Bug ID
int64
961
1.91M
Comment ID
int64
3.98k
17.1M
Author
stringlengths
8
48
Comment Text
stringlengths
1
64.3k
251,931
2,207,142
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7) Gecko/20040717 Firefox/0.9.1+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7) Gecko/20040717 Firefox/0.9.1+ can't update any extensions or themes, firefox shows the message: "Firefox was not able to find any available updates. Firefox encountered problems when tryubg to find updates for some items." Reproducible: Always Steps to Reproduce: 1. click in the toolbar on tools 2. than click on extensions or themes 3. choose one theme or extensions and press the update button Actual Results: the same es everytime Expected Results: say that their is no update this time, or give me a message that their is an update to download
244,490
2,158,432
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8a2) Gecko/20040522 Firefox/0.8.0+ Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8a2) Gecko/20040522 Firefox/0.8.0+ Firefox crashes when pseudo elements ":before" or ":after" have content "URL" and document's base element is nonsense. 1: <?xml version="1.0" encoding="UTF-8"?> 2: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" 3: "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> 4: <html xml:lang="de" xmlns="http://www.w3.org/1999/xhtml"> 5: <head> 6: <title>Crash Test</title> 7: <base href="D:\CSS Test Files\" /> 8: <style type="text/css"> 9: p { border: 1px red solid } 10: p:before { content: url("images/quote_end.png") } 11: </style> 12: </head> 13: <body> 14: <p>Did it crash?</p> 15: </body> 16: </html> Reproducible: Always Steps to Reproduce: 1. Try to view "http://home.arcor.de/plsdontreply/crashtest.html" Actual Results: Firefox crashes Expected Results: Just ignore nonsense in <base/> element. Reference: http://forums.mozillazine.org/viewtopic.php?t=79058&sid=a881c8e5a30ec1487b84264c1b001cd7
244,619
2,159,440
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; cs-CZ; rv:1.7) Gecko/20040514 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; cs-CZ; rv:1.7) Gecko/20040514 If I call eval() as a method of some object Mozilla crashes if the evaluating code contains declaration of some variable. See example: function f1() { var o = new Object(); eval.call(o, "var a = 'vodka'"); // <- CRASH !!! } When the code is not in the function (so run directly in window object), the crash never happened. The crash is dependent on the "var" declaration - evaluating of the "a = 'vodka'" is OK. During the call eval.call(o, "some code") I can see in the JS console warning "function eval must be called directly, and not by way of a function of another name", so probably this is not much likable syntax, but it this working in other cases and I am for some reason using it. Tested with Mozilla 1.7rc2 (Mozilla/5.0 (Windows; U; Windows NT 5.0; cs-CZ; rv:1.7) Gecko/20040514) Taklback ID: TB59963Z Source File, Line No. d:/BUILDS/tinderbox/Mozilla1.7/WINNT_5.0_Clobber/mozilla/js/src/jsparse.c, line 2016 2014 brendan 3.64 for (fp = cx->fp; (fp->flags & JSFRAME_SPECIAL) && fp->down; fp = fp->down) 2015 brendan 3.53 continue; * 2016 brendan 3.33 obj = fp->varobj; 2017 fun = fp->fun; Reproducible: Always Steps to Reproduce:
248,825
2,187,846
Build ID: 2004-06-27-08, Windows XP trunk Seamonkey. This is definitely NOT the same crash experienced originally in bug 185357. I have verified that the reduced testcase at http://bugzilla.mozilla.org/attachment.cgi?id=151258&action=view NO LONGER crashes. Steps to Reproduce: 1. Load http://www.ign.com (get past the ad page) 2. File | Print Preview Actual Results: Crashes here: nsBlockFrame::SplitPlaceholder [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3768] nsInlineFrame::ReflowInlineFrame [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsInlineFrame.cpp, line 780] nsInlineFrame::ReflowFrames [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsInlineFrame.cpp, line 530] nsInlineFrame::Reflow [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsInlineFrame.cpp, line 443] nsLineLayout::ReflowFrame [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsLineLayout.cpp, line 990] nsBlockFrame::ReflowInlineFrame [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3587] nsBlockFrame::DoReflowInlineFrames [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3415] nsBlockFrame::DoReflowInlineFramesAuto [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3316] nsBlockFrame::ReflowInlineFrames [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3261] nsBlockFrame::ReflowLine [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 2428] nsBlockFrame::ReflowDirtyLines [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 2087] nsBlockFrame::ComputeFinalSize [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 1210] nsBlockFrame::Reflow [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 914] nsBlockReflowContext::ReflowBlock [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowContext.cpp, line 547] nsBlockFrame::ReflowFloat [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 5024] nsBlockReflowState::FlowAndPlaceFloat [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowState.cpp, line 865] nsBlockReflowState::AddFloat [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowState.cpp, line 672] nsLineLayout::ReflowFrame [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsLineLayout.cpp, line 1014] nsBlockFrame::ReflowInlineFrame [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3587] nsBlockFrame::DoReflowInlineFrames [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3415] nsBlockFrame::DoReflowInlineFramesAuto [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3316] nsBlockFrame::ReflowInlineFrames [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3261] nsBlockFrame::ReflowLine [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 2428] nsBlockFrame::ReflowDirtyLines [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 2087] nsBlockFrame::Reflow [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 815] nsBlockReflowContext::ReflowBlock [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowContext.cpp, line 547] nsBlockFrame::ReflowFloat [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 5024] nsBlockReflowState::FlowAndPlaceFloat [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowState.cpp, line 865] nsBlockReflowState::AddFloat [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowState.cpp, line 672] nsLineLayout::ReflowFrame [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsLineLayout.cpp, line 1014] nsBlockFrame::ReflowInlineFrame [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3587] nsBlockFrame::DoReflowInlineFrames [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3415] nsBlockFrame::DoReflowInlineFramesAuto [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3316] nsBlockFrame::ReflowInlineFrames [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3261] nsBlockFrame::ReflowLine [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 2428] nsBlockFrame::ReflowDirtyLines [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 2087] nsBlockFrame::Reflow [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 815] nsBlockReflowContext::ReflowBlock [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowContext.cpp, line 547] nsBlockFrame::ReflowBlockFrame [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3040] nsBlockFrame::ReflowLine [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 2306] nsBlockFrame::ReflowDirtyLines [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 2087] nsBlockFrame::Reflow [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 815] nsBlockReflowContext::ReflowBlock [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowContext.cpp, line 547] nsBlockFrame::ReflowFloat [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 5024] nsBlockReflowState::FlowAndPlaceFloat [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowState.cpp, line 865] nsBlockReflowState::AddFloat [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowState.cpp, line 672] nsLineLayout::ReflowFrame [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsLineLayout.cpp, line 1014] nsBlockFrame::ReflowInlineFrame [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3587] nsBlockFrame::DoReflowInlineFrames [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3415] nsBlockFrame::DoReflowInlineFramesAuto [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3316] nsBlockFrame::ReflowInlineFrames [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3261] nsBlockFrame::ReflowLine [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 2428] nsBlockFrame::ReflowDirtyLines [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 2087] nsBlockFrame::Reflow [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 815] nsBlockReflowContext::ReflowBlock [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowContext.cpp, line 547] nsBlockFrame::ReflowBlockFrame [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3040] nsBlockFrame::ReflowLine [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 2306] nsBlockFrame::ReflowDirtyLines [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 2087] nsBlockFrame::Reflow [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 815] nsBlockReflowContext::ReflowBlock [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockReflowContext.cpp, line 547] nsBlockFrame::ReflowBlockFrame [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 3040] nsBlockFrame::ReflowLine [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 2306] nsBlockFrame::ReflowDirtyLines [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 2087] nsBlockFrame::Reflow [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/html/base/src/nsBlockFrame.cpp, line 815]
249,067
2,189,460
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.0.3705; .NET CLR 1.1.4322) Build Identifier: I have uninstalled netscape and Firefox 0.8. No dice. I have removed very reference to mozilla, netscape, and firefox from the registry. I have screenshots of the weird hybrid netscape/firefox install wizard. Reproducible: Always Steps to Reproduce: 1.Download 9.1 installer 2.Double click 3.Click next. Actual Results: Thinks its netscape and after I tell it to install. Expected Results: Installed Firefox.
