-45ec-b5a6-291bc2160608.
=============================================================
Crashing Thread (0)
Frame Module Signature Source
0 mfplat.dll CMFPropertyStore::CreatePropertyStore(CMFPropertyStore**)
1 mfplat.dll LFPoolObjectLockAcquire
2 mfplat.dll MFLfx::CPoolLockT<0, 1>::Lock(int)
3 mfplat.dll MFLfx::CAutoLockT<MFLfx::CPoolLockT<0, 1>, 1>::CAutoLockT<MFLfx::CPoolLockT<0, 1>, 1>(MFLfx::CPoolLockT<0, 1>*)
4 mfplat.dll CWorkQueue::AddThread()
5 mfplat.dll CWorkQueue::Initialize(int, long (*)(CWorkQueueClock*, CCompletionPort**))
6 mfplat.dll CMFPresentationDescriptor::Release()
7 mfplat.dll CPlatform::Initialize(unsigned long, unsigned long)
8 mfplat.dll MFStartup
9 xul.dll mozilla::wmf::MFStartup() dom/media/platforms/wmf/WMFUtils.cpp:217
10 xul.dll mozilla::CanCreateMFTDecoder dom/media/platforms/wmf/WMFDecoderModule.cpp:142
11 xul.dll mozilla::CanCreateWMFDecoder<CLSID_CMSAACDecMFT> dom/media/platforms/wmf/WMFDecoderModule.cpp:162
12 xul.dll mozilla::WMFDecoderModule::SupportsMimeType(nsACString_internal const&) dom/media/platforms/wmf/WMFDecoderModule.cpp:220
13 xul.dll mozilla::HasGMPFor dom/media/platforms/agnostic/gmp/GMPDecoderModule.cpp:105
14 xul.dll mozilla::GMPDecoderModule::UpdateUsableCodecs() dom/media/platforms/agnostic/gmp/GMPDecoderModule.cpp:151
15 nss3.dll PR_Unlock nsprpub/pr/src/threads/combined/prulock.c:328
16 xul.dll nsAppShell::ProcessNextNativeEvent(bool) widget/windows/nsAppShell.cpp:402
this crash is exclusive to windows 7 & occurring on startup in 75% of cases. it has been around for a while on a low level, but judging from early 47.0 data its volume may be on the increase in 47.
in correlation data, a few modules stick out for this signature:
CMFPropertyStore::CreatePropertyStore|EXCEPTION_ACCESS_VIOLATION_READ (26 crashes)
100% (26/26) vs. 1% (126/13230) SortServer2003Compat.dll
100% (26/26) vs. 2% (214/13230) shunimpl.dll
100% (26/26) vs. 2% (290/13230) AcGenral.dll
100% (26/26) vs. 5% (618/13230) AcLayers.dll
100% (26/26) vs. 6% (817/13230) sfc.dll
100% (26/26) vs. 8% (1108/13230) sfc_os.dll
|
|
1,280,105 | 11,483,586 |
This bug was filed from the Socorro interface and is
report bp-eab116fe-b52c-4106-b8dc-e81512160604.
=============================================================
This crash first appeared in Nightly 20160603030242. Since then it has occurred 37 times.
jryans, any ideas?
|
|
1,270,607 | 11,386,220 |
This bug was filed from the Socorro interface and is
report bp-21904d1c-73aa-4ceb-b8f0-38dd82160505.
=============================================================
I hit this crash once when trying to repro DASH.js crash bug 1268694, but there are 15 crash reports. 13 are from Amazon, 1 from imdb.com, and my DASH.js crash.
Curiously, of the 13 Amazon crash reports: 8 are from amazon.de, 3 from amazon.co.uk, and only 1 is from amazon.com. They don't appear to be the same users because each crash report has a different Firefox install time. Is there something different about Amazon's video player outside the US? I don't think this is an artifact of crash report processing for easterly time zones because most of the crash reports are many days old.
List of crash reports including URLs and install times:
https://is.gd/SefnKs
0 XUL mozilla::SamplesWaitingForKey::WaitIfKeyNotUsable(mozilla::MediaRawData*) mfbt/RefPtr.h:261
1 XUL mozilla::EMEDecryptor::Input(mozilla::MediaRawData*) dom/media/platforms/agnostic/eme/EMEDecoderModule.cpp:48
2 XUL nsRunnableMethodImpl<nsresult (mozilla::MediaDataDecoder::*)(mozilla::MediaRawData*), true, RefPtr<mozilla::MediaRawData> >::Run xpcom/glue/nsThreadUtils.h:676
3 XUL mozilla::TaskQueue::Runner::Run() xpcom/threads/TaskQueue.cpp:170
4 XUL nsThreadPool::Run() xpcom/threads/nsThreadPool.cpp:227
5 XUL non-virtual thunk to nsThreadPool::Run() xpcom/threads/nsThreadPool.cpp:154
6 XUL nsThread::ProcessNextEvent(bool, bool*) xpcom/threads/nsThread.cpp:994
7 XUL NS_ProcessNextEvent(nsIThread*, bool) xpcom/glue/nsThreadUtils.cpp:297
8 XUL mozilla::ipc::MessagePumpForNonMainThreads::Run(base::MessagePump::Delegate*) ipc/glue/MessagePump.cpp:355
9 XUL MessageLoop::Run() ipc/chromium/src/base/message_loop.cc:234
10 XUL nsThread::ThreadFunc(void*) xpcom/threads/nsThread.cpp:396
11 libnss3.dylib _pt_root nsprpub/pr/src/pthreads/ptthread.c:216
|
|
1,270,686 | 11,387,121 |
[Tracking Requested - why for this release]:
This bug was filed from the Socorro interface and is
report bp-9e1546a6-57a7-4743-9fe0-9e3062160429.
=============================================================
Both 47.0b1 and 47.0b2 have had significantly more crashes with signature TppTimerpExecuteCallback (see also bug 964351) than other recent beta/release versions.
All of these crashes happen on ATI graphics cards (every single one has vendor ID 0x1002), and they have an interesting distribution of install age (which I believe is time from Firefox install to crash) peaking around 40 seconds, with the oldest being around 100 seconds.
A decent number of individual users have submitted 2 crash reports, although relatively small numbers have submitted more than that. It seems like it may be the sort of crash that is preventing these users from ever starting Firefox, although I'm not sure (I'd have expected slightly more repeat-submission in that case, although that's just intuition).
The dominant OS is Windows 8.1 (at 90.5%), although there are some crashes from Windows 10 (7%) and Windows 8 (2.5%).
The top of the distribution of adapter device IDs is:
Rank Adapter device id Count %
1 0x9851 182 26.07 %
2 0x9834 97 13.90 %
3 0x9853 66 9.46 %
4 0x9830 54 7.74 %
5 0x9832 47 6.73 %
6 0x9838 32 4.58 %
7 0x983d 19 2.72 %
8 0x9839 15 2.15 %
9 0x9850 15 2.15 %
10 0x990b 14 2.01 %
11 0x9809 12 1.72 %
12 0x9852 12 1.72 %
|
|
1,255,732 | 11,238,655 |
[Note]:
- Initially reproduced this crash normally browsing while testing on a Nightly try build on a Child account
https://archive.mozilla.org/pub/firefox/try-builds/[email protected]/
[Affected versions]:
Firefox 44.0.2
Firefox 47.0a1
Firefox 48.0a1
[Affected platforms]:
Windows 8.1
[Steps to reproduce]:
1. Launch Firefox
2. Navigate YouTube and start playing any video (https://www.youtube.com/)
3. Navigate to Yahoo movies and start playing any trailer (https://www.yahoo.com/movies/)
4. Navigate to Vimeo start playing any video and click repeatedly on the Share button (https://vimeo.com/)
[Expected result]:
The tab where the Vimeo video is opened should not crash (on the latest Nightly).
Firefox should not crash (Firefox 44.0.2).
[Actual result]:
The Vimeo tab is crashing with the signatures:
- The 47.0a1 try build provided above crashes with the signature:
https://crash-stats.mozilla.com/report/index/8c47030e-e45f-4954-8128-de6042160310
- The regular nightly 48.0a1 downloaded from (https://archive.mozilla.org/pub/firefox/nightly/latest-mozilla-central/) crashes with the signature:
https://crash-stats.mozilla.com/report/index/294063a9-eb80-4f09-a12a-8b5332160310
- Firefox 44.0.2 crashes with the signature:
https://crash-stats.mozilla.com/report/index/590a21ee-a002-4255-a950-033682160310
[Regression range]:
- According with the Socorro reports the crash is present since Firefox 18 [@ atidxx32.dll@0x742c7] and Firefox 25 [@ atiumdva.dll@0x14137 ]. If a more in depth regression is needed, please let me know.
[Additional notes]:
- the crash is reproducible also on an administrator account.
- the crash is more easy to reproduce on a child account on the latest Nightly.