336,432
2,845,603
When Adblock Plus 0.7 is installed and enabled, I crash immediately when visiting the front page on Haaretz. This regressed between 2006-05-02 and 2006-05-03. Based on the stacktrace (see below), I'm guessing this is a regression from bug 334407. Steps to reproduce: 1. Install Adblock plus 0.7 from http://adblockplus.mozdev.org/installation.html 2. Visit http://www.haaretz.co.il/?from=hasot Note that there's no need to define any filters in order to crash, but adblock must be enabled and active. The Talkback reports I got are all blank/junk (which might be a separate bug): TB18248627M, TB18249515E. Here's the top of the Problem Report I'm getting from OS X: Date/Time: 2006-05-03 17:37:56.975 +0300 OS Version: 10.4.6 (Build 8I127) Report Version: 4 Command: firefox-bin Path: /Users/urib/Desktop/Minefield 2006-05-03 copy.app/Contents/MacOS/firefox-bin Parent: launchd [1] Version: 3.0a1 (3.0a1) PID: 7816 Thread: 0 Exception: EXC_BAD_ACCESS (0x0001) Codes: KERN_PROTECTION_FAILURE (0x0002) at 0x00000000 Thread 0 Crashed: 0 org.mozilla.firefox 0x00429ab0 nsScriptSecurityManager::SecurityCompareURIs(nsIURI*, nsIURI*, int*) + 112 1 org.mozilla.firefox 0x0042b1dc nsScriptSecurityManager::CheckSameOriginPrincipalInternal(nsIPrincipal*, nsIPrincipal*, int) + 312 2 org.mozilla.firefox 0x00293e24 nsGlobalWindow::SetTimeoutOrInterval(int, int*) + 1412 3 org.mozilla.firefox 0x002938e4 nsGlobalWindow::SetTimeoutOrInterval(int, int*) + 68 4 libxpcom_core.dylib 0x2c05447c _XPTC_InvokeByIndex + 216 5 org.mozilla.firefox 0x00498c7c XPCWrappedNative::CallMethod(XPCCallContext&, XPCWrappedNative::CallMode) + 2524 6 org.mozilla.firefox 0x0048bf98 XPC_WN_CallMethod(JSContext*, JSObject*, unsigned, long*, long*) + 220 7 libmozjs.dylib 0x2302db20 js_Invoke + 1832 8 libmozjs.dylib 0x23037994 js_Interpret + 35728 9 libmozjs.dylib 0x2302db64 js_Invoke + 1900
337,036
2,849,459
BUILD: Current Firefox trunk GTK2 debug build STEPS TO REPRODUCE: Close a dialog (the security dialog that comes up when going from an insecure page to a secure one, an alert, etc). ACTUAL RESULTS: About half the time, Mozilla crashes. EXPECTED RESULTS: No crashes. DETAILS: The stack is (for an alert): #6 0x00d14d4d in g_type_check_instance_is_a () from /usr/lib/libgobject-2.0.so.0 #7 0x00cfae0e in g_object_get_data () from /usr/lib/libgobject-2.0.so.0 #8 0xb6736149 in get_window_for_gtk_widget (widget=0x8b68c78) at ../../../../mozilla/widget/src/gtk2/nsWindow.cpp:3833 #9 0xb67393c1 in IM_get_owning_window (aArea=0x8bdc638) at ../../../../mozilla/widget/src/gtk2/nsWindow.cpp:5402 #10 0xb67386e5 in nsWindow::IMEGetOwningWindow (this=0x8e79c60) at ../../../../mozilla/widget/src/gtk2/nsWindow.cpp:4975 #11 0xb6738686 in nsWindow::IMEComposingWindow (this=0x8e79c60) at ../../../../mozilla/widget/src/gtk2/nsWindow.cpp:4966 #12 0xb6737f62 in nsWindow::IMEDestroyContext (this=0x8e79c60) at ../../../../mozilla/widget/src/gtk2/nsWindow.cpp:4782 #13 0xb672e1d2 in nsWindow::Destroy (this=0x8e79c60) at ../../../../mozilla/widget/src/gtk2/nsWindow.cpp:429 #14 0xb56fcb81 in ~nsView (this=0x8e79bf0) at ../../../mozilla/view/src/nsView.cpp:264 #15 0xb56fcd76 in nsIView::Destroy (this=0x8e79bf0) at ../../../mozilla/view/src/nsView.cpp:302 #16 0xb5702140 in ~nsViewManager (this=0x8e79b70) at ../../../mozilla/view/src/nsViewManager.cpp:228 #17 0xb570267f in nsViewManager::Release (this=0x8e79b70) at ../../../mozilla/view/src/nsViewManager.cpp:293 #18 0xb5256e1c in nsCOMPtr<nsIViewManager>::~nsCOMPtr () at ../../../../dist/include/dom/nsIDOMDocument.h:27 #19 0xb5248427 in ~DocumentViewerImpl (this=0x8e84fb0) at ../../../mozilla/layout/base/nsDocumentViewer.cpp:555 #20 0xb52479cf in DocumentViewerImpl::Release (this=0x8e84fb0) at ../../../mozilla/layout/base/nsDocumentViewer.cpp:526 #21 0xb663d198 in ~nsCOMPtr (this=0xbfff8774) at ../../../../dist/include/xpcom/nsCOMPtr.h:583 #22 0xb6636add in nsWindowWatcher::OpenWindowJSInternal (this=0x81897f0, aParent=0x88cc1d0, aUrl=0xb66851e0 "chrome://global/content/commonDialog.xul", aName=0xb6685003 "_blank", aFeatures=0xb6685080 "centerscreen,chrome,modal,titlebar", aDialog=1, argc=1, argv=0x9163850, aCalledFromJS=0, _retval=0xbfff8b24) at ../../../../../mozilla/embedding/components/windowwatcher/src/nsWindowWatcher.cpp:932 #23 0xb6634798 in nsWindowWatcher::OpenWindow (this=0x81897f0, aParent=0x88cc1d0, aUrl=0xb66851e0 "chrome://global/content/commonDialog.xul", aName=0xb6685003 "_blank", aFeatures=0xb6685080 "centerscreen,chrome,modal,titlebar", aArguments=0x8ba9648, _retval=0xbfff8b24) at ../../../../../mozilla/embedding/components/windowwatcher/src/nsWindowWatcher.cpp:480 #24 0xb664961d in nsPromptService::DoDialog (this=0x8a65d78, aParent=0x88cc1d0, aParamBlock=0x8ba9648, aChromeURL=0xb66851e0 "chrome://global/content/commonDialog.xul") at ../../../../../mozilla/embedding/components/windowwatcher/src/nsPromptService.cpp:657 #25 0xb6646e14 in nsPromptService::Alert (this=0x8a65d78, parent=0x88cc1d0, dialogTitle=0xbfff8d6c, text=0x87b63e8) at ../../../../../mozilla/embedding/components/windowwatcher/src/nsPromptService.cpp:132 #26 0xb6630079 in nsPrompt::Alert (this=0x87b6400, dialogTitle=0xbfff8d6c, text=0x87b63e8) at ../../../../../mozilla/embedding/components/windowwatcher/src/nsPrompt.cpp:217 I have no idea what we're passing to GTK here, but it's clearly not what it expects...
338,288
2,857,967
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; de; rv:1.8.0.3) Gecko/20060426 Firefox/1.5.0.3 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; de; rv:1.8.0.3) Gecko/20060426 Firefox/1.5.0.3 This suite loads a frameset that contains a frameset which in turn contains a frame, launches a popup that keeps a reference to one of its elements, submits the innermost frame (to the delay perl script) and then replaces the inner frameset two times. For an unknown reason the old frame remains accessible from the popup window in a zombie state, it is possible to load web pages into it (the firefox status bar reflects that the page and its media are being loaded although nothing else is visible). Even more weird, when launching a popup dialog from that frame, previously launched popup windows get overwritten - including chrome windows (e.g. browser properties). Sometimes the browser also crashes while doing this due to an attempt to dereference a function pointer on a freed object. Here this should just crash the browser; although it seems to be impossible to me right now there might be the chance of executing arbitrary code that way. Reproducible: Always Steps to Reproduce: 1. Unzip the contained files onto some web server (there's a perl file that is required for creating a delay of 2 seconds). 2. Open index.html 3. Follow instructions Actual Results: Browser crashes or loads a custom html page into a chrome window Expected Results: Browser should have prevented javascript code from performing those actions
334,142
2,829,153
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; it; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1 Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; it; rv:1.8.0.2) Gecko/20060308 Firefox/1.5.0.2 Some "submit" in some forms (please consider I'm not able to demonstrate this with a link to my home banking system, cause you have to be logged in to verify) do not transmit nothing and the progress bar at the bottom remains empty. This could be an issue solved by recent security changes (MFSA 2006-28 Security check of js_ValueToFunctionObject() can be circumvented or MFSA 2006-24 Privilege escalation using crypto.generateCRMFRequest), but to fill a problem with the online bank help desk I have to have more specific details of what has to be changed to make their application work again. Installing back a 1.5.0.1 makes these problems disappear. Reproducible: Always Steps to Reproduce: 1. Log into my online banking system 2. Try to make some form based operations 3. Nothing happens Actual Results: Some "submit" in some forms (please consider I'm not able to demonstrate this with a link to my home banking system, cause you have to be logged in to verify) do not transmit nothing and the progress bar at the bottom remains empty. Expected Results: Browser have to display some page after the "submit". Re-installing Firefox 1.5.0.1 solves
335,333
2,838,219
Summary: Relative, remote images which have a Content-Base fail to display. This probably won't end up in MailNews:Backend as it is currently, but just filing here for now... Regression Range: Between 2006-04-10-07 and 2006-04-11-10, relative image URIs aren't being resolved nor displayed. Steps to Reproduce: 1. Go to http://www.iusb.edu 2. In Suite, do a File | Send Page 3. View the mail message (click the "Not a Scam" button and show remote images, if prompted) Expected Results: Relative-pathed images such as <img src="foo/bar.gif"> should display, since the message includes both Content-Base and Content-Location fieldsets. Actual Results: No relative images display. The message's HTML content setup is something like this: Content-Type: text/html; charset=ISO-8859-1; name="www.iusb.edu/" Content-Transfer-Encoding: 7bit Content-Disposition: inline; filename="www.iusb.edu/" Content-Base: "http://www.iusb.edu/" Content-Location: "http://www.iusb.edu/" The actual URI is like: <img src="img/topnav-right.gif">
327,608
2,779,428
Steps to reproduce: 1. Make sure the testcase is allowed to open popup windows (to force GC). 2. Load the testcase. Result: Mac debug: Always aborts with "Assertion failure: prop, at jsfun.c:1046" Mac nightly: Sometimes crashes [@ js_SetCallVariable]. Expected: No crash or assertion failure. I spent many hours trying to create a reduced testcase for this crash. I hope it's useful.
328,258
2,784,819
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.9a1) Gecko/20060221 Firefox/1.6a1 Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.9a1) Gecko/20060221 Firefox/1.6a1 A file processing vulnerability exists within Firefox and Deer Park Alpha 2, which allows for an attacker to cause the browser to crash, and or execute arbitrary code on a targeted host. The vulnerability is caused due to a boundary error within the “ARGB32_image_ARGB32 ()” function when processing a malformed .gif file. Below is output from gdb on OS X 10.4.5 PPC with Deerpark2 (build 2006022104): Program received signal EXC_BAD_ACCESS, Could not access memory. Reason: KERN_INVALID_ADDRESS at address: 0x0efcd6f8 0x9043c6f0 in ARGB32_image_ARGB32 () Versions Tested: Firefox 1.5.0.1 on OS X 10.4.5 PPC Deer Park Alpha 2 build: 2006022104 Talkback Incident #: TB15506379Q Please let me know if you need any other information. Thanks, -- Tom Ferris Researcher www.security-protocols.com Key fingerprint = 0DFA 6275 BA05 0380 DD91 34AD C909 A338 D1AF 5D78 Reproducible: Always Steps to Reproduce:
328,514
2,786,718
SSL connection attempts between tstclnt and selfserv fail when the pre-master secret needs to be computed over nistp521 or nistb571 (curves nistp384/nistk409 and smaller work ok).
328,751
2,788,927
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.9a1) Gecko/20060221 Firefox/1.6a1 Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.9a1) Gecko/20060221 Firefox/1.6a1 A heap overflow vulnerability exists within Firefox and Deer Park Alpha 2, which allows for an attacker to cause the browser to crash, and or execute arbitrary code on a targeted host. The vulnerability is caused due to a boundary error within the “SinkContext::~SinkContext ()” function when processing an applet. Below is output from gdb on OS X 10.4.5 PPC with Deerpark2 (build 2006022104): Program received signal EXC_BAD_ACCESS, Could not access memory. Reason: KERN_INVALID_ADDRESS at address: 0x7c7f1b78 0x0054bdec in SinkContext::~SinkContext () (gdb) bt #0 0x0054bdec in SinkContext::~SinkContext () #1 0x0054dbe4 in HTMLContentSink::~HTMLContentSink () #2 0x0059bf4c in nsContentSink::Release () #3 0x00307f84 in nsParser::~nsParser () #4 0x00308028 in nsParser::Release () #5 0x003479ac in nsDocumentOpenInfo::OnStopRequest () #6 0x000abbd8 in nsBaseChannel::OnStopRequest () #7 0x000cb788 in nsInputStreamPump::OnStateStop () #8 0x000cb32c in nsInputStreamPump::OnInputStreamReady () #9 0x10083238 in nsAStreamCopier::PostContinuationEvent_Locked () #10 0x10044aa4 in PL_HandleEvent () #11 0x100449c8 in PL_ProcessPendingEvents () #12 0x9075ea68 in __CFRunLoopDoSources0 () #13 0x9075df98 in __CFRunLoopRun () #14 0x9075da18 in CFRunLoopRunSpecific () #15 0x9317d1e0 in RunCurrentEventLoopInMode () #16 0x93261f20 in GetNextEventMatchingMask () #17 0x93261df0 in WNEInternal () #18 0x93261d50 in WaitNextEvent () #19 0x006d9700 in nsMacMessagePump::GetEvent () #20 0x006d965c in nsMacMessagePump::DoMessagePump () #21 0x00369238 in nsAppShell::Run () #22 0x00405b80 in nsAppStartup::Run () #23 0x00014514 in XRE_main () #24 0x0000f698 in start () #25 0x0000f518 in start () (gdb) quit Versions Affected: Deer Park Alpha 2 build: 2006022104 on OS X 10.4.5 Camino 1.0 seems to just lock up, and not crash. Talkback Incident #: TB15697882X Please let me know if you need any other information. Thanks, -- Tom Ferris Researcher www.security-protocols.com Key fingerprint = 0DFA 6275 BA05 0380 DD91 34AD C909 A338 D1AF 5D78 Reproducible: Always Steps to Reproduce:
328,817
2,789,679
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1 Build Identifier: N/A Note: This bug was originally reported to IPA (Information-technology Promotion Agency, Japan) and forwarded to us at Mozilla Japan. I'm NOT original reporter. Don't mention my name in the security advisory. For more information about IPA, visit http://www.ipa.go.jp/about/english/ IPA#36721438 Attackers can forge a Web page on another domain by overflowing Content-Length response header. This could be used for the real phishing to steal sensitive data, such as user password or cookies. This bug was originally reported as a vulnerability discovered in Internet Explorer, but Firefox shares the same problem. Windows XP Professional SP2 Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20060129 Firefox/1.6a1 Reproducible: Always Steps to Reproduce: 1. Send and receive two pairs of HTTP requests/responses on the same TCP session with keep-alive of HTTP 1.0 or 1.1. 2. Set HTTP response of first pair to contain Content-Length header over 0x80000301 bytes. Actual Results: The partial HTTP response of first pair is shown as response to the second request. Expected Results: The partial HTTP response of first pair is NOT shown as response to the second request. The malicious Web site admins can target Firefox (and IE) users who use HTTP proxy (that keep-alive anabled) to steal cookies or build web pages including fake login form for arbitrary domains. For Firefox (and IE) users who don't use HTTP proxy, the attackers can also exploit same problem for web site with another domain name on the same IP address. Workaround for site admins: disable keep-alive More info coming.
332,173
2,814,674
The way the character '~' is parsed (by iterating from the end of the pattern to the front to find it) is incorrect, because it assumes that '~' always signifies a negation pattern (pat~pat2) if it's not escaped. However, characters other than ']' in character classes (e.g., '[abc]') are *not* escaped. Further problems also appear in invalid patterns which combine '(pat|pat2)' and 'pat~pat2' syntaxes, and in some cases it is possible to produce a crash. To demonstrate these bugs, here's a table of results of testing various patterns against various strings. These patterns and strings should be considered as "raw" strings, so if they were actually being used in code '\' would need to be escaped. Pattern String Match? Is Behavior Correct? ------------------------------------------------------- a[a\~b] aa yes yes a[a\~b] a\ yes yes a[a\~b] a~ yes yes a[a~b] a~ NO NO a[a~b]b a~b NO NO (a|b)(a|~)b a~b CRASH "NO" Note that the last behavior isn't strictly incorrect because there's no specified behavior, but ideally it should be impossible for any pattern/string combination to cause a crash regardless of pattern validity.
333,497
2,824,566
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20060410 SeaMonkey/1.5a Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20060410 SeaMonkey/1.5a If you visit http://tekade.de , SM-Trunk crashes, if JavaScript is turned off. The site checks, if JavaScript is anabled and sends a warningpage if its not anabled. At this moment SM crashes. Reproducible: Always Steps to Reproduce: 1.turn JS off 2.visit http://tekade.de 3.crash Actual Results: SM crashes Expected Results: SM should show the warningpage Talkback-ID is: TB17412065Z (thanks to toscha) Searching for the last good build was tricky. 2005090804 was the last build that show the warningpage on my system. 2005090904 show an empty page but do not crash. 2005102104 always do so. 2005102112 crashes. This is a very small window and gives a good chance to find the responsible check in!
340,796
2,876,755
Steps to reproduce, at least on my machine: 1. Launch 2006-06-07 nightly. 2. Close it. 3. Launch trunk build from the command line. Result: Crash [@ nsXULDocument::ResumeWalk] after "WARNING: nsExceptionService ignoring thread destruction after shutdown: file /Users/admin/trunk/mozilla/xpcom/base/nsExceptionService.cpp, line 191".
329,746
2,796,697
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1 Build Identifier: N/A Note: This bug was originally reported to IPA (Information-technology Promotion Agency, Japan) and forwarded to us at Mozilla Japan. I'm NOT original reporter. Don't mention my name in the security advisory. For more information about IPA, visit http://www.ipa.go.jp/about/english/ IPA#62734622 Attackers can forge a Web page on another domain by sending the HTTP response including Transfer-Encoding header with a space between header name and colon (:). This could be used for the real phishing to steal sensitive data, such as user password or cookies. Windows XP Professional SP2 Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20060129 Firefox/1.6a1 Reproducible: Sometimes Steps to Reproduce: 1. Set up Firefox to use Microsoft Internet Security & Acceleration Server 2004 (ISA Server) for HTTP proxy 2. Provide the proxy with HTTP response with the following conditions: A. "Content-Length" header is included B. "Transfer-Encoding : chunked" is included (note a space between "Encoding" and ":") C. response length with chunk size data of B is shorter than the value of A Actual Results: "Transfer-Encoding SP" header (Transfer-Encoding header with a space) is not defined by HTTP/1.1. Therefore, ISA Server will send data of the number of bytes specified by Content-Length header to the browser. Transfer-Encoding header with a space will be transferred as is. This is appropriate behavior compliant with HTTP/1.1. Received the response via proxy, Firefox recognizes "Transfer-Encoding SP" header as "Transfer-Encoding" header and understands that the response body is chunked encoded. The rest of response determined by the condition C is incorrectly recognized as the response of following HTTP request. Expected Results: The rest of response should not be recognized as the response of following HTTP request. The malicious Web site admins can target Firefox users who use HTT/1.1 proxy to steal cookies or build web pages including fake login form for arbitrary domains. Workaround: Don't use ISA Server More info coming.
330,214
2,799,958
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1 Build Identifier: N/A Note: This bug was originally reported to IPA (Information-technology Promotion Agency, Japan) and forwarded to us at Mozilla Japan. I'm NOT original reporter. Don't mention my name in the security advisory. For more information about IPA, visit http://www.ipa.go.jp/about/english/ JVN28513736 Attackers can forge a Web page on another domain by sending the HTTP response including "Content-Length" header and "Transfer-Encoding: chunked" header. This could be used for the real phishing to steal sensitive data, such as user password or cookies. Windows XP Professional SP2 Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20060129 Firefox/1.6a1 Reproducible: Sometimes Steps to Reproduce: 1. Set up Firefox to use Squid/2.5.STABLE12 for HTTP proxy 2. Configure Squid. Set the value of "persistent_request_timeout" to "1 minute". 2. Provide the proxy with HTTP response with the following conditions: A. "Content-Length" header is included B. "Transfer-Encoding: chunked" is included C. response length with chunk size data of B is shorter than the value of A Actual Results: Squid conforms to HTTP/1.0, not to HTTP/1.1. Therefore, It will send data of the number of bytes specified by Content-Length header to the browser. Transfer-Encoding header with a space will be transferred as is. This is appropriate behavior compliant with HTTP/1.0. Firefox will receive the response via proxy and handle the response body based on Transfer-Encoding header. Firefox determines the termination of message body based on the last chunk of chunked encoding, not Content-Length. The rest of response determined by the condition C is incorrectly recognized as the response of following HTTP request. Expected Results: The rest of response should not be recognized as the response of following HTTP request. Additional Information: The malicious Web site admins can target Firefox users who use HTTP proxy (that keep-alive anabled) to steal cookies or build web pages including fake login form for arbitrary domains. Original reporter says that Firefox doesn't ignore the header that isn't part of HTTP/1.0 (but is defined by HTTP/1.1) when it interprets HTTP/1.0 response. Although this report makes an issue of Transfer-Encoding header, but other headers might be a problem. Reporter also says Firefox should be implemented not to reuse stream that is connected to the HTTP proxy when it starts connection to another web server. Workaround for Squid admins: disable keep-alive
330,220
2,800,009
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20060311 Firefox/1.6a1 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20060311 Firefox/1.6a1 freeze or clash, when click a link in history of Places Reproducible: Sometimes Steps to Reproduce: 1. open Places window, and History window. 2. click a link in history. 3. displaied "Waiting for (hostname)..." in status bar "Loading..." in tab Actual Results: 4. cannot open a link Expected Results: 4. open a link close Places window / Firefox's window, and restart Firefox. cannot start Firefox open task manager, click process tab. Firefox is found in process. it is zombie. It crashed once. TB16252592X
330,352
2,800,842
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1 Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.9a1) Gecko/20060313 Firefox/1.6a1 Note: This bug was originally reported to IPA (Information-technology Promotion Agency, Japan) and forwarded to us at Mozilla Japan. I'm NOT original reporter. Don't ask me about details. For more information about IPA, visit http://www.ipa.go.jp/about/english/ IPA#36438227 Reproducible: Always Steps to Reproduce: Loading the following script causes Firefox to crash: javascript:if("AB".match(/(.*?)*?B/)){alert(RegExp.lastMatch);} No problem with: javascript:if("AB".match(/(.*)*?B/)){alert(RegExp.lastMatch);} or javascript:if("AB".match(/(.*?)*B/)){alert(RegExp.lastMatch);} Actual Results: Firefox consumes large amounts of memory and CPU time of machine, causes application error, and crashes. Expected Results: Don't crash Comment from IPA: This bug allows websites to crash user machines or perform a DoS attack. We [IPA] have examined the problem and found that application error occurred at jsregexp.c. Attackers might run arbitrary code, but we have not found real way of code injection. IPA asked us to treat this bug confidential, but if there are no risks, uncheck the security mark.
342,219
2,888,699
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20060620 SeaMonkey/1.5a Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20060620 SeaMonkey/1.5a In the current nightly build selecting Tools > Download Manager causes a crash in Seamonkey The Seamon~1.EXE Application Error reads: The instruction at "0x603fc2e2" referenced memory at "0x00000000". The memory could not be "read". Click on OK to terminate the program Click on CANCEL to debug the program The Netscape Quality Feedback Agent - Mozella Trunk is then run and it sends back a report if I tell it to, which I always do. Reproducible: Always Steps to Reproduce: 1. Select Tool Menu 2. Select Download Manager 3. Brings up Seamon~1.EXE Application Error Actual Results: The Seamon~1.EXE Application Error reads: The instruction at "0x603fc2e2" referenced memory at "0x00000000". The memory could not be "read". Click on OK to terminate the program Click on CANCEL to debug the program The Netscape Quality Feedback Agent - Mozella Trunk is then run Expected Results: Download Manager should run as expected. It runs when a download is selected from a web page.
342,448
2,890,925
STEPS TO REPRODUCE: Click URL in this bug, or just mistakenly flip the two args to any setTimeout call. ACTUAL RESULTS: crash EXPECTED RESULTS: exception MORE INFORMATION: ###!!! ASSERTION: No expression, so no handler text!: 'mExpr', file ../../../../mozilla/dom/src/base/nsJSTimeoutHandler.cpp, line 316 I bet the issue is that nsJSScriptTimeoutHandler::Init returns NS_OK even though it's throwing an exception, so we end up still setting up the timeout or something silly like that.