Graphics
Adapter Description AMD Radeon HD 5450
Adapter Description (GPU #2) Intel(R) HD Graphics 4600
Adapter Drivers aticfx32 aticfx32 aticfx32 atiumdag atidxx32 atiumdva
Adapter Drivers (GPU #2) igdumdim32 igd10iumd32 igd10iumd32
Adapter RAM 1024
Adapter RAM (GPU #2) Unknown
Asynchronous Pan/Zoom wheel input enabled; touch input enabled
Device ID 0x68f9
Device ID (GPU #2) 0x0412
Direct2D Enabled true
DirectWrite Enabled true (6.3.9600.18123)
Driver Date 7-4-2014
Driver Date (GPU #2) 8-4-2015
Driver Version 13.251.9001.1001
Driver Version (GPU #2) 10.18.14.4264
GPU #2 Active false
GPU Accelerated Windows 1/1 Direct3D 11 (OMTC)
Subsys ID 254a1458
Subsys ID (GPU #2) 0000000c
Supports Hardware H264 Decoding Yes
Vendor ID 0x1002
Vendor ID (GPU #2) 0x8086
WebGL Renderer Google Inc. -- ANGLE (AMD Radeon HD 5450 Direct3D11 vs_5_0 ps_5_0)
windowLayerManagerRemote true
AzureCanvasBackend direct2d 1.1
AzureContentBackend direct2d 1.1
AzureFallbackCanvasBackend cairo
AzureSkiaAccelerated 0
|
|
1,255,737 | 11,238,720 |
We are crashing on shutdown for some users due to the async shutdown timeout abort.
That indicates this code can block shutdown for a minute.
A couple example crashes from Nightly:
https://crash-stats.mozilla.com/report/index/2a9ac8f3-5ec8-4266-8923-85e9a2160311
https://crash-stats.mozilla.com/report/index/bea387c7-463c-44c9-b11b-cabdf2160310
I've seen this crash in all the recent versions while investigating bug 1250424.
This is the second most common cause of shutdown aborts (20% of shutdown aborts).
It would be worth fixing this and uplifting a fix, crashing on shutdown after blocking firefox for one minute is not a pleasant experience for our users.
|
|
1,259,236 | 11,272,678 |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_4) AppleWebKit/601.5.17 (KHTML, like Gecko) Version/9.1 Safari/601.5.17
Steps to reproduce:
Using FF 45 (and nightly) and with adapter.js loaded:
1) Request user media (providing gumStream)
2) Create new peer connection (pc)
3) Create new media stream (generatedStream)
4) Run generatedStream.addTrack(gumStream.getTracks()[0])
5) Use pc.addTrack(generatedStream.getTracks()[0], generatedStream)
6) Perform signaling to start peer connection with Chrome (tested with stable)
Actual results:
Once the peer connection is established, Firefox crashes.
Crash report: https://crash-stats.mozilla.com/report/index/bbb92b38-1103-4d32-8115-d96972160323
Only happens from FF to Chrome. FF to FF works. Chrome to FF works.
Expected results:
Expected peer connection to establish and begin flowing the single track.
Why create the intermediary media stream? I was originally experimenting with working around FF requiring the stream parameter in addTrack() by creating one when needed. I did wonder if the intermediate stream was getting garbage collected and causing the issue, but even with keeping a reference I got crashes.
|
|
1,275,062 | 11,430,874 |
As per https://bugzilla.mozilla.org/show_bug.cgi?id=1271102#c9, reporting as a separate entry from bug 1271102, even though the crashing line is same as in that bug.
A deterministic crash on current Nightly on Windows at least, a crash in call stack
mozilla::ipc::ProcessLink::SendMessageW
mozilla::ipc::MessageChannel::Send
mozilla::dom::indexedDB::PBackgroundIDBRequestParent::Send__delete__
mozilla::dom::indexedDB::`anonymous namespace'::NormalTransactionOp::SendSuccessResult
mozilla::dom::indexedDB::`anonymous namespace'::TransactionDatabaseOperationBase::RunOnOwningThread
mozilla::dom::indexedDB::`anonymous namespace'::TransactionDatabaseOperationBase::Run
nsThread::ProcessNextEvent
can occur related to IDB operations on large byte arrays. This is similar to bug 1274075.
Crash reports:
https://crash-stats.mozilla.com/report/index/dde0e9ed-3e6b-43cd-be32-bef4e2160523
https://crash-stats.mozilla.com/report/index/2f3e25be-1ed2-47eb-a11a-455a42160523
https://crash-stats.mozilla.com/report/index/8485b481-c264-4804-8e34-428a22160523
|
|
1,275,339 | 11,434,370 |
This bug was filed from the Socorro interface and is
report bp-ca9ae074-6b5c-42f9-81eb-0080f2160524.
=============================================================
Firefox 46 consistently crashes with SIGSEGV when playing HTML5 video, or sometimes when merely loading HTML5 video elements.
|
|
1,276,488 | 11,446,557 |
This bug was filed from the Socorro interface and is
report bp-81611011-ce24-41f3-b56a-764c32160527.
=============================================================
There are a decent number of these crashes floating around on various versions. They're crashes early in startup, and users sometimes submit a large number of them.
I debugged the minidump for bp-81611011-ce24-41f3-b56a-764c32160527, and the MSVC debugger says we're crashing because gCacheData is null. The MSVC debugger also says sPreferences is null, and sShutdown is false. This suggests that the codepath from AddBoolVarCache calling GetBool calling GetBool calling InitStaticMembers didn't actually work right -- I'm guessing because the do_GetService somehow failed.
The stack in the MSVC debugger isn't any better than in crash-stats. However, Linux crashes like bp-563a3c80-2340-4bda-a49a-81d2d2160525 have a full stack.
Is there something obvious here that might cause the do_GetService to fail?
|
|
1,273,372 | 11,413,373 |
This bug was filed from the Socorro interface and is
report bp-0d607c08-d6fc-4bb8-a49a-97a0d2160515.
=============================================================
We're still seeing a low volume of crashes in mozilla::gmp::GMPChild::ProcessingError.
I can reproduce this crash if I have my Firefox profile dir behind a junction on my D: drive.
i.e.:
mklink /J c:\Users\cpearce\Desktop\d-firefox d:\firefox
# .. unzip a Nightly into ~/Desktop\d-firefox
cd ~/Desktop/d-firefox/firefox/
./firefox --profile profile --no-remote
# Netflix fails with F7702-1003-8053000B error.
Looking in about:crashes, I see this crash report:
https://crash-stats.mozilla.com/report/index/eb2527e0-7466-42c3-b0ce-fb0a82160517
This is similar (or pretty much the same as) bug 1236680.
There's 3 crashes in 48, and one of those was me.
We had twenty-something crashes in 45, and none in 46. Presumably because users who had this in 45 gave up watching Netflix in Firefox.
|
|
305,181 | 2,585,201 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b4) Gecko/20050818 Firefox/1.0+
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b4) Gecko/20050818 Firefox/1.0+
I get a crash when I navigate between my Gmail inbox and another URL.
Both with branch and trunk.
TB8513919M
TB8513834Q
TB8513943M
Reproducible: Always
Steps to Reproduce:
1. Go to Gmail Inbox.
2. Click the toolbar Home button or a bookmark.
3. Click Back (Firefox goes back to inbox)
4. Click Back (nothing happens)
5. Click Back (crash)
Actual Results:
Firefox should go the the first page.
Expected Results:
It crashed.
|
|
300,404 | 2,548,741 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b3) Gecko/20050711 Firefox/1.0+
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b3) Gecko/20050711 Firefox/1.0+
After firefox has downloaded an update it restarts to apply it. I see the
progress bar as it applies the update then this window closes but firefox does
not start.
I can start firefox manually.
This has happened twice out of about eight times I have updated.
Reproducible: Sometimes
Steps to Reproduce:
|
|
300,936 | 2,553,019 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.8) Gecko/20050712 Firefox/1.0.4
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.8) Gecko/20050712 Firefox/1.0.4
mozilla/modules/libpr0n/decoders/xbm/nsXBMDecoder.cpp:
***
nsresult nsXBMDecoder::ProcessData(const char* aData, PRUint32 aCount)
{
[...]
// Check for X11 flavor
if (strstr(mPos, " char "))
mIsX10 = PR_FALSE;
// Check for X10 flavor
else if (strstr(mPos, " short "))
mIsX10 = PR_TRUE;
else
// Neither identifier found. Return for now, waiting for more data.
return NS_OK;
[...]
if (mState == RECV_DATA)
{
PRUint32 bpr;
mFrame->GetImageBytesPerRow(&bpr);
PRUint32 abpr;
mFrame->GetAlphaBytesPerRow(&abpr);
PRBool hiByte = PR_TRUE;
do
{
PRUint32 pixel = strtoul(mPos, &endPtr, 0);
[...]
[1] while (*endPtr && isspace(*endPtr))
endPtr++; // skip whitespace looking for comma
if (*endPtr && (*endPtr != ','))
{
[5] *endPtr = '\0';
mState = RECV_DONE; // strange character (or ending '}')
}
(...)
if (!mIsX10 || !hiByte)
[2] mPos = endPtr; // go to next value only when done with this one
[...]