291,516
2,483,814
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8b2) Gecko/20050421 Firefox/1.0+ Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8b2) Gecko/20050421 Firefox/1.0+ The fix to bug 254225 hastily eliminated the Command-LeftArrow and Command-RightArrow keyboard shortcuts from Mac builds. This was seemingly done without any discussion. These keyboard shortcuts have been in every Mac browser since the beginning of time. It's one thing if Firefox does not wish to use these keystrokes as its primary shortcuts or expose them in the Go menu, but it's another thing entirely to remove them altogether. All other Mac browsers, including Safari, Camino, and Seamonkey, support the Command-Arrow shortcuts IN ADDITION to Command-[ and Command-]. In each case, the [ and ] shortcuts are the ones visible in the menus, but the arrows still work. When bug 117186 was fixed (the Seamonkey companion to bug 254225), the Command-Arrow shortcuts were allowed to remain. The Command-Arrow shortcuts are what many users expect, and they should not be removed. Reproducible: Always Steps to Reproduce:
292,257
2,489,090
To reproduce: 1. Go to URL 2. See crash This is a rather recent regression, so not the same as the other two crashers with nsHTMLReflowState::ComputePadding in frame 0 of the stacktrace. This regressed between 2005-02-18-06 and 2005-02-19-06. Bonsai link: http://bonsai.mozilla.org/cvsquery.cgi?treeid=default&module=SeaMonkeyAll&branch=HEAD&branchtype=match&filetype=match&whotype=match&sortby=Date&hours=2&date=explicit&mindate=2005-02-18+05%3A00%3A00&maxdate=2005-02-19+07%3A00%3A00&cvsroot=%2Fcvsroot Stacktrace: nsHTMLReflowState::ComputePadding(nsHTMLReflowState * const 0x02d28ea0, int 0x00000a8c, const nsHTMLReflowState * 0x0012e3ac) line 2435 + 2 bytes nsHTMLReflowState::InitConstraints(nsHTMLReflowState * const 0x02d28ea0, nsPresContext * 0x02c71d40, int 0x00000a8c, int 0x00000267, nsMargin * 0x00000000, nsMargin * 0x00000000) line 1718 nsHTMLReflowState::Init(nsHTMLReflowState * const 0x02d28ea0, nsPresContext * 0x02c71d40, int 0xffffffff, int 0xffffffff, nsMargin * 0x00000000, nsMargin * 0x00000000) line 337 + 22 bytes nsHTMLReflowState::nsHTMLReflowState(nsHTMLReflowState * const 0x02d28ea0, nsPresContext * 0x02c71d40, const nsHTMLReflowState & {...}, nsIFrame * 0x02d28ea0, const nsSize & {...}) line 261 nsObjectFrame::HandleChild(nsObjectFrame * const 0x02d28ea0, nsPresContext * 0x02c71d40, nsHTMLReflowMetrics & {...}, const nsHTMLReflowState & {...}, unsigned int & 0x00000000, nsIFrame * 0x02d28ea0) line 1446 nsObjectFrame::Reflow(nsObjectFrame * const 0x000000b4, nsPresContext * 0x02c71d40, nsHTMLReflowMetrics & {...}, const nsHTMLReflowState & {...}, unsigned int & 0x00000000) line 1041 + 20 bytes nsLineLayout::ReflowFrame(nsLineLayout * const 0x02d28ea0, nsIFrame * 0x02ca819c, unsigned int & 0x00000000, nsHTMLReflowMetrics * 0x00000000, int & 0x00000000) line 999 nsInlineFrame::ReflowInlineFrame(nsInlineFrame * const 0x02d28ea0, nsPresContext * 0x02c71d40, const nsHTMLReflowState & {...}, nsInlineFrame::InlineReflowState & {...}, nsIFrame * 0x02ca819c, unsigned int & 0x00000000) line 712 nsInlineFrame::ReflowFrames(nsInlineFrame * const 0x02d28ea0, nsPresContext * 0x02c71d40, const nsHTMLReflowState & {...}, nsInlineFrame::InlineReflowState & {...}, nsHTMLReflowMetrics & {...}, unsigned int & 0x00000000) line 530 nsInlineFrame::Reflow(nsInlineFrame * const 0x02ca80a4, nsPresContext * 0x02c71d40, nsHTMLReflowMetrics & {...}, const nsHTMLReflowState & {...}, unsigned int & 0x00000000) line 444 nsLineLayout::ReflowFrame(nsLineLayout * const 0x02d28ea0, nsIFrame * 0x02ca80a4, unsigned int & 0x00000000, nsHTMLReflowMetrics * 0x00000000, int & 0x00000000) line 999 nsBlockFrame::ReflowInlineFrame(nsBlockFrame * const 0x02d28ea0, nsBlockReflowState & {...}, nsLineLayout & {...}, nsLineList_iterator {...}, nsIFrame * 0x00000000, unsigned char * 0x0012e763) line 4187 + 29 bytes nsBlockFrame::DoReflowInlineFrames(nsBlockFrame * const 0x02d28ea0, nsBlockReflowState & {...}, nsLineLayout & {...}, nsLineList_iterator {...}, int * 0x0012e95c, unsigned char * 0x0012e82b, int 0x00000000, int 0x00000001) line 3840
289,292
2,467,412
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050406 Firefox/1.0+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050406 Firefox/1.0+ Firefox frequently crash or freeze while loading http://www.phoenixjp.net/news/fr/. This bug has been present for approximately 2 months (maybe more, I don't remember) in the trunk builds. It should load the page whithout crashing or freezing. Sometimes the page load well, sometimes I have to retry 5 or more times to succesfully load it. When it freezes, I have to kill Firefox's process in the task manager. Reproducible: Sometimes Steps to Reproduce: 1. Navigate to http://www.phoenixjp.net/news/fr Actual Results: Firefox crash or freeze while opening the page Expected Results: Open the page without crashing or hanging Error when it crashes : FIREFOX.EXE - Application Error The instruction at "0x..." referenced memory at "0x...". The memory could not be "read". Click on OK to terminate the program Click on CANCEL to debug the program
289,765
2,471,117
Build IDs: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050409 Firefox/1.0+ Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.7) Gecko/20050409 Firefox/1.0.3 Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.6) Gecko/20050317 Firefox/1.0.2 StumbleUpon/1.9993 Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.5) Gecko/20041217 Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.6) Gecko/20050319 As I said in my comments on Bug 63817, I am going to file a new one on the crash when going to the URL http://spam.hixie.ch. I am not sure what causes the crash. During our long discussion about this issue in #bs, we came up with several ideas, which were relayed in comments on Bug 63817. One of the possibilities seems to be that there is a 404 for something on the page and the 404 is requesting a 301 causing the crash. Nobody really has any idea. At any rate, I have successfully crashed this once on Trunk, where it previously didn't crash, although I am not sure if the crash is going to be consistent on Trunk, since now it seems to want to simply hang. Previously, I was able to actually see the page on Trunk as it was supposed to be, without issue. On 1.7.5 and 1.7.6 Seamonkey, this crashes everytime. Same deal on 1.0.2 Milestone and 1.0.3/Aviary Nightly. In channel Aebrahim, Tom, and Chewie (Alexander) all reproduced this, so I am going to go ahead and mark it as NEW from the get-go. Chewie proposed there may be something in the server configuration that is causing the crash. At any rate, I would love for Hixie to give this some attention. Steps to Reproduce: 1. Make sure you don't have anything open you can't get back to. 2. Goto http://spam.hixie.ch 3. Crash and burn, baby Actual Results: Firefox/Seamonkey both crash. Expected Results: Render the page appropriately. Note: I wasn't sure where to file this, but put it where told: <jesus_X> umm, try http <jesus_X> it seems to be a header issue I think <Tristor> hmmz, okay <jesus_X> it core networking I am attaching the stacktraces and other information from the Talkback IDs I got from crashing it, which are: TB4973854Q (Trunk), TB4973989Z (Aviary), TB4974002E (Aviary), TB4974032X (Aviary), TB4975251H (Milestone), TB4975132M (1.7.6 Seamonkey) Any more information I can offer, I will be more than willing to share, but I can't think of much of anything else to add. Adding the crash, hang, and clean-report keywords, and helpwanted and qawanted for help testcasing/implementing this
290,038
2,473,159
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.7) Gecko/20050408 Firefox/1.0.3 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.7) Gecko/20050408 Firefox/1.0.3 By creating a special sherlock file it is possible to overwrite an existing search engine without a chance for the user to see what is going on. The displayed name in the confirmation dialog is given as the third parameter of sidebar.addSearchEngine(), but the displayed name in the search dropdown is taken from the sherlock file. This way it is possible to overwrite the default Google search with a modified version that monitors the data and/or waits for a chance to run code (see Firesearching 1 on demo page). The string "google.src" in the source URL got also be moved out of the dialog by supplying a really long URL to the sherlock file (the dialog just cuts the source URL when it's getting too long). Reproducible: Always Steps to Reproduce: 1. Open http://bugzilla:[email protected]/firesearching/ 2. Follow instructions The user will probably think the search engine installation just failed, because after confirming the installation dialog Firefox never displays an error messages if the installation failed because e.g. the sherlock file is broken or not found. Since there is no UI to see details about the installed searches a common user will probably never find out that the default Google search got modified. Using the built in sherlock update feature an attacker also gets a decent update mechanism to modifiy the scripts beyond the initial infection.
287,197
2,451,274
User-Agent: Mozilla/5.0 (X11; U; Linux i686 (x86_64); en-US; rv:1.8b2) Gecko/20050308 Build Identifier: Mozilla/5.0 (X11; U; Linux i686 (x86_64); en-US; rv:1.8b2) Gecko/20050308 comments in os_Linux_ia64.s were changed a few weeks ago. The change breaks builds on gcc 3.3.x. Is the change needed for gcc 4? Reproducible: Always Steps to Reproduce: . Actual Results: os_Linux_ia64.s:41: Error: junk at end of line, first unrecognized character is `/'
287,308
2,452,195
The following XUL code crashes Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050319 Firefox/1.0+ but not Firefox 1.0.x. It also crashes Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050305 <?xml version="1.0" encoding="UTF-8"?> <?xml-stylesheet href="chrome://global/skin/" type="text/css"?> <window xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul"> <menubar> <menu> <menupopup id="mypopup"> <menuitem label="Test"/> </menupopup> </menu> </menubar> <label value="Right-click me!" context="mypopup"/> </window> To reproduce, load this in the browser and right-click the label. Even if the popup had children, it wouldn't show (not sure that is correct) and when closing the window, browser crashes. The key here is 1) to put <menupopup/> in a place where it wouldn't be "found" by context property. Note that if you remove it altogether, the crash doesn't occur. 2) to use context, not menucontext on <label/>. From my limited testing, menucontext works relatively fine with this (that is not crashes, while still not showing the popup). I'm not able to track down the regression, the only thing I can say it happens with 20050128 build, the earliest Firefox trunk build I installed on my system. Talkback has never worked for me, so someone else will have to submit the report if it is needed. The bug is reproducible for me on a clean profile for me, so it shouldn't be much of a trouble. Not sure if it should go here, in Menus or in a completely separate place.