[3] mPos++;
[4] } while (*mPos && (mState == RECV_DATA));
***
The ProcessData function of the nsXBMDecoder class parse the data of an XBM's
format image.
The bug happens during the re-processing of this image format within the
libpr0n, a module activated by default :
At [1] endPtr is incremented until the null terminating character if it's
fill by ' ' space.
At [2] mPos is set to endPtr if mIsX10 and hiByte are null. There are option
taken from the XBM format's image.
At [3], mPos is incremented without checking if *mPos is null.
Thus the boucle at [4] can not stop depending on the state of the heap.
I found it is possible to craft such an XBM image to put the heap layout in
a predictable state and exploit the bug reliably.
An attacker could execute arbitrary code on mozilla, firefox if a web page is
viewed or even within an e-mail with a IFRAME tag.
Reproducible: Always
Steps to Reproduce:
#0 nsXBMDecoder::ProcessData (this=0x870b2e0,
aData=0x81c3e44 "#define gopher_binary_width 20\n#define
gopher_binary_height 23\nstatic char gopher_binary_bits[] = {\n 0x00, 0x00,
0x00, 0x00
, 0x00, 0x00, 0x00, 0
x00, 0x00, 0x00, 0x00, 0x00,\n 0xff, 0x3f, 0x00, 0x01"..., aCount=254) at
nsXBMDecoder.cpp:142
#1 0x41fc11d9 in nsXBMDecoder::ReadSegCb (aIn=0x8680e2c, aClosure=0x870b2e0,
aFromRawSegment=0x81c3e44 "#define gopher_binary_width 20\n#define
gopher_binary_height 23\nstatic char gopher_binary_bits[] = {\n 0x00, 0x00,
0x00, 0x00, 0x00, 0x0
0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n 0xff, 0x3f, 0x00, 0x01"...,
aToOffset=0, aCount=254, aWriteCount=0xbfffe844) at nsXBMDecoder.cpp:129
#2 0x401942a2 in nsPipeInputStream::ReadSegments (this=0x8680e2c,
writer=0x41fc11a0 <nsXBMDecoder::ReadSegCb(nsIInputStream*, void*, char
const*, unsigned int, unsigned int, unsigned int*)>, closure=0x870b2e0, c
ount=254,
readCount=0xbfffe8c8) at nsPipe3.cpp:761
#3 0x41fc1223 in nsXBMDecoder::WriteFrom (this=0x870b2e0, aInStr=0x8680e2c,
aCount=254, aRetval=0xbfffe8c8) at nsXBMDecoder.cpp:134
#4 0x41fadc8f in imgRequest::OnDataAvailable (this=0x87e60d8,
aRequest=0x8798458, ctxt=0x0, inStr=0x8680e2c, sourceOffset=0, count=254) at
imgReques
t.cpp:796
#5 0x41fa5f50 in ProxyListener::OnDataAvailable (this=0x8285b98,
aRequest=0x8798458, ctxt=0x0, inStr=0x8680e2c, sourceOffset=0, count=254) at imgLoa
der.cpp:862
#6 0x41ca0b8b in nsMediaDocumentStreamListener::OnDataAvailable
(this=0x871a678, request=0x8798458, ctxt=0x0, inStr=0x8680e2c, sourceOffset=0, count
=254)
at nsMediaDocument.cpp:114
#7 0x415e7688 in nsDocumentOpenInfo::OnDataAvailable (this=0x873e740,
request=0x8798458, aCtxt=0x0, inStr=0x8680e2c, sourceOffset=0, count=254) at n
sURILoader.cpp:344
#8 0x40bb6933 in nsFileChannel::OnDataAvailable (this=0x8798458, req=0x8748a20,
ctx=0x0, stream=0x8680e2c, offset=0, count=254) at nsFileChannel.cpp
:594
#9 0x40b2d258 in nsInputStreamPump::OnStateTransfer (this=0x8748a20) at
nsInputStreamPump.cpp:433
#10 0x40b2ce88 in nsInputStreamPump::OnInputStreamReady (this=0x8748a20,
stream=0x8680e2c) at nsInputStreamPump.cpp:336
#11 0x401983f7 in nsInputStreamReadyEvent::EventHandler (plevent=0x86cadf4) at
nsStreamUtils.cpp:118
#12 0x401bbf9b in PL_HandleEvent (self=0x86cadf4) at plevent.c:673
#13 0x401bbe50 in PL_ProcessPendingEvents (self=0x80d0fd0) at plevent.c:608
#14 0x401bf14a in nsEventQueueImpl::ProcessPendingEvents (this=0x80d0ad8) at
nsEventQueue.cpp:398
#15 0x409591d0 in event_processor_callback (data=0x80d0ad8, source=4,
condition=GDK_INPUT_READ) at nsAppShell.cpp:186
#16 0x40958b7d in our_gdk_io_invoke (source=0x8211540, condition=G_IO_IN,
data=0x8210f50) at nsAppShell.cpp:71
#17 0x404284c6 in g_io_add_watch () from /usr/lib/libglib-1.2.so.0
#18 0x40429dd8 in g_get_current_time () from /usr/lib/libglib-1.2.so.0
#19 0x4042a2c1 in g_get_current_time () from /usr/lib/libglib-1.2.so.0
#20 0x4042a5e5 in g_main_run () from /usr/lib/libglib-1.2.so.0
#21 0x4033525f in gtk_main () from /usr/lib/libgtk-1.2.so.0
#22 0x4095961a in nsAppShell::Run (this=0x80d6c48) at nsAppShell.cpp:317
#23 0x408cf8ea in nsAppShellService::Run (this=0x80d56e0) at
nsAppShellService.cpp:494
#24 0x0805e5cd in xre_main (argc=1, argv=0xbffff484, aAppData=0x807500c) at
nsAppRunner.cpp:1907
#25 0x0805851c in main (argc=1, argv=0xbffff484) at nsBrowserApp.cpp:58
------------------
#define gopher_binary_width 20
#define gopher_binary_height 23
static char gopher_binary_bits[] = {
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0xff, 0x3f, 0x00, 0x01, 0x60, 0x00, 0x01, 0xa0, 0x00, 0x71, 0x26, 0x01 EOF
As you can see, the image end with a space character, when the program assume
the image to be clean and contain end tag.
Thus, if one is able to control the heap layout, it is possible to execute
arbitrary code.
Here is some details on how to exploit the bug on Linux :
- Use a javascript and allocate a lot of 'local' buffer. I found JC_GC is called
at the end of the javascript parsing, before any image are loaded, and will free
all 'useless' (because local) buffer.
Thus, it is easy to 1) Allocate in some global array a lot of *little bufer* to
begin, so we have the heap layout in a predictable state (no hole).
2) Allocate a few big buffer with isdigit()-valid character. Because there is no
more heap hole, the 'top chunk' of the heap is expended.
3) When JC_GC return, some memory have been freed, and thus, following
allocation will fall in these new heap hole.
4) When the image is processed, the overflowed buffer will be followed by
isdigit-character (this is junk in the prev_size field of the next struct
malloc_chunk). Then a '\0' will be written on the LSB of the 'next size' field
of the next struct malloc_chunk on the heap.
Because it is easily possible to inject controlled character on the heap
(actually that could have been done in the "few isdigit()-valid buffer"), it is
possible to store fake information on the heap, and tricks malloc()/free()/etc
to parse them.
Still in the scheme of Doug Lea malloc (linux), this will end by triggering the
macro UNLINK(), which basically insert a heap chunk in a linked list, thus,
writing a controlled pointer of us, to a controlled address of us.
One can simply overwrite any function pointer, like GOT entry, saved %eip
pointer on the stack, and hijack it to point to some injected shellcode.
Exploitation is possible on *BSD / Windows aswell.
Actual Results:
Ability to execute whatever code you want.
Expected Results:
Stop me.
|
|
309,777 | 2,620,035 |
STEPS TO REPRODUCE:
1) Download the stuff in bug 309467 and follow the steps there to reproduce it.
2) Use the file I'm about to attach as the data file.