287,763
2,455,840
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.6) Gecko/20050317 Firefox/1.0.2 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.6) Gecko/20050317 Firefox/1.0.2 Received the following error after upgrading from tip: Software error: Insecure dependency in require while running with -T switch at /usr/lib/perl5/5.8.3/i586-linux-thread-multi/IO/Socket.pm line 22. Compilation failed in require at /usr/lib/perl5/vendor_perl/5.8.3/Net/LDAP.pm line 8. BEGIN failed--compilation aborted at /usr/lib/perl5/vendor_perl/5.8.3/Net/LDAP.pm line 8. Compilation failed in require at Bugzilla/Auth/Verify/LDAP.pm line 38. BEGIN failed--compilation aborted at Bugzilla/Auth/Verify/LDAP.pm line 38. Compilation failed in require at Bugzilla/Auth.pm line 43. BEGIN failed--compilation aborted at Bugzilla/Auth.pm line 45. Compilation failed in require at Bugzilla.pm line 28. BEGIN failed--compilation aborted at Bugzilla.pm line 28. Compilation failed in require at Bugzilla/Bug.pm line 38. BEGIN failed--compilation aborted at Bugzilla/Bug.pm line 38. Compilation failed in require at CGI.pl line 48. BEGIN failed--compilation aborted at CGI.pl line 48. Software error: [Fri Mar 25 19:42:52 2005] index.cgi: Insecure dependency in require while running with -T switch at /usr/lib/perl5/5.8.3/i586-linux-thread-multi/IO/Socket.pm line 22. [Fri Mar 25 19:42:52 2005] index.cgi: Compilation failed in require at /usr/lib/perl5/vendor_perl/5.8.3/Net/LDAP.pm line 8. [Fri Mar 25 19:42:52 2005] index.cgi: BEGIN failed--compilation aborted at /usr/lib/perl5/vendor_perl/5.8.3/Net/LDAP.pm line 8. [Fri Mar 25 19:42:52 2005] index.cgi: Compilation failed in require at Bugzilla/Auth/Verify/LDAP.pm line 38. [Fri Mar 25 19:42:52 2005] index.cgi: BEGIN failed--compilation aborted at Bugzilla/Auth/Verify/LDAP.pm line 38. [Fri Mar 25 19:42:52 2005] index.cgi: Compilation failed in require at Bugzilla/Auth.pm line 43. [Fri Mar 25 19:42:52 2005] index.cgi: BEGIN failed--compilation aborted at Bugzilla/Auth.pm line 45. [Fri Mar 25 19:42:52 2005] index.cgi: Compilation failed in require at Bugzilla.pm line 28. [Fri Mar 25 19:42:52 2005] index.cgi: BEGIN failed--compilation aborted at Bugzilla.pm line 28. [Fri Mar 25 19:42:52 2005] index.cgi: Compilation failed in require at Bugzilla/Bug.pm line 38. [Fri Mar 25 19:42:52 2005] index.cgi: BEGIN failed--compilation aborted at Bugzilla/Bug.pm line 38. [Fri Mar 25 19:42:52 2005] index.cgi: Compilation failed in require at CGI.pl line 48. [Fri Mar 25 19:42:52 2005] index.cgi: BEGIN failed--compilation aborted at CGI.pl line 48. Compilation failed in require at /admin/Bugzilla/index.cgi line 33. The system was running fine prior to the upgrade from cvs tip. Reproducible: Always Steps to Reproduce: 1.Upgrade test system to latest cvs tip. 2.Run Bugzilla :-) 3.Lather, rinse, repeat
287,956
2,457,252
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8b2) Gecko/20050326 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8b2) Gecko/20050326 Immediately following startup Thunderbird begins checking for new mail and performaing virus scan. Within thirty seconds the program throws core with a Signal 11. Reproducible: Always Steps to Reproduce: Stack trace coming. Looks like this is happening in libnecko.so.
289,156
2,466,263
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.6) Gecko/20050317 Firefox/1.0.2 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.6) Gecko/20050403 Firefox/1.0.1 Setting up the request like this: req = new XMLHttpRequest(); req.overrideMimeType("gzip"); ... After readystate notifies me that the document is finished loading the reponseXML object is null but when accessing the responseText I get the following stack trace: > xmlextras.dll!nsXMLHttpRequest::DetectCharset(nsACString & aCharset={...}) Line 494 + 0x1f C++ xmlextras.dll!nsXMLHttpRequest::ConvertBodyToText(nsAString & aOutBuffer={...}) Line 523 + 0xf C++ xmlextras.dll!nsXMLHttpRequest::GetResponseText(nsAString & aResponseText={...}) Line 605 + 0xc C++ xpcom.dll!XPTC_InvokeByIndex(nsISupports * that=0x065ffac0, unsigned int methodIndex=5, unsigned int paramCount=1, nsXPTCVariant * params=0x0012ad70) Line 102 C++ xpc3250.dll!XPCWrappedNative::CallMethod(XPCCallContext & ccx={...}, XPCWrappedNative::CallMode mode=CALL_GETTER) Line 2034 + 0x1e C++ xpc3250.dll!XPCWrappedNative::GetAttribute(XPCCallContext & ccx={...}) Line 1884 + 0xe C++ xpc3250.dll!XPC_WN_GetterSetter(JSContext * cx=0x065c4028, JSObject * obj=0x065cae40, unsigned int argc=0, long * argv=0x06609080, long * vp=0x0012b058) Line 1319 + 0xc C++ js3250.dll!js_Invoke(JSContext * cx=0x065c4028, unsigned int argc=0, unsigned int flags=2) Line 949 + 0x20 C js3250.dll!js_InternalInvoke(JSContext * cx=0x065c4028, JSObject * obj=0x065cae40, long fval=106742112, unsigned int flags=0, unsigned int argc=0, long * argv=0x00000000, long * rval=0x0012b9f0) Line 1043 + 0x14 C js3250.dll!js_InternalGetOrSet(JSContext * cx=0x065c4028, JSObject * obj=0x065cae40, long id=43859552, long fval=106742112, JSAccessMode mode=JSACC_READ, unsigned int argc=0, long * argv=0x00000000, long * rval=0x0012b9f0) Line 1086 + 0x1f C js3250.dll!js_GetProperty(JSContext * cx=0x065c4028, JSObject * obj=0x065cae40, long id=43859552, long * vp=0x0012b9f0) Line 2768 + 0x30 C js3250.dll!js_Interpret(JSContext * cx=0x065c4028, long * result=0x0012bb38) Line 2823 + 0x709 C js3250.dll!js_Invoke(JSContext * cx=0x065c4028, unsigned int argc=1, unsigned int flags=2) Line 966 + 0xd C js3250.dll!js_InternalInvoke(JSContext * cx=0x065c4028, JSObject * obj=0x0656fb10, long fval=106365544, unsigned int flags=0, unsigned int argc=1, long * argv=0x065f8830, long * rval=0x0012bccc) Line 1043 + 0x14 C js3250.dll!JS_CallFunctionValue(JSContext * cx=0x065c4028, JSObject * obj=0x0656fb10, long fval=106365544, unsigned int argc=1, long * argv=0x065f8830, long * rval=0x0012bccc) Line 3698 + 0x1f C gklayout.dll!nsJSContext::CallEventHandler(JSObject * aTarget=0x0656fb10, JSObject * aHandler=0x06570268, unsigned int argc=1, long * argv=0x065f8830, long * rval=0x0012bccc) Line 1297 + 0x21 C++ gklayout.dll!GlobalWindowImpl::RunTimeout(nsTimeoutImpl * aTimeout=0x06608cd8) Line 5390 C++ gklayout.dll!GlobalWindowImpl::TimerCallback(nsITimer * aTimer=0x06608da8, void * aClosure=0x06608cd8) Line 5752 C++ xpcom.dll!nsTimerImpl::Fire() Line 382 + 0x11 C++ xpcom.dll!nsTimerManager::FireNextIdleTimer() Line 616 C++ gkwidget.dll!nsAppShell::GetNativeEvent(int & aRealEvent=1, void * & aEvent=0x01113950) Line 197 C++ appshell.dll!nsXULWindow::ShowModal() Line 362 + 0x1f C++ appshell.dll!nsWebShellWindow::ShowModal() Line 1104 C++ appshell.dll!nsContentTreeOwner::ShowAsModal() Line 468 C++ embedcomponents.dll!nsWindowWatcher::OpenWindowJS(nsIDOMWindow * aParent=0x0297854c, const char * aUrl=0x0658ad08, const char * aName=0x0012c498, const char * aFeatures=0x0012c4f0, int aDialog=1, unsigned int argc=2, long * argv=0x06070fac, nsIDOMWindow * * _retval=0x0012c624) Line 786 C++ gklayout.dll!GlobalWindowImpl::OpenInternal(const nsAString & aUrl={...}, const nsAString & aName={...}, const nsAString & aOptions={...}, int aDialog=1, long * argv=0x06070fa0, unsigned int argc=5, nsISupports * aExtraArgument=0x00000000, nsIDOMWindow * * aReturn=0x0012c9a4) Line 4983 + 0x8f C++ gklayout.dll!GlobalWindowImpl::OpenDialog(nsIDOMWindow * * _retval=0x0012c9a4) Line 3560 + 0x35 C++ xpcom.dll!XPTC_InvokeByIndex(nsISupports * that=0x02978550, unsigned int methodIndex=16, unsigned int paramCount=1, nsXPTCVariant * params=0x0012c9a4) Line 102 C++ xpc3250.dll!XPCWrappedNative::CallMethod(XPCCallContext & ccx={...}, XPCWrappedNative::CallMode mode=CALL_METHOD) Line 2034 + 0x1e C++ xpc3250.dll!XPC_WN_CallMethod(JSContext * cx=0x02977e78, JSObject * obj=0x02a1b790, unsigned int argc=5, long * argv=0x06070fa0, long * vp=0x0012cc78) Line 1287 + 0xe C++ js3250.dll!js_Invoke(JSContext * cx=0x02977e78, unsigned int argc=5, unsigned int flags=0) Line 949 + 0x20 C js3250.dll!js_Interpret(JSContext * cx=0x02977e78, long * result=0x0012d5f0) Line 2992 + 0xf C js3250.dll!js_Invoke(JSContext * cx=0x02977e78, unsigned int argc=0, unsigned int flags=0) Line 966 + 0xd C js3250.dll!js_Interpret(JSContext * cx=0x02977e78, long * result=0x0012dee4) Line 2992 + 0xf C js3250.dll!js_Invoke(JSContext * cx=0x02977e78, unsigned int argc=1, unsigned int flags=2) Line 966 + 0xd C js3250.dll!js_InternalInvoke(JSContext * cx=0x02977e78, JSObject * obj=0x0301b238, long fval=50442832, unsigned int flags=0, unsigned int argc=1, long * argv=0x0012e1d8, long * rval=0x0012e1e0) Line 1043 + 0x14 C js3250.dll!JS_CallFunctionValue(JSContext * cx=0x02977e78, JSObject * obj=0x0301b238, long fval=50442832, unsigned int argc=1, long * argv=0x0012e1d8, long * rval=0x0012e1e0) Line 3698 + 0x1f C gklayout.dll!nsJSContext::CallEventHandler(JSObject * aTarget=0x0301b238, JSObject * aHandler=0x0301b250, unsigned int argc=1, long * argv=0x0012e1d8, long * rval=0x0012e1e0) Line 1297 + 0x21 C++ gklayout.dll!nsJSEventListener::HandleEvent(nsIDOMEvent * aEvent=0x06390ea8) Line 175 + 0x2b C++ gklayout.dll!nsXBLPrototypeHandler::ExecuteHandler(nsIDOMEventReceiver * aReceiver=0x03006290, nsIDOMEvent * aEvent=0x06390ea8) Line 463 C++ gklayout.dll!nsXBLWindowHandler::WalkHandlersInternal(nsIDOMEvent * aEvent=0x06390ea8, nsIAtom * aEventType=0x00e74d08, nsXBLPrototypeHandler * aHandler=0x06557188) Line 297 + 0x18 C++ gklayout.dll!nsXBLWindowKeyHandler::WalkHandlers(nsIDOMEvent * aKeyEvent=0x06390ea8, nsIAtom * aEventType=0x00e74d08) Line 196 C++ gklayout.dll!nsXBLWindowKeyHandler::KeyPress(nsIDOMEvent * aKeyEvent=0x06390ea8) Line 249 C++ gklayout.dll!DispatchToInterface(nsIDOMEvent * aEvent=0x06390ea8, nsIDOMEventListener * aListener=0x02dc18a0, unsigned int (nsIDOMEvent *)* aMethod=0x01d92600, const nsID & aIID={...