ACTUAL RESULTS:
Double-delete, with the following stack (gotten via MALLOC_CHECK_=2):
#0 0x00a127a2 in _dl_sysinfo_int80 () from /lib/ld-linux.so.2
#1 0xb7c5f7d5 in raise () from /lib/tls/libc.so.6
#2 0xb7c61149 in abort () from /lib/tls/libc.so.6
#3 0xb7c9e4b5 in free_check () from /lib/tls/libc.so.6
#4 0xb7c99de5 in free () from /lib/tls/libc.so.6
#5 0x00ac2cd3 in operator delete () from /usr/lib/libstdc++.so.5
#6 0xb5c34ca2 in ~CNavDTD (this=0x89a3ea0)
at ../../../../mozilla/parser/htmlparser/src/CNavDTD.cpp:250
#7 0xb5c3454d in CNavDTD::Release (this=0x89a3ea0)
at ../../../../mozilla/parser/htmlparser/src/CNavDTD.cpp:162
#8 0xb5c4db02 in CParserContext::~CParserContext ()
at ../../../../mozilla/parser/htmlparser/src/nsScanner.cpp:54
#9 0xb5c44306 in ~nsParser (this=0x89989c8)
at ../../../../mozilla/parser/htmlparser/src/nsParser.cpp:413
#10 0xb5c44623 in nsParser::Release (this=0x89989c8)
at ../../../../mozilla/parser/htmlparser/src/nsParser.cpp:423
#11 0xb5ac63de in nsCOMPtr<nsIStreamListener>::~nsCOMPtr ()
at ../../dist/include/necko/nsIRequestObserver.h:34
#12 0xb5ac3a9b in nsDocumentOpenInfo::OnStopRequest (this=0x8951200,
request=0x8950930,
aCtxt=0x0, aStatus=0) at ../../../mozilla/uriloader/base/nsURILoader.cpp:389
#13 0xb7759134 in nsFileChannel::OnStopRequest (this=0x8950900, req=0x8951488,
ctx=0x0,
status=0) at
../../../../../mozilla/netwerk/protocol/file/src/nsFileChannel.cpp:548
#14 0xb76c9ede in nsInputStreamPump::OnStateStop (this=0x8951488)
at ../../../../mozilla/netwerk/base/src/nsInputStreamPump.cpp:506
#15 0xb76c97f5 in nsInputStreamPump::OnInputStreamReady (this=0x8951488,
stream=0x8951244) at
../../../../mozilla/netwerk/base/src/nsInputStreamPump.cpp:343
#16 0xb7f72695 in nsInputStreamReadyEvent::EventHandler (plevent=0x89515d4)
at ../../../mozilla/xpcom/io/nsStreamUtils.cpp:119
#17 0xb7f96a30 in PL_HandleEvent (self=0x89515d4)
at ../../../mozilla/xpcom/threads/plevent.c:688
#18 0xb7f968d1 in PL_ProcessPendingEvents (self=0x81fef10)
at ../../../mozilla/xpcom/threads/plevent.c:623
#19 0xb7f99dea in nsEventQueueImpl::ProcessPendingEvents (this=0x81feec8)
at ../../../mozilla/xpcom/threads/nsEventQueue.cpp:419
|
|
309,897 | 2,620,942 |
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8b4) Gecko/20050908 Firefox/1.4
Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8b4) Gecko/20050908 Firefox/1.4
If you use E4X in a long running script, the browser doesn't pop up an alert
that it is "running slowly" - it just crashes.
Reproducible: Always
Steps to Reproduce:
click on stress test in test file
|
|
310,426 | 2,639,875 |
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20050928
Firefox/1.6a1
Steps to reproduce:
1. Load the testcase.
2. Close the tab, close the window, or reload.
Result: Crash [@ DoDeletingFrameSubtree]. TB9854206G.
I think this crash is exploitable. (I know there is *an* exploitable crash [@
DoDeletingFrameSubtree], but I'm not sure *this* crash is exploitable.)
I can't reproduce this crash on the Gecko 1.8 branch.
|
|
306,788 | 2,598,183 |
BUILD: Current trunk debug build
STEPS TO REPRODUCE:
1) Load http://www.cloud9sales.com/test/raining_NSMozFail.htm
2) Click the "All Products" link
NOTE: What the page is doing is:
prodRainTapThr[0] = new
Array("Airedale","","ATPAIR.jpg",125,151,"Multi","RcP","$59.95",339);
...
prodRainTapThr[58] = new
Array("Yorkie","","ATPYOR.jpg",150,114,"Multi","RcL","$59.95",396);
prodRainTapThr.sort();
We crash inside Array.sort like so:
(gdb) frame 0
#0 0xb7e6fb09 in js_CompareStrings (str1=0xb32460e0, str2=0x83ae120)
at ../../../mozilla/js/src/jsstr.c:2800
2800 s1 = JSSTRING_CHARS(str1), s2 = JSSTRING_CHARS(str2);
(gdb) p *str1
$9 = {length = 3671775962, chars = 0xdadadada}
The problem is the code at
http://bonsai.mozilla.org/cvsblame.cgi?file=mozilla/js/src/jsarray.c&rev=3.60&mark=816,817#812
-- astr can get GCed when we create bstr. I've verified that if I lock astr
around the creation of bstr the crash goes away.
|
|
307,259 | 2,602,019 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.8) Gecko/20050416 Epiphany/1.2.8
Build Identifier:
I have found a format string vulnerability within Firefox 1.0.6 which allows for
arbitrary code execution.
Affect Versions:
Firefox Linux 1.0.6
Firefox Win32 1.0.6
Deer Park Latest Build
Below is a url to reproduce this issue:
http://www.security-protocols.com/firefoxwin32-death.html
If you need any further information, please let me know.
Thanks,
Tom Ferris
Researcher
www.security-protocols.com
Key fingerprint = 0DFA 6275 BA05 0380 DD91 34AD C909 A338 D1AF 5D78
Reproducible: Always
Steps to Reproduce:
|
|
307,662 | 2,604,843 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6
checksetup fails when upgrading my 2.18.3 db to 2.20rc2+ (BUGZILLA-2_20-BRANCH)
...# ./checksetup.pl
Checking perl modules ...
Checking for AppConfig (v1.52) ok: found v1.56
Checking for CGI (v2.93) ok: found v3.04
Checking for Data::Dumper (any) ok: found v2.121
Checking for Date::Format (v2.21) ok: found v2.22
Checking for DBI (v1.38) ok: found v1.46
Checking for File::Spec (v0.84) ok: found v0.87
Checking for File::Temp (any) ok: found v0.14
Checking for Template (v2.08) ok: found v2.14
Checking for Text::Wrap (v2001.0131) ok: found v2001.09291
Checking for Mail::Mailer (v1.65) ok: found v1.67
Checking for Storable (any) ok: found v2.12
The following Perl modules are optional:
Checking for GD (v1.20) ok: found v2.23
Checking for Chart::Base (v1.0) ok: found v2.3
Checking for XML::Parser (any) ok: found v2.34
Checking for GD::Graph (any) ok: found v1.43
Checking for GD::Text::Align (any) ok: found v1.18
Checking for PatchReader (v0.9.4) ok: found v0.9.5
Checking user setup ...
Removing existing compiled templates ...
Precompiling templates ...
Checking for DBD::mysql (v2.9003) ok: found v2.9006
Checking for MySQL (v3.23.41) ok: found v4.1.11-Debian_4sarge1-log
Checking for Net::LDAP (any) ok: found v0.32
Checking for GraphViz (any) ok: found
Renaming indexes...
Removing index 'creator_2' from the series table...
Renaming index bug_id to attachments_bug_id_idx...
Renaming index creation_ts to attachments_creation_ts_idx...
Renaming index bug_id to bug_group_map_bug_id_idx...
Renaming index group_id to bug_group_map_group_id_idx...
Renaming index priority to bugs_priority_idx...
Renaming index reporter to bugs_reporter_idx...
Renaming index product_id to bugs_product_id_idx...
Renaming index creation_ts to bugs_creation_ts_idx...
Renaming index assigned_to to bugs_assigned_to_idx...
Renaming index qa_contact to bugs_qa_contact_idx...
Renaming index short_desc to bugs_short_desc_idx...
Renaming index votes to bugs_votes_idx...
Renaming index bug_severity to bugs_bug_severity_idx...
Renaming index bug_status to bugs_bug_status_idx...
Renaming index delta_ts to bugs_delta_ts_idx...
Renaming index version to bugs_version_idx...
Renaming index component_id to bugs_component_id_idx...
Renaming index resolution to bugs_resolution_idx...
Renaming index target_milestone to bugs_target_milestone_idx...
Renaming index alias to bugs_alias_idx...
Renaming index op_sys to bugs_op_sys_idx...
Renaming index bug_id to bugs_activity_bug_id_idx...
Renaming index bug_when to bugs_activity_bug_when_idx...
Renaming index fieldid to bugs_activity_fieldid_idx...
Renaming index category_id to category_group_map_category_id_idx...
Renaming index bug_id to cc_bug_id_idx...
Renaming index who to cc_who_idx...
Renaming index product_id to components_product_id_idx...
Renaming index name to components_name_idx...
Renaming index blocked to dependencies_blocked_idx...
Renaming index dependson to dependencies_dependson_idx...
Renaming index sortkey to fielddefs_sortkey_idx...
Renaming index name to fielddefs_name_idx...
Renaming index type_id to flagexclusions_type_id_idx...
Renaming index type_id to flaginclusions_type_id_idx...
Renaming index bug_id to flags_bug_id_idx...
Renaming index setter_id to flags_setter_id_idx...
Renaming index requestee_id to flags_requestee_id_idx...
Renaming index product_id to group_control_map_product_id_idx...
Renaming index group_id to group_control_map_group_id_idx...
Renaming index member_id to group_group_map_member_id_idx...
Renaming index name to groups_name_idx...
Renaming index name to keyworddefs_name_idx...
Renaming index keywordid to keywords_keywordid_idx...
Renaming index bug_id to keywords_bug_id_idx...
Renaming index lastused to logincookies_lastused_idx...
Renaming index bug_id to longdescs_bug_id_idx...
Renaming index bug_when to longdescs_bug_when_idx...
Renaming index who to longdescs_who_idx...
Renaming index thetext to longdescs_thetext_idx...
Renaming index product_id to milestones_product_id_idx...
Renaming index userid to namedqueries_userid_idx...
Renaming index name to products_name_idx...
Renaming index login_name to profiles_login_name_idx...
Renaming index userid to profiles_activity_userid_idx...
Renaming index profiles_when to profiles_activity_profiles_when_idx...
Renaming index fieldid to profiles_activity_fieldid_idx...
Renaming index creator to series_creator_idx...
Renaming index name to series_categories_name_idx...
Renaming index series_id to series_data_series_id_idx...
Renaming index userid to tokens_userid_idx...
Renaming index user_id to user_group_map_user_id_idx...
Renaming index bug_id to votes_bug_id_idx...
Renaming index who to votes_who_idx...
Renaming index watcher to watch_watcher_idx...
Renaming index watched to watch_watched_idx...
Updating column public in table series ...
New: tinyint NOT NULL DEFAULT 0
Updating column isactive in table bug_status ...
New: tinyint NOT NULL DEFAULT 1
Updating column isactive in table rep_platform ...
New: tinyint NOT NULL DEFAULT 1
Updating column isactive in table resolution ...
New: tinyint NOT NULL DEFAULT 1
Updating column isactive in table op_sys ...
New: tinyint NOT NULL DEFAULT 1
Updating column isactive in table bug_severity ...
New: tinyint NOT NULL DEFAULT 1
Updating column isactive in table priority ...
New: tinyint NOT NULL DEFAULT 1
Updating column approved in table quips ...
New: tinyint NOT NULL DEFAULT 1
Adding group editclassifications ...
Adding group bz_canusewhines ...
Adding group bz_canusewhineatothers ...
DBD::mysql::db selectrow_array failed: Unknown column 'grant_type' in 'where
clause' [for Statement "SELECT 1 FROM group_group_map
WHERE member_id = ? AND grantor_id = ? AND grant_type = ?"] at
./checksetup.pl line 4067
Reproducible: Always
Steps to Reproduce:
|
|
299,547 | 2,542,052 |
XUL Error Pages should work well even if fastback is enabled. I'm not sure what
the state is currently.
|
|
302,536 | 2,565,360 |
User-Agent: Mozilla/5.0 (Windows; U; Win95; en-US; rv:1.8b4) Gecko/20050727 SeaMonkey/1.0a
Build Identifier: Mozilla/5.0 (Windows; U; Win95; en-US; rv:1.8b4) Gecko/20050727 SeaMonkey/1.0a
Every day my dad would go to www.vdab.be to look for job offers. Almost every
day SeaMonkey would crash during his visit. The visit is such a routine that he
doesn't know what he did prior to the crash. Today I noticed it crashing when
printing a page on the site. I could reproduce it. Printing Google works fine,
though. Yet when I was initially typing this bug report, SeaMonkey also crashed
by having the site in a tab.
I've included TalkBack IDs. There are a lot of them.
Reproducible: Always
Steps to Reproduce:
1. Go to http://www.vdab.be/
2. Click "Werk Zoeken"
3. Choose selections from the pulldown menus
4. Click "Zoeken"
5. Click "Toon Jobs"
6. Click on one of the offers
7. Print the page
Actual Results:
SeaMonkey will crash a few seconds after sending the commands to the printer driver.
Expected Results:
Not have crashed.
TB7353636Z
TB7426469Y
TB7503541E
TB7812815M
TB7885445H
TB7886042W
TB7889075K
TB7889605X
|
|
303,336 | 2,571,524 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8b4) Gecko/20050725 MultiZilla/1.8.0.1h SeaMonkey/1.0a
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8b4) Gecko/20050726 MultiZilla/1.8.0.1h SeaMonkey/1.0a
When I try to open an attached message that was forwarded to me as an
attachment, the SeaMonkey application stops responding and eventually crashes.
If there were more attached messages the application crashes quicker. The
problem started to appear in SeaMonkey 2005-07-26 and appears till current
nightly (2005-08-03-06-trunk). The problem is not in SeaMonkey 2005-07-25 and
prior versions. I am on Windows 2000 and I am getting my email through IMAP on
Microsoft Exchange.
Reproducible: Always
Steps to Reproduce:
1. Forward a message as an attachment to myself or let somebody send it to you.
2. Try to open that attached message.
3. SeaMonkey crashes.
Actual Results:
Crash
Expected Results:
Open the attached message.
No talkback appeared, no errors, nothing, the SeaMonkey application just
disappeared.
|
|
303,901 | 2,575,310 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8b3) Gecko/20050712 Firefox/1.0+
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8b3) Gecko/20050712 Firefox/1.0+
When accessing a malformed .html page, Deer Park 2 will segfault. I have
attached the malformed .html file for your review. This only seems to affect
the Linux version of Deer Park 2.
Thanks,
--
Tom Ferris
Researcher
www.security-protocols.com
Key fingerprint = 0DFA 6275 BA05 0380 DD91 34AD C909 A338 D1AF 5D78
Reproducible: Always
Steps to Reproduce:
1. Browse to the malformed .html via a webserver.
Actual Results:
Deer Park 2 will segfault.
Expected Results:
Should properly parse the .html page.
|
|
307,989 | 2,606,960 |
Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.9a1) Gecko/20050910
Firefox/1.6a1
Steps to reproduce:
1. Open the very evil testcase.
2. Select some text and start dragging it. (You can use the keyboard to select
all before dragging with the mouse.)
3. Wait until the page changes.
4. Drop.
Result: More often than not, the browser crashes [@ nsIView::GetViewFor] [@
GetWrapperFor]. The top of the stack is a random address. I'm pretty sure this
is exploitable.
TB9234593K, TB9234571Z
Please keep this security-sensitive until a Firefox release with this fix has
gone out and both bug 306663 and bug 306939 have become public.
|
|
308,085 | 2,607,668 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.10) Gecko/20050825 Firefox/1.0.4 (Debian package 1.0.4-2sarge3)
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8b4) Gecko/20050908 Firefox/1.4
The attached html file, when run, first puts up an alert box showing 43 (which
is correct) but then, instead of putting up an alert showing CORRECT, it puts
up one showing BUG. This indicates that the big switch statement, which has
cases for 0 through 244 as well as default, is going to the wrong place.
Note, as should be clear, the JavaScript code is machine generated. It doesn't
take much of a change to cause the bug to go away (or atleast hide).
I marked this bug critical because clearly the JavaScript could do any thing,
including causing data to be lost.