}, int * aHasInterface=0x0012ea88) Line 127 + 0xb C++ gklayout.dll!nsEventListenerManager::HandleEvent(nsIPresContext * aPresContext=0x02a8cba0, nsEvent * aEvent=0x0012f2c8, nsIDOMEvent * * aDOMEvent=0x0012ef38, nsIDOMEventTarget * aCurrentTarget=0x02a20274, unsigned int aFlags=514, nsEventStatus * aEventStatus=0x0012f0f0) Line 1524 + 0x23 C++ gklayout.dll!nsXULDocument::HandleDOMEvent(nsIPresContext * aPresContext=0x02a8cba0, nsEvent * aEvent=0x0012f2c8, nsIDOMEvent * * aDOMEvent=0x0012ef38, unsigned int aFlags=514, nsEventStatus * aEventStatus=0x0012f0f0) Line 1261 C++ gklayout.dll!nsXULElement::HandleDOMEvent(nsIPresContext * aPresContext=0x02a8cba0, nsEvent * aEvent=0x0012f2c8, nsIDOMEvent * * aDOMEvent=0x0012ef38, unsigned int aFlags=519, nsEventStatus * aEventStatus=0x0012f0f0) Line 2864 + 0x36 C++ gklayout.dll!PresShell::HandleEventInternal(nsEvent * aEvent=0x0012f2c8, nsIView * aView=0x02aaba00, unsigned int aFlags=1, nsEventStatus * aStatus=0x0012f0f0) Line 6084 + 0x37 C++ gklayout.dll!PresShell::HandleEvent(nsIView * aView=0x02aaba00, nsGUIEvent * aEvent=0x0012f2c8, nsEventStatus * aEventStatus=0x0012f0f0, int aForceHandle=1, int & aHandled=1) Line 5921 + 0x19 C++ gklayout.dll!nsViewManager::HandleEvent(nsView * aView=0x02aaba00, nsGUIEvent * aEvent=0x0012f2c8, int aCaptured=0) Line 2280 C++ gklayout.dll!nsViewManager::DispatchEvent(nsGUIEvent * aEvent=0x0012f2c8, nsEventStatus * aStatus=0x0012f224) Line 2066 + 0x14 C++ gklayout.dll!HandleEvent(nsGUIEvent * aEvent=0x0012f2c8) Line 77 C++ gkwidget.dll!nsWindow::DispatchEvent(nsGUIEvent * event=0x0012f2c8, nsEventStatus & aStatus=nsEventStatus_eIgnore) Line 1067 + 0xa C++ gkwidget.dll!nsWindow::DispatchWindowEvent(nsGUIEvent * event=0x0012f2c8) Line 1088 C++ gkwidget.dll!nsWindow::DispatchKeyEvent(unsigned int aEventType=131, unsigned short aCharCode=111, unsigned int aVirtualCharCode=0, long aKeyData=0) Line 2978 + 0xf C++ gkwidget.dll!nsWindow::OnChar(unsigned int mbcsCharCode=15, unsigned int virtualKeyCode=0, bool isMultiByte=false) Line 3165 C++ gkwidget.dll!nsWindow::ProcessMessage(unsigned int msg=258, unsigned int wParam=15, long lParam=1572865, long * aRetValue=0x0012f77c) Line 3880 + 0x22 C++ gkwidget.dll!nsWindow::WindowProc(HWND__ * hWnd=0x001f0218, unsigned int msg=258, unsigned int wParam=15, long lParam=1572865) Line 1349 + 0x1b C++ Reproducible: Always Steps to Reproduce:
293,388
2,496,761
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.7) Gecko/20050414 Firefox/1.0.3 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050508 When innerHTML of a div is overwrited by innerHTML of a iframe, the loading icon starts and can't be stoped, on multiple tryes browser can crash. I have created a loop function what call the function multiple times, to crash the browser.. The main problem is the loading icon.. I really need that script for my site(i trying to create a iframe with dynamic width&height).. Reproducible: Sometimes Steps to Reproduce: 1. Execute the function what overwrite the DIV innerHTML (after that, the loading icon starts and can't be stoped) 2. Execute multiple times.. You can do that with a loop.. (See my url) 3. Actual Results: Firstly the loadin animation can't be stopped.. If you repeat multiple times, browser can crash. Expected Results: The loading animation should stop after loading Browser shouldn't crash Here is ff_crash.html <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <html><head> <title>Crasher</title> </head><body> <div id="dynamicdiv"> <iframe onLoad="insertIt();" name="dynamicframe" scrolling="no" frameborder="0" src="blank.html" height="100%" width="100%"></iframe> </div> <script language="JavaScript"> function insertIt() { var _y = document.getElementById('dynamicdiv'); var _x = window.frames[0].document.body.innerHTML; _y.innerHTML = _x; } function makeIframe() { var newIframe = document.createElement('iframe'); newIframe.onload = function() { insertIt(); } newIframe.name ='dynamicframe'; newIframe.scrolling='no'; newIframe.frameborder='0'; newIframe.src ='blank.html'; newIframe.height='100%'; newIframe.width='100%'; document.getElementById('dynamicdiv').appendChild(newIframe); } function Loop() { for(i = 1; i <= 30; i++) makeIframe(); } </script> <a onclick="Loop();">Press to Crash</a> </body</body></html> Another version.. Also cause to crash.. Insted of function makeIframe() { var newIframe = document.createElement('iframe'); newIframe.onload = function() { insertIt(); } newIframe.name ='dynamicframe'; newIframe.scrolling='no'; newIframe.frameborder='0'; newIframe.src ='blank.html'; newIframe.height='100%'; newIframe.width='100%'; document.getElementById('dynamicdiv').appendChild(newIframe); } Also can be ussed.. function makeIframe() { var _y = document.getElementById('dynamicdiv'); _y.innerHTML = '<iframe onLoad="insertIt();" name="dynamicframe" scrolling="no" frameborder="0" src="blank.html" height="100%" width="100%"></iframe>'; } Same too be same resultat.. Here is Mozilla crash info.. A bit long.. Oh.. Too long.. If you still need it, send me a email.. Application Information Application Launch Time 08.05.2005 18:19 Build Identifier 2005050805 Deployment Identifier MozillaOrgMozillaTrunkWin322005050805 Interface Version 8 (0x00000008) Monitor Configuration Version 1 (0x00000001) Platform Identifier Win32 Product Identifier MozillaTrunk Talkback Configuration Version 1 (0x00000001) Talkback Library Version 7 (0x00000007) Vendor Identifier MozillaOrg Runtime Information Active Application 2084 (0x00000824) Command Line "C:\Program Files\mozilla.org\Mozilla\Mozilla.exe" -installer Contents of the Stack [ 0] 10 10 00 00 00 10 00 00 B0 53 12 00 00 10 00 00 [.........S......] [ 10] A8 5A E8 01 00 00 00 00 80 CA A3 00 00 00 00 00 [.Z..............] [ 20] F4 53 12 00 B3 BB 26 60 00 00 00 00 64 10 11 61 [.S....&`....d..a] [ 30] 00 EE 32 01 00 00 00 00 F0 C7 E8 01 01 00 00 00 [..2.............] [ 40] 74 AB E8 01 00 00 00 00 00 26 E2 01 8F 70 15 60 [t........&...p.`] [ 50] 00 00 00 00 10 54 12 00 6F 51 2A 60 70 AB E8 01 [.....T..oQ*`p...] [ 60] 00 00 00 00 00 EE 32 01 14 CB CF 01 00 26 E2 01 [......2......&..] [ 70] 68 54 12 00 6D 12 29 60 A8 5A E8 01 88 1C B5 01 [hT..m.)`.Z......] [ 80] 2C 12 C3 01 18 50 E5 01 00 00 00 00 33 C7 25 60 [,....P......3.%`] [ 90] 00 00 00 00 2C 12 C3 01 00 EE 32 01 10 12 C3 01 [....,.....2.....] [ A0] 6C 54 12 00 88 1C B5 01 00 00 00 00 00 00 00 00 [lT..............] [ B0] 01 00 00 00 00 00 00 00 18 50 E5 01 C8 ED 32 01 [.........P....2.] [ C0] 50 50 E5 01 14 CB CF 01 88 54 12 00 7C 0F 29 60 [PP.......T..|.)`] [ D0] 00 EE 32 01 01 00 00 00 2C 12 C3 01 18 50 E5 01 [..2.....,....P..] [ E0] 2C 12 C3 01 00 00 00 00 A4 54 12 00 02 07 27 60 [,........T....'`] [ F0] 18 50 E5 01 00 00 00 00 00 EE 32 01 B8 EC 32 01 [.P........2...2.] [ 100] C8 AC E1 01 B4 55 12 00 D5 CA 25 60 18 50 E5 01 [.....U....%`.P..] [ 110] 00 00 00 00 00 EE 32 01 10 12 C3 01 88 12 C3 01 [......2.........] [ 120] B8 E7 BD 01 58 BC CE 01 00 00 00 00 58 BC CE 01 [....X.......X...] [ 130] 34 98 11 60 C9 C3 C2 77 00 00 27 00 00 00 00 00 [4..`...w..'.....] ............. [ 60] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [................] [ 70] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [................] [ 80] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [................] [ 90] 00 00 00 00 [....] Thanks guys ;) I'm from Moldova (if that matter ;o) If you have a workarround.. Please let me know.. I need a solution to make that code work properly on all browsers(on IE works just fine).. Need an autoresizeble iframe..
294,195
2,502,158
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4 Using substr() method on string containing references to elements matched by regular expression crashes Firefox. Reproducible: Always Steps to Reproduce: 1. Call replace() method on a string in JS script in a similar way as shown on test page Actual Results: Browser crashes Expected Results: Definitely not crash.