Reproducible: Always
Steps to Reproduce:
1. load the html file
2. click ok on the first alert (showing 43)
3. observe the alert showing BUG
Actual Results:
You see the BUG alert
Expected Results:
You should see the CORRECT alert
|
|
308,706 | 2,612,098 |
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6
Build Identifier: Firefox 1.5 Beta Mac OSX see below for specifics
Apple Crash Info below:
Machine Model: Power Mac G5
CPU Type: PowerPC G5 (3.0)
Number Of CPUs: 2
CPU Speed: 2.5 GHz
L2 Cache (per CPU): 512 KB
Memory: 2.5 GB
Bus Speed: 1.25 GHz
Boot ROM Version: 5.1.8f7
Date/Time: 2005-09-15 11:28:07 -0700
OS Version: 10.3.9 (Build 7W98)
Report Version: 2
Command: firefox-bin
Path: /Applications/Firefox 1.5ß.app/Contents/MacOS/firefox-bin
Version: 1.4 (1.4)
PID: 706
Thread: 0
Exception: EXC_BAD_ACCESS (0x0001)
Codes: KERN_PROTECTION_FAILURE (0x0002) at 0x00000000
Thread 0 Crashed:
0 firefox-bin 0x002125dc
_ZN14nsContentUtils14SplitExpatNameEPKtPP7nsIAtomS4_Pi + 0xa8
1 firefox-bin 0x00517618
_ZN18XULContentSinkImpl18HandleStartElementEPKtPS1_jij + 0x8c
2 firefox-bin 0x00518200 _ZN18XULContentSinkImpl11ReportErrorEPKtS1_
+ 0x1b8
3 firefox-bin 0x0065d8c8 _ZN13nsExpatDriver11HandleErrorEv + 0x404
4 firefox-bin 0x0065db34 _ZN13nsExpatDriver11ParseBufferEPKcji + 0x220
5 firefox-bin 0x002a2f0c _ZN8nsParser11DidTokenizeEi + 0x88
6 firefox-bin 0x002a2e58 _ZN8nsParser8TokenizeEi + 0x188
7 firefox-bin 0x002a183c _ZN8nsParser11ResumeParseEiii + 0x10c
8 firefox-bin 0x002a2abc
_ZN8nsParser13OnStopRequestEP10nsIRequestP11nsISupportsj + 0x50
9 firefox-bin 0x004558ec
_ZN12nsJARChannel13OnStopRequestEP10nsIRequestP11nsISupportsj + 0x54
10 firefox-bin 0x004121e8 _ZN17nsInputStreamPump11OnStateStopEv + 0xa0
11 firefox-bin 0x00411d70
_ZN17nsInputStreamPump18OnInputStreamReadyEP19nsIAsyncInputStream + 0x80
12 libxpcom_core.dylib 0x10080ec4 0x10000000 + 0x80ec4
13 libxpcom_core.dylib 0x10045ca4 PL_HandleEvent + 0x24
14 libxpcom_core.dylib 0x10045bc8 PL_ProcessPendingEvents + 0x80
15 libxpcom_core.dylib 0x10047310
_ZN16nsEventQueueImpl20ProcessPendingEventsEv + 0x3c
16 libxpcom_core.dylib 0x1000793c NS_ShutdownXPCOM_P + 0x17c
17 firefox-bin 0x00010090 _ZN18ScopedXPCOMStartupD4Ev + 0x3c
18 firefox-bin 0x000143f0 XRE_main + 0xf88
19 firefox-bin 0x0000f6a8 start + 0x1b0
20 firefox-bin 0x0000f528 start + 0x30
Thread 1:
0 libSystem.B.dylib 0x90018e18 semaphore_timedwait_signal_trap + 0x8
1 libSystem.B.dylib 0x9000e9d4 _pthread_cond_wait + 0x268
2 libnspr4.dylib 0x03017c68 PR_Unlock + 0x12c
3 libnspr4.dylib 0x03017ecc PR_WaitCondVar + 0x88
4 libxpcom_core.dylib 0x1004b4b0 _ZN11TimerThread3RunEv + 0x19c
5 libxpcom_core.dylib 0x100488c4 _ZN8nsThread4MainEPv + 0x38
6 libnspr4.dylib 0x0301cd80 PR_Select + 0x354
7 libSystem.B.dylib 0x90024910 _pthread_body + 0x28
PPC Thread State:
srr0: 0x002125dc srr1: 0x0200f030 vrsave: 0x00000000
cr: 0x42024262 xer: 0x00000000 lr: 0x00517618 ctr: 0x10001f24
r0: 0x00000034 r1: 0xbffff010 r2: 0x1008a3b8 r3: 0x00000000
r4: 0xbffff050 r5: 0xbffff180 r6: 0xbffff180 r7: 0xffffffff
r8: 0x00000000 r9: 0x019cc030 r10: 0x01a0197f r11: 0x019cbfc8
r12: 0x10001f24 r13: 0x009f0000 r14: 0xbffffd6c r15: 0x00000000
r16: 0x00000001 r17: 0xbffffc40 r18: 0xbffffc30 r19: 0xbffff490
r20: 0xbffff4a8 r21: 0x00000000 r22: 0xbffff150 r23: 0x1008b4e8
r24: 0xbffff140 r25: 0x009f0000 r26: 0xbffff140 r27: 0x00000000
r28: 0xbffff050 r29: 0x019cc048 r30: 0x00000000 r31: 0x019cc032
Binary Images Description:
0x1000 - 0x9c9fff firefox-bin /Applications/Firefox
1.5ß.app/Contents/MacOS/firefox-bin
0xfbd000 - 0xfd0fff libjsd.dylib /Applications/Firefox
1.5ß.app/Contents/MacOS/components/libjsd.dylib
0x1845000 - 0x1878fff libxpinstall.dylib /Applications/Firefox
1.5ß.app/Contents/MacOS/components/libxpinstall.dylib
0x2878000 - 0x287afff com.apple.textencoding.unicode 1.6.4
/System/Library/TextEncodings/Unicode Encodings.bundle/Contents/MacOS/Unicode
Encodings
0x3000000 - 0x3032fff libnspr4.dylib /Applications/Firefox
1.5ß.app/Contents/MacOS/libnspr4.dylib
0x4000000 - 0x400dfff libplds4.dylib /Applications/Firefox
1.5ß.app/Contents/MacOS/libplds4.dylib
0x5000000 - 0x500efff libplc4.dylib /Applications/Firefox
1.5ß.app/Contents/MacOS/libplc4.dylib
0x6000000 - 0x6082fff libmozjs.dylib /Applications/Firefox
1.5ß.app/Contents/MacOS/libmozjs.dylib
0x7000000 - 0x7000fff libxpcom.dylib /Applications/Firefox
1.5ß.app/Contents/MacOS/libxpcom.dylib
0x8000000 - 0x801bfff libssl3.dylib /Applications/Firefox
1.5ß.app/Contents/MacOS/libssl3.dylib
0x9000000 - 0x905ffff libnss3.dylib /Applications/Firefox
1.5ß.app/Contents/MacOS/libnss3.dylib
0xa000000 - 0xa01dfff libsmime3.dylib /Applications/Firefox
1.5ß.app/Contents/MacOS/libsmime3.dylib
0xb000000 - 0xb07afff libsoftokn3.dylib /Applications/Firefox
1.5ß.app/Contents/MacOS/libsoftokn3.dylib
0xc000000 - 0xc018fff libxpcom_compat.dylib /Applications/Firefox
1.5ß.app/Contents/MacOS/libxpcom_compat.dylib
0x10000000 - 0x10084fff libxpcom_core.dylib /Applications/Firefox
1.5ß.app/Contents/MacOS/libxpcom_core.dylib
0x80830000 - 0x8090efff libxml2.2.dylib /usr/lib/libxml2.2.dylib
0x84372000 - 0x84382fff com.apple.Accelerate.vecLib 3.0.3 (vecLib 3.0.3)
/System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vecLib.framework/Versions/A/vecLib
0x88100000 - 0x88236fff com.apple.vImage 1.2.0
/System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vImage.framework/Versions/A/vImage
0x8fd50000 - 0x8fd50fff com.apple.Accelerate 1.0.3 (Accelerate 1.0.3)
/System/Library/Frameworks/Accelerate.framework/Versions/A/Accelerate
0x8fe00000 - 0x8fe4ffff dyld /usr/lib/dyld
0x90000000 - 0x9014ffff libSystem.B.dylib /usr/lib/libSystem.B.dylib
0x901c0000 - 0x9026dfff com.apple.CoreFoundation 6.3.8 (299.36)
/System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation
0x902b0000 - 0x90529fff com.apple.CoreServices.CarbonCore 10.3.7
/System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/CarbonCore.framework/Versions/A/CarbonCore
0x90584000 - 0x905f3fff com.apple.framework.IOKit 1.3.6 (???)
/System/Library/Frameworks/IOKit.framework/Versions/A/IOKit
0x90610000 - 0x9069afff com.apple.CoreServices.OSServices 3.0.1
/System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/OSServices.framework/Versions/A/OSServices
0x90700000 - 0x90700fff com.apple.CoreServices 10.3 (???)
/System/Library/Frameworks/CoreServices.framework/Versions/A/CoreServices
0x907f0000 - 0x907f9fff com.apple.DiskArbitration 2.0.5
/System/Library/PrivateFrameworks/DiskArbitration.framework/Versions/A/DiskArbitration
0x90810000 - 0x90810fff com.apple.ApplicationServices 1.0 (???)
/System/Library/Frameworks/ApplicationServices.framework/Versions/A/ApplicationServices
0x90830000 - 0x9089ffff libobjc.A.dylib /usr/lib/libobjc.A.dylib
0x908c5000 - 0x90915fff com.apple.HIServices 1.4.1 (0.0.1d1)
/System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/HIServices.framework/Versions/A/HIServices
0x90940000 - 0x909b3fff com.apple.DesktopServices 1.2.5
/System/Library/PrivateFrameworks/DesktopServicesPriv.framework/Versions/A/DesktopServicesPriv
0x909f0000 - 0x90a04fff libCGATS.A.dylib
/System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/CoreGraphics.framework/Versions/A/Resources/libCGATS.A.dylib
0x90a20000 - 0x90b7bfff com.apple.Foundation 6.3.7 (500.59)
/System/Library/Frameworks/Foundation.framework/Versions/C/Foundation
0x90d00000 - 0x90d1bfff com.apple.SystemConfiguration 1.7.1 (???)
/System/Library/Frameworks/SystemConfiguration.framework/Versions/A/SystemConfiguration
0x90d2c000 - 0x90d43fff com.apple.LangAnalysis 1.5.4
/System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/LangAnalysis.framework/Versions/A/LangAnalysis
0x90daf000 - 0x90daffff com.apple.audio.units.AudioUnit 1.3.3
/System/Library/Frameworks/AudioUnit.framework/Versions/A/AudioUnit
0x90db6000 - 0x90dc2fff com.apple.help 1.0.1
/System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/Help.framework/Versions/A/Help
0x90e77000 - 0x90e8ffff com.apple.WebServices 1.1.1 (1.1.0)
/System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/WebServicesCore.framework/Versions/A/WebServicesCore
0x90ec0000 - 0x90ec0fff com.apple.Cocoa 6.3 (???)