294,235
2,502,350
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050515 Firefox/1.0+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050515 Firefox/1.0+ On loading http://www.powweb.com/ Firefox seems to get stuck halfway through loading the page. Either it just hangs or completely crashes. Reference conversation on Mozillazine: http://forums.mozillazine.org/viewtopic.php?t=265680 Reproducible: Always Steps to Reproduce: 1. Type www.powweb.com in location bar 2. Wait for it to load 3. Actual Results: Firefox crashes Expected Results: Page should load normally or catch error.
295,052
2,508,083
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4 (ax) Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4 (ax) The following Javascript code will crash both Firefox and Mozilla: "".match.apply() Reproducible: Always Steps to Reproduce: Type the following code into a webpage or the Javascript console and execute it: "".match.apply() Actual Results: Mozilla / Firefox crashes. Expected Results: It should have executed the match method. I've tested this with Firefox 1.04 and Mozilla 1.7.1 on Windows XP. In Mozilla 1.7.1: AppName: mozilla.exe AppVer: 1.7.20040.5185 ModName: js3250.dll ModVer: 4.0.0.0 Offset: 0003ca05 In Firefox 1.0.4: Will add crash report in comment.
295,430
2,510,860
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) Build Identifier: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.8b2) Gecko/20050524 Firefox/1.0+ (2005052406) Reproducible: Always Steps to Reproduce: 1. navigate the browser to javascript: XPCNativeWrapper.prototype.toString(); Actual Results: the browser crashes. Expected Results: do not crash and display the string value of XPCNativeWrapper.prototype. FIREFOX caused an invalid page fault in module FIREFOX.EXE at 015f:00419f55.
283,562
2,425,214
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.5) Gecko/20041107 Firefox/1.0 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.5) Gecko/20041107 Firefox/1.0 Software error: Insecure dependency in parameter 3 of DBI::db=HASH(0x8f3c9f8)->selectrow_array method call while running with -T switch at Bugzilla/User.pm line 1016. in 2.19.2 development release Reproducible: Always Steps to Reproduce: 1.Home Page 2.New Account 3. Fill email and name and create account Actual Results: Software error: Insecure dependency in parameter 3 of DBI::db=HASH(0x8f3c9f8)->selectrow_array method call while running with -T switch at Bugzilla/User.pm line 1016. Expected Results: Should have created the user and sent email with password
295,670
2,512,544
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050526 Firefox/1.0+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050526 Firefox/1.0+ On http://www.demonhunter.net if you click "media" it will crash browser (3/4 of the time) Reproducible: Sometimes Steps to Reproduce: 1. Goto www.demonhunter.net 2. Click Media in the menu 3. Click it again if nothing happens Actual Results: Crashes browser. Expected Results: Not crash.
296,528
2,518,501
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322; .NET CLR 1.0.3705) Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4 When I drag a file from an FTP site (that I have read/write access to) into Mozilla Firefox, it deletes it from the FTP without asking!!! This has happened with any version of Firefox I have used. Reproducible: Always Steps to Reproduce: 1. Log into an FTP site using either Windows Explorer or Internet Explorer 2. Find a file that you wish to view in Firefox 3. Drag the file from the Explorer window into Firefox 4. Watch your file disappear from Explorer! 5. Refresh the Explorer window, and the file is not there. It has been deleted off the server. Actual Results: The file was deleted off the FTP Expected Results: If I drag a local file from my hard drive into Firefox, it loads it. If I run IE, and drag a file from an FTP into it, it loads the page from the FTP. This is what Firefox should do too. I have no problem logging in a second time to the FTP through Firefox...I just don't like it deleting my files :).
297,079
2,522,386
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050608 Firefox/1.0+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050608 Firefox/1.0+ If you have the ScrapBook extension installed and you perform a particular click sequence, Deer Park Alpha 1 will crash. Note: You will need to follow these instructions *precisely* to be able to reproduce this. It is reproducibly, but only with certain specific sequences of actions (right down to the mouse click and location of clicking). Firefox 1.0.4 is not affected. Reproduced with ScrapBook versions 0.15.3 or 0.15.4 (latest) Reproducible: Always Steps to Reproduce: 1. Install Firefox Deer Park Alpha 1 2. Create a new profile and install ScrapBook - either 0.15.3 or 0.15.4 (latest) 3. After restarting to browser, select Tools --> SrapBook 4. Now is when you need to be precise: 5. In the ScrapBook side panel, single click (and release) the search icon so that the menu pops up 6. While that menu is still up, move your mouse pointer to a blank region on the Firefox main menu bar and single click (and release) 7. Select Tools --> ScrapBook 8. At this point, Firefox should have crashed. Actual Results: Firefox crashed Expected Results: The ScrapBook sidebar should have disappeared, and Firefox should not have crashed. I originally reported this to the ScrapBook extension developer, on June 3; however, I have received no feedback. It is difficult for me to tell if this is a purely ScrapBook issue or if this is a case where a particular combination has revealed a flaw in Deer Park. OS version: Microsoft Windows XP, SP2 + all patches Reporduced with latest trunk: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b2) Gecko/20050608 Firefox/1.0+
255,715
2,233,676
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.6) Gecko/20040207 Firefox/0.8 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.6) Gecko/20040207 Firefox/0.8 When we link a web page to a XBL file with a binding element with no id, Mozilla crashes. A testcase is given by the URL : The XBL file contains : <?xml version="1.0"?> <xbl:bindings xmlns:xbl="http://www.mozilla.org/xbl"> <xbl:binding id="b" /> <xbl:binding /> </xbl:bindings> If we add an `id="b2"` to the last xbl:binding, there is no more crash. And even if you add `xbl:id="b2"` the browser still crashes... Reproducible: Always Steps to Reproduce: 1. Open a page linked with a XBL file with a binding element without id attribute Actual Results: Crash Expected Results: No crash Verified with Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.2) Gecko/20040813 Firefox/0.9.1+, Mozilla/5.0 (X11; U; Linux i686; fr; rv:1.6) Gecko/20040207 Firefox/0.8, and Mozilla 1.8a3 Linux TalkBack : TB569654X
256,108
2,236,534
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.2) Gecko/20040816 Firefox/0.9.1+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.2) Gecko/20040816 Firefox/0.9.1+ It could be reproduced on Firefox nightly with Gecko 1.7.2, and Mozilla 1.8alpha3. Reproducible: Always Steps to Reproduce: 1. Go to http://literarymoose.info/ 2. View -> Use Style -> None. 3. Crashes.
256,642
2,240,012
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322) Build Identifier: N.A. We have found that the following two lines in JS_ArenaFreeAllocation expoes the spidermonkey of deallocations of unpredictable nature. if (pool->current == a) pool->current = &pool->first; After repositioning the current pool pointer we may come to a situation in which we have managed to allocate a number of bytes by using free bytes in already allocated arenas in the tempPool, without having to allocate new memory, nor having needed to fetch a new pool from the set of free arenas. If this happens we will possibly deallocate memory that is still in use. This is because cg2mark which is stored in TOK_FUNCTION of emitTree will point to a pool which is not the last arena in the pool but rarher a arena in which a sufficient number of bytes have been found that allows us to store the needed structures. The result after having emitted the function body is that the tempPool is pruned from c2gmark, which will mean that active memory may be deallocated. Reproducible: Always Steps to Reproduce: It is very hard to describe the precise reproduction steps, the crash is dependant on a number of different factors such as: the DEBUG configuration set, what kind of native memory allocation algorithm is implemented, and the configuration of the target environment such as arena sizes. Actual Results: I have seen: ZPEs, Asserts in interpritation, as well as OS memory exceptions. Expected Results: Instead of the two lines in JS_ArenaFreeAllocation, however ambitious they are in concerning using any remaining bytes in the allocated areanas, it seems that we must repostion to the last arena to avoid the described problems. N.A.
260,541
2,266,500
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; rv:1.7.3) Gecko/20040913 Firefox/0.10 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; rv:1.7.3) Gecko/20040913 Firefox/0.10 Browser go boom due to poor coding ( self-referencing objects when the JS engine probably expected a string...) Reproducible: Always Steps to Reproduce: 1. Enable Javascript 2. Load a page with code such as var myErr = new Error( "Error Text" ); myErr.name = myErr; 3. Watch the Mozilla Talkback client do it's thing. Actual Results: The browser crashed. Expected Results: The browser should have laughed at my poor coding ability and moved along. TB896851K is the most specific. TB895978Q and TB895966E were sent before I tracked down the problem.
260,771
2,267,704
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a4) Gecko/20040919 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a4) Gecko/20040919 When editing an existing web document [we use a lot of templates with blockquote here], the composer will freeze, then cause a general crash when using blockquote to indent sections of a document. This happens when the browser is also open with pages with heavy graphic content. Reproducible: Always Steps to Reproduce: 1. Enter and existing html document in Composer 2. Attempt to use the keyboard Blockquote function 3. Entire Mozilla suite locks up and sends a report to Microsoft Actual Results: we get a lockup with a loss of everything since the last save. [We then curse and scream because sometimes we've lost part of a story!] Expected Results: Indented the paragraph or section of the document The software just returns a not responding error, then XP takes over and closes the entire Suite. We are running XP Pro with 1 GB of RAM and SP2 installed.
263,846
2,289,918
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7) Gecko/20040707 Firefox/0.9.2 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7) Gecko/20040707 Firefox/0.9.2 Click on "actueel" above the website http://www.hema.nl Firefox crashes and Netscape error message pop up. No idea why. Reproducible: Always Steps to Reproduce: 1. visit www.hema.nl 2. click on "actueel" above 3. crash. After restart FF: All icons in Bookmarks toolbar Folders are removed --> blanc icon (default)
264,873
2,297,610
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.3) Gecko/20040910 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.3) Gecko/20040910 guess the same as https://bugzilla.mozilla.org/show_bug.cgi?id=239563 , but on tab press Reproducible: Always Steps to Reproduce: 1. open a window using window.open 2. make sure the popup contains OnBlur="javascript:window.close()" 3. press TAB having the popup focussed Actual Results: mozilla exited, error occured Expected Results: window close or stay, dont really matter tried on 1.7.2, 1.7.3 and 2 other pc's
257,818
2,248,538
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a3) Gecko/20040902 Firefox/0.9.1+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a3) Gecko/20040902 Firefox/0.9.1+ When visiting that site, the browser crashes/get into an infinite loop. It is a regression. This does not happen in: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a3) Gecko/20040811 Firefox/0.9.1+ It happens in: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a3) Gecko/20040812 Firefox/0.9.1+ A Talkback ID I got is: TB717956X Reproducible: Always Steps to Reproduce: 1. 2. 3. Actual Results: Crash/infinite loop/freeze Expected Results: Just load the page
261,798
2,274,717
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.6) Gecko/20040207 Firefox/0.8 Build Identifier: http://ftp.mozilla.org/pub/mozilla.org/mozilla/releases/mozilla1.7.3/ When the method CSSStyleSheet::insertRule is called with an empty string as the CSS rule, the browser crashes (tested with Mozilla 1.7.3 and Firefox 1.0PR). Reproducible: Always Steps to Reproduce: 1. Open the file attached to this bug report with either Mozilla or Firefox. Actual Results: Crash. Expected Results: The JavaScript console should display an error (DOMException SYNTAX_ERR).