/System/Library/Frameworks/Cocoa.framework/Versions/A/Cocoa
0x910b0000 - 0x91101fff com.apple.bom 1.2.5 (63.2)
/System/Library/PrivateFrameworks/Bom.framework/Versions/A/Bom
0x9110d000 - 0x91174fff com.apple.audio.CoreAudio 2.1.3
/System/Library/Frameworks/CoreAudio.framework/Versions/A/CoreAudio
0x911d2000 - 0x911dffff com.apple.CommonPanels 1.2.1 (1.0)
/System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/CommonPanels.framework/Versions/A/CommonPanels
0x913a0000 - 0x9145ffff ColorSync
/System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ColorSync.framework/Versions/A/ColorSync
0x915e0000 - 0x91699fff com.apple.QD 3.4.67 (???)
/System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/QD.framework/Versions/A/QD
0x916e0000 - 0x91773fff com.apple.print.framework.PrintCore 3.3
/System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/PrintCore.framework/Versions/A/PrintCore
0x917b6000 - 0x917eefff com.apple.AE 1.4
/System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/AE.framework/Versions/A/AE
0x91809000 - 0x91819fff com.apple.ImageCapture 2.1.5
/System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/ImageCapture.framework/Versions/A/ImageCapture
0x91a40000 - 0x91ab3fff com.apple.NavigationServices 3.3.3
/System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/NavigationServices.framework/Versions/A/NavigationServices
0x91b10000 - 0x91b2afff libPDFRIP.A.dylib
/System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/CoreGraphics.framework/Versions/A/Resources/libPDFRIP.A.dylib
0x91b50000 - 0x91b5ffff libPSRIP.A.dylib
/System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/CoreGraphics.framework/Versions/A/Resources/libPSRIP.A.dylib
0x91b80000 - 0x91b93fff libRIP.A.dylib
/System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/CoreGraphics.framework/Versions/A/Resources/libRIP.A.dylib
0x92056000 - 0x92061fff com.apple.securityhi 1.2 (90)
/System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/SecurityHI.framework/Versions/A/SecurityHI
0x920c0000 - 0x922a7fff com.apple.security 2.4 (177)
/System/Library/Frameworks/Security.framework/Versions/A/Security
0x92430000 - 0x92468fff com.apple.LaunchServices 10.3.5 (98.4)
/System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/LaunchServices.framework/Versions/A/LaunchServices
0x9247c000 - 0x924cafff com.apple.print.framework.Print 3.3
/System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/Print.framework/Versions/A/Print
0x9278f000 - 0x927b5fff com.apple.FindByContent 1.4 (1.2)
/System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/FindByContent.framework/Versions/A/FindByContent
0x927c8000 - 0x927d3fff libCSync.A.dylib
/System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/CoreGraphics.framework/Versions/A/Resources/libCSync.A.dylib
0x927f0000 - 0x92827fff com.apple.CFNetwork 1.2.1 (7)
/System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/CFNetwork.framework/Versions/A/CFNetwork
0x9283f000 - 0x92852fff com.apple.speech.synthesis.framework 3.2
/System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/SpeechSynthesis.framework/Versions/A/SpeechSynthesis
0x92880000 - 0x92c05fff com.apple.HIToolbox 1.3.7 (???)
/System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/HIToolbox.framework/Versions/A/HIToolbox
0x92e70000 - 0x9336ffff com.apple.AppKit 6.3.9 (743.41)
/System/Library/Frameworks/AppKit.framework/Versions/C/AppKit
0x93920000 - 0x93930fff com.apple.speech.recognition.framework 3.3
/System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/SpeechRecognition.framework/Versions/A/SpeechRecognition
0x939a0000 - 0x939b4fff libcups.2.dylib /usr/lib/libcups.2.dylib
0x93a50000 - 0x93a54fff libmathCommon.A.dylib /usr/lib/system/libmathCommon.A.dylib
0x93b2d000 - 0x93b35fff libbsm.dylib /usr/lib/libbsm.dylib
0x9410d000 - 0x9412afff com.apple.audio.SoundManager 3.9
/System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/CarbonSound.framework/Versions/A/CarbonSound
0x94610000 - 0x9462afff libresolv.9.dylib /usr/lib/libresolv.9.dylib
0x94640000 - 0x94649fff libz.1.dylib /usr/lib/libz.1.dylib
0x946e0000 - 0x9473ffff com.apple.SearchKit 1.0.2
/System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/SearchKit.framework/Versions/A/SearchKit
0x94800000 - 0x9488cfff com.apple.ink.framework 101.1.4 (55.12)
/System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/Ink.framework/Versions/A/Ink
0x949ba000 - 0x949bafff com.apple.Carbon 10.3 (???)
/System/Library/Frameworks/Carbon.framework/Versions/A/Carbon
0x94ea0000 - 0x954a6fff libBLAS.dylib
/System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vecLib.framework/Versions/A/libBLAS.dylib
0x95500000 - 0x957d0fff libLAPACK.dylib
/System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vecLib.framework/Versions/A/libLAPACK.dylib
0x958e0000 - 0x95900fff libvMisc.dylib
/System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vecLib.framework/Versions/A/libvMisc.dylib
0x95a08000 - 0x95ac0fff com.apple.audio.toolbox.AudioToolbox 1.3.4
/System/Library/Frameworks/AudioToolbox.framework/Versions/A/AudioToolbox
0x95b50000 - 0x95c32fff libicucore.A.dylib /usr/lib/libicucore.A.dylib
0x95e40000 - 0x95eadfff libvDSP.dylib
/System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vecLib.framework/Versions/A/libvDSP.dylib
0x95f30000 - 0x9601efff libiconv.2.dylib /usr/lib/libiconv.2.dylib
0x962e6000 - 0x96550fff com.apple.QuickTime 7.0.2
/System/Library/Frameworks/QuickTime.framework/Versions/A/QuickTime
0x96980000 - 0x96a46fff libcrypto.0.9.7.dylib /usr/lib/libcrypto.0.9.7.dylib
0x96aa0000 - 0x96acefff libssl.0.9.7.dylib /usr/lib/libssl.0.9.7.dylib
0x96ade000 - 0x96af8fff com.apple.openscripting 1.2.1 (???)
/System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/OpenScripting.framework/Versions/A/OpenScripting
0x96b50000 - 0x96bdffff ATS
/System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ATS.framework/Versions/A/ATS
0x96e80000 - 0x96e90fff com.apple.vecLib 3.0.3 (vecLib 3.0.3)
/System/Library/Frameworks/vecLib.framework/Versions/A/vecLib
0x96fdc000 - 0x972b4fff com.apple.CoreGraphics 1.203.30 (???)
/System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/CoreGraphics.framework/Versions/A/CoreGraphics
0x97335000 - 0x9739efff com.apple.htmlrendering 1.1.2
/System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/HTMLRendering.framework/Versions/A/HTMLRendering
Reproducible: Always
Steps to Reproduce:
1.Drag n Drop Application to the Applications folder after downloading and expanding
2.Double-click on application icon
3.watch application promptly crash
Actual Results:
Apple crash reporting application opened and provided above information
Expected Results:
Executed application. Same download worked OK on my 17" Powerbook
See Details Above
|
|
247,054 | 2,176,793 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7) Gecko/20040614 Firefox/0.9
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7) Gecko/20040614 Firefox/0.9
After upgrading from Mozilla 0.8 to 0.9: (using migration wizard)
If I go to Tools -> Options and then click on "Downloads" Mozilla crashes. It
happens every time. So I cannot change any download options. :-(
Reproducible: Always
Steps to Reproduce:
1. Install Firefox 0.8
2. Change some download options under Tools -> Options : Downloads
3. Use Firefox 0.8 some time
4. Install some extensions (e.g. tabbrowser extension)
5. Wait for Firefox 0.9 to be released
6. Install Firefox 0.9
7. Migrate configuration from Firefox 0.8 via wizard
8. Open Tools -> Options
9. Click on "Downloads"
10. See crash window :-)
Actual Results:
A crash window shows up. After clicking ok. Firefox is gone.
Expected Results:
Show the Downloads configuration as in previous version.
Also Submitted a Talkback. Incident ID: TB95673E
|
|
247,377 | 2,178,626 |
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322)
Build Identifier:
My username is Björn and I'm using swedish WinXP.
Version 0.6 correctly saves/reads my user data in "C:\Documents and
Settings\Björn\Application Data\Thunderbird"
But
Version 0.7 use "C:\Documents and Settings\BJöRN\APPLICATION
DATA\Thunderbird"
this causes all my accounts to diapear from the program of course and when I
first start the program I am promted to create a news or mail account.
Reproducible: Always
Steps to Reproduce:
1.
2.
3.
|
|
243,040 | 2,146,552 |
The HTML sanitizer does not properly handle the contents of attribute values.
This makes it possible to trick it to show remote images despite that I
configured the HTML sanitizer to ignore the src attribute of img elements.
Steps to reproduce:
1. Send the testcase to yourself, e.g. by making a manual connection to an SMTP
server with telnet (the HTML sanitizer appears not to work with messages opened
with Thunderbird's File -> Open Saved Message)
2. Choose View -> Message body as -> Original HTML
3. Choose View -> Message body as -> Simple HTML
Actual results:
Some text and an image that was not visible in the Original HTML view is
displayed. The image is loaded from a remote server.
Expected results:
The Simple HTML view should be the same as the original HTML view, except that
the alt text of the <img> should be displayed instead of the image itself. The
alt text should be interpreted as plain text, not HTML.
This happens both when the mailnews.display.html_sanitizer.allowed_tags pref is
not set, and when the value contains "img(alt,title,longdesc,width,height)"
(i.e. src is omitted).
I see this using Thunderbird 0.6 on both WinXP and Linux.
|
|
243,174 | 2,147,549 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7b) Gecko/20040421
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7b) Gecko/20040421
Go to the page http://de.selfhtml.org/
Press the link "SELFHTML Suche"
At the top left the search input appears.
Enter the word browser and press "Suchen"
A javscript windows pops up with a ok button.
After pressing ok the browser crashes.
Reproducible: Always
Steps to Reproduce:
1.Go to the page http://de.selfhtml.org/ and press the link "SELFHTML Suche"
2. Enter the word browser at the search input
3. after press "Suchen" a javascript window pops up
4. when pressing ok the browser crashes
Actual Results:
browser crash
Expected Results:
should show the search results instead
program error:
mozilla.exe has generated errors and will be closed by Windows.
You will need to restart the program.
An error log is being created.
|
|
243,482 | 2,150,355 |
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.7b) Gecko/20040421
Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8a) Gecko/20040512 Firefox/0.8.0+
Using [Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8a)
Gecko/20040512 Firefox/0.8.0+]
Try to use the Validate by File Upload field in above mentioned form. On Firefox
(since 20040510 ?) the file upload filed downs't display the text (expected
'browse...' ) on the button, and clicking the button doesn't do nothing.
Reproducible: Always
Steps to Reproduce:
1.Go to http://validator.w3.org/
2.try to upload file for validation, click on the button
3.nothing happens
Actual Results:
The button should display some text ('browse...'), clicking on the button should
open a sheet to navigate to a file and allow the user to select a file on the
local file system.
Expected Results:
display some text (label) on the button, and allow the user to upload a file
|
|
245,553 | 2,166,905 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7b) Gecko/20040411 Firefox/0.8.0+ (best browser EVAR1!!)
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7) Gecko/20040603 Firefox/0.8.0+
After uninstalling QuickNote (via new EM's Uninstall feature), on first restart
of Firefox, the Bookmark toolbar no longer work and Firefox is almost
un-responsive (ie. menus aren't clickable etc).
Looking into profile directory, the QuickNote files are deleted, but references
to it in chrome.rdf and overlayinfo\..\overlays.rdf are left untouched.
Reproducible: Always
Steps to Reproduce:
1. Install QuickNote from given URL.
2. Restart
3. Open EM, uninstall QuickNote
4. Restart
Actual Results:
Bookmark Toolbar is empty, menus are not clickable, references to QuickNote left
in profile.
Expected Results:
Remove all references it created, and start up normally.
Some extensions are uninstalled ok, including Pike's Show Failed URL, All-in-One
gestures.
|
|
245,570 | 2,167,018 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.6) Gecko/20040210 Firelimace/0.8 (User Agent modifie grace a Firesomething. Telechargez Firefox/0.8 en francais sur http://frenchmozilla.org/)
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7) Gecko/20040603 Firefox/0.8.0+
In this page at http://www.topgratuit.com/bienvenue.htm, browser crash when
setting a cookie if you click "Cancel" in the dialog.
Reproducible: Always
Steps to Reproduce:
1. Save your data
2. Go on the page http://www.topgratuit.com/
3. Click Cancel
Actual Results:
Browser crash if you didn't visit this site before.
Expected Results:
Nothing.
It crashes only the first time you go on the site.
But if you clear your Cookies and reload the page, it crashes again.
Crash on latest Firefox 0.9, Mozilla 1.7 rc2 and several other configurations
(windows XP, 2000, ME ; not tested in Linux. You can find some discussions about
this bug (in french) on the page
http://www.geckozone.org/forum/viewtopic.php?t=5362).
Doesn't crash with 0.8_fr + TBE
|
|
245,722 | 2,168,182 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; cs-CZ; rv:1.8a2) Gecko/20040524 Firefox/0.8.0+
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; cs-CZ; rv:1.8a2) Gecko/20040524 Firefox/0.8.0+
AppName: firefox.exe AppVer: 0.8.0.0 ModName: ntdll.dll
ModVer: 5.1.2600.1217 Offset: 00033905
This said me windows.
OS: XP prof. With all SP's and updates. Visual Studio Installed. IIS running.
Reproducible: Sometimes
Steps to Reproduce:
1. depack install
2. run the program for the first time
3. it is.
Actual Results:
App crashes and exit.
Expected Results:
Open start up page.
|
|
245,742 | 2,168,306 |
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X; en-us) AppleWebKit/125.2 (KHTML, like Gecko) Safari/125.7
Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.7) Gecko/20040606 (CVS MOZILLA_1_7_BRANCH and on 1.7 RC2)
When I successfully authenticate against my work's NTLM-authenticating Outlook Web Access on
Microsoft Exchange 5.5 on IIS 3 (which is why I'm reluctant to give the URL), Mozilla crashes when I
proceed further with navigation and at non-repeatable points in the code (using gdb). To the user, this
is just a crash, and I had submitted a TalkBack through TalkBack a week or so ago. Using gdb, it looks
like the most common crash is "Program received signal EXC_BAD_ACCESS, Could not access memory.,"
though "Program received signal SIGABRT, Aborted." comes up sometimes, too.
I'm currently trying to debug this, but I though I'd at least put this bug here in case if y'all were
planning on releasing Mozilla 1.7 soon. I would really like to have this bug fixed first, and please let me
know if you're working on this one, too (I'll post more details as I find out more about this bug). I'm
going to try to recompile with ElectricFence and see what might be writing out of bounds..
Thinking that the bug might be in mozilla/security/manager/ssl/src/nsNTLMAuthModule.cpp, I pulled
down revision 1.6, which was used in Mozilla 1.6 (NTLM on the same site works properly in 1.6), and
re-made mozilla/security/manager/ssl. Unfortunately, the crash still occurs, so the bug might be
elsewhere.
Reproducible: Always
Steps to Reproduce:
1. Log in to a web site using NTLM
2. Navigate to another page
Actual Results:
At the 9km view, Mozilla crashes. Inside of gdb, the crash seems to occur on non-repeatable code
segments, potentially indicating memory corruption in the NTLM authentication process somewhere.
Expected Results:
Quite simply, Mozilla should navigate to the requested page and not crash ;-).
Talkback crash ID: TB52990Z
Mac OS X Panther 10.3.3 and 10.3.4
PowerPC G4 450MHz (one CPU), 1GB RAM
about:buildconfig
Build platform
target
powerpc-apple-darwin7.4.0
Build tools
Compiler Version Compiler flags
gcc gcc version 3.3 20030304 (Apple Computer, Inc. build 1495)
-Wall -W -Wno-unused -Wpointer-arith -Wcast-align -Wno-long-long -fpascal-strings -no-cpp-
precomp -fno-common -I/Developer/Headers/FlatCarbon -pipe
c++ gcc version 3.3 20030304 (Apple Computer, Inc. build 1495)
-fno-rtti -fno-exceptions -Wall -Wconversion -Wpointer-arith -Wcast-align -Woverloaded-virtual
-Wsynth -Wno-ctor-dtor-privacy -Wno-non-virtual-dtor -Wno-long-long -fpascal-strings -no-cpp-
precomp -fno-common -fshort-wchar -I/Developer/Headers/FlatCarbon -pipe -I/usr/X11R6/include
Configure arguments
--enable-macos-target=10.3 --enable-official-branding --with-nss --disable-tests --enable-
optimize --enable-crypto
|
|
246,012 | 2,170,360 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7) Gecko/20040608 Firefox/0.8.0+
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7) Gecko/20040608 Firefox/0.8.0+
When using *[src*="?ad"] { display: none !important } to hide ads in
userContent.css firefox and mozilla suite ( FF 0.9rc and Mozilla Suite 1.7rc3)
crash when an iframe is present containing :
<iframe src="?ad=1"></iframe>
Reproducible: Always
Steps to Reproduce:
1. Add stylesheet rule to userContent.css
2. load page with iframe
3. press f6
Actual Results:
The browser crashed.
I've entered a report in the talkback agent (id TB81055W) and made a testcase.
Both mozilla suite en firefox were tested with a clean profile.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.