263,365
2,286,594
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; rv:1.7.3) Gecko/20040913 Firefox/0.10.1 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; rv:1.7.3) Gecko/20040913 Firefox/0.10.1 If I try to print preview the location map of the Leeds/Morley centre, Firefox crashes. Reproducible: Always Steps to Reproduce: 1. Open http://mypetstopdenton.co.uk 2. Click "Your nearest centre" 3. Click "MyPetStop Morley" 4. Click "Location Map" 5. Click Print Preview Actual Results: Firefox hangs Expected Results: Preview the image and not hang. default theme. nVidia 4200Ti graphics card drivers 61.77
265,692
2,303,365
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.3) Gecko/20041022 Firefox/1.0 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.3) Gecko/20041022 Firefox/1.0 Mousing over an image link does not show the url in the status bar. Reproducible: Always Steps to Reproduce: 1. Go to http://slashdot.org/ 2. Mouse over the slashdot logo at the top left (or any other image link) Actual Results: URL is not displayed in the firefox status bar Expected Results: URL is displayed in the firefox status bar This bug does not appear in the 20041020 aviary build, but it does appear in 20041022. Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.3) Gecko/20041022 Firefox/1.0
265,740
2,303,748
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; rv:1.7.3) Gecko/20041001 Firefox/0.10.1 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; rv:1.7.3) Gecko/20041001 Firefox/0.10.1 browser crashes some times when loading gmail and loading another tab Reproducible: Always Steps to Reproduce: 1.load firefox without home page (about:blank) 2.open using link gmail (www.gmail.com) 3.while loading load different address in same/different tab Actual Results: error messege - crash Expected Results: worked . . .
273,458
2,353,998
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a6) Gecko/20041203 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a6) Gecko/20041203 Sometimes, and only sometimes, Composer crashes if I CTRL+END. I haven't found any other pattern yet. Reproducible: Always Steps to Reproduce: 1. 2. 3.
268,119
2,319,688
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a5) Gecko/20041106 Firefox/0.9.1+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a5) Gecko/20041106 Firefox/0.9.1+ See upcoming testcase. The url did crash for me once, but is not really easy reproducable. It seems a regression: It doesn't happen with: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a5) Gecko/20041007 Firefox/0.9.1+ 7:21am It happens with: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a5) Gecko/20041008 Firefox/0.9.1+ 6:12am Bonsai link of that period: http://bonsai.mozilla.org/cvsquery.cgi?treeid=default&module=all&branch=HEAD&branchtype=match&dir=&file=&filetype=match&who=&whotype=match&sortby=Date&hours=2&date=explicit&mindate=2004-10-07+07%3A00%3A00&maxdate=2004-10-08+07%3A00%3A00&cvsroot=%2Fcvsroot A Talkback report: http://talkback-public.mozilla.org/talkback/fastfind.jsp?search=2&type=iid&id=TB1761978M Reproducible: Always Steps to Reproduce: 1. 2. 3.
279,697
2,395,766
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8a6) Gecko/20050111 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8a6) Gecko/20050111 In instance: <binding id="binding1"> <implementation> <getter> </getter> </implementation> </binding> Reproducible: Always Steps to Reproduce:
280,769
2,403,871
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.5) Gecko/20041107 Firefox/1.0 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.5) Gecko/20041107 Firefox/1.0 If the Number of Strings compared in the regular expression, ie: Newington|Abbeville|Abbotsford| ..... is more than a certain number, firefox will crash. On my machine that number happens to be exactly 2729. Comparing 2730 values will crash Firefox everytime. The attachment page provided, contains a regex comparing 2729 values, the last entry being 'x'. changing the last entry to 'xa' or will crash firefox. Reproducible: Always Steps to Reproduce: 1. Open Attachment Webpage in Firefox. 2. Copy the Address at the bottom of the page and paste it into the TextArea. 3. Click the "Check" Button. 4. If firefox does not Crash, Try editing the script and increase the number of elements compared in the Regular Expression. 5. The attachment page provided, contains a regex comparing 2729 values, the last entry being 'x'. changing the last entry to 'xa' crashes firefox on my machine. Actual Results: Crashed Expected Results: should alert the user if the string is matched. (works fine in browsers)
281,173
2,406,895
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8b) Gecko/20050204 Firefox/1.0+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8b) Gecko/20050204 Firefox/1.0+ chance of crash when scrolling on this page, only with smooth scrolling enabled. Reproducible: Sometimes Steps to Reproduce: 1. With the latest Beast build, create a new profile. 2. Set Tools > Options > Advanced to use Smooth Scrolling. 3. Go to http://www.arellanes.com/wordpress/index.php?m=200307 4. Position the mouse pointer so it will be over the main article (the white background) not the magnolia background that's to the left and right of the main article. 5. Whilst the page is loading & rendering, use the mouse-wheel to keep scrolling up & down really quickly. It doesn't matter if you don't scroll very far into the page, as long as whilst it's rendering the page is moving up and down a lot. If this doesn't work, try clearing the cache of your new profile and following steps 3-5 again. I get a 50% chance of a crash when following the above steps. I use a MS Intellimouse 4 which has a mouse-wheel that is properly analogue. ie: it's not 'notched' like othermice. I don't know if this exacerbates the problem. I also have a relatively slow connection (64kbps up, 300kbps down) - don't know if this makes the crash more likely either. Actual Results: Firefox can crash Expected Results: Firefox shouldn't crash Win2k SP4 With Intellipointer 5.2 drivers for MS Intellimouse 4.0a The moouse wheel isn't notched - it is totally smooth. Reproducing the crash happend 50% of the time with a mouse like this. The bug appears to be harder to reproduce if you don't have a smooth mouse wheel. Could this be a bug with the mouse drivers rather than firefox's fault? Talkback IDs: TB3493149K, 3507089 Forum thread: http://forums.mozillazine.org/viewtopic.php?t=212735
281,424
2,408,901
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b) Gecko/20050207 Firefox/1.0+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b) Gecko/20050207 Firefox/1.0+ In the FoxyTunes extension (http://www.foxytunes.org) there is a button (the button with a musical note) which when hovered over displays a popup. In the latest Firefox nightlies this causes a crash. The crash can be easily reproduced if you hover over the button several times. Reproducible: Always Steps to Reproduce: 1. Install FoxyTunes 1.1 from http://www.foxytunes.org 2. Hover over the 'info' button for a few times Actual Results: Browser crash
269,566
2,327,758
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a5) Gecko/20041111 Firefox/0.9.1+ Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a5) Gecko/20041111 Firefox/0.9.1+ Talkback was unfortunately not available (why ?) at installation time. Reproducible: Always Steps to Reproduce: 1. Load http://www.tiscali.be/FR/home/home_center.asp . 2. Reload 2 or 3 times. Actual Results: Crash. Expected Results: No crash. Firefox 1.0 displays the page without problem.
275,564
2,367,146
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a6) Gecko/20041220 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8a6) Gecko/20041220 message "XML Parsing Error: mismatched tag. Expected: </http://www.w3.org/1999/xhtml�script>. Line Number 181, Column 5: .." (reported A greater set of - entity definitions in conjunction with - script tags with file references leading to "XML mismatched tag" message text is sometimes showing random junk, e.g. out of Entity definitions) looks like a buffer overrun error: vanishing, - when some Entity declarations killed or - scripts wirh external file references are killed source using xhtml-math-svg/xhtml-math-svg.dtd Reproducible: Always Steps to Reproduce: 1. "Additional Information" is holding a nearly minimum XML file to reproduce the error 2. start the file NotMismatched.xml (the file, checked with W3C so far as possible, is not mismatched and - without SVG - running under firefox) 3. to disappear: take away first or last half of the Entities for greek uppercase letters or (alternatively) all script tags with external references Actual Results: I have to go back to build 2004112523 1. "XML mismatched tag" message, often with crazy additional messages XML Parsing Error: mismatched tag. "Expected: </http://www.w3.org/1999/xhtml�script>" etc. 2. some - maybe wrong - changes leading to crashes (automatically reported) 3. killing all script tags with references to files, a page is built up, also when changing the string in <html xmlns="http://www.w3.org/1999/xhtml" xmlns:sv... Expected Results: A RESULT LIKE THAT SEEN BY FIREFOX or better (not SVG version) builds up to 2004112523 were processing sufficiently, the SVG DOM acting as expected. Hoped to get marker functionality and have seen some - after killing all script references. <?xml version="1.0" encoding="ISO-8859-1" standalone="no"?> <?xml-stylesheet href="http://www.w3.org/StyleSheets/TR/W3C-REC.css" type="text/css"?> <?xml-stylesheet href="St_sCADch.css" type="text/css"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1 plus MathML 2.0 plus SVG 1.1//EN" "http://www.w3.org/2002/04/xhtml-math-svg/xhtml-math-svg.dtd" [ <!ENTITY abrasiveWork "&#x25BD;"> <!ENTITY aleph "&#x2135;"> <!ENTITY arc "&#x2312;"> <!ENTITY aroundProfile "&#x232E;"> <!ENTITY bowtie "&#x22C8;"> <!ENTITY button "&#x2751;"> <!ENTITY circle "&#x2299;"> <!ENTITY compose "&#x2384;"> <!ENTITY conical "&#x2332;"> <!ENTITY concentric "&#x233E;"> <!ENTITY copyright "&#x00A9;"> <!ENTITY counterBore "&#x2334;"> <!ENTITY counterSink "&#x2335;"> <!ENTITY curve "&#x219D;"> <!ENTITY cut "&#x2701;"> <!ENTITY cylindric "&#x232D;"> <!ENTITY degree "&#x02DA;"> <!ENTITY diameter "&#x2300;"> <!ENTITY dimension "&#x2194;"> <!ENTITY dimOrigin "&#x2331;"> <!ENTITY dot1u2 "&#x2234;"> <!ENTITY dot2u1 "&#x2235;"> <!ENTITY dot4 "&#x2237;"> <!ENTITY dot2 "&#x2236;"> <!ENTITY drillhole "&#x25D9;"> <!ENTITY drillthrough "&#x25CF;"> <!ENTITY eject "&#x23CF;"> <!ENTITY ellipse "&#x0298;"> <!ENTITY equalAndParallel "&#x22D5;"> <!ENTITY equiangular "&#x225A;"> <!ENTITY erase "&#x2326;"> <!ENTITY euro "&#x20AC;"> <!ENTITY hot "&#x2668;"> <!ENTITY identical "&#x2261;"> <!ENTITY kill "&#x2620;"> <!ENTITY leftOver "&#x21B6;"> <!ENTITY leftTurn "&#x21BA;"> <!ENTITY line "&#x2572;"> <!ENTITY lines "&#x2607;"> <!ENTITY linesB "&#x2319;"> <!ENTITY make "&#x2605;"> <!ENTITY matterLeft "&#x2345;"> <!ENTITY matterRight "&#x2346;"> <!ENTITY matterDown "&#x2356;"> <!ENTITY matterUp "&#x234F;"> <!ENTITY mail "&#x2709;"> <!ENTITY mesh "&#x2317;"> <!ENTITY midLines "&#x2388;"> <!ENTITY minusPlus "&#x2213;"> <!ENTITY nearly "&#x2248;"> <!ENTITY norm "&#x2016;"> <!ENTITY notes "&#x207E;"> <!ENTITY Ohm "&#x2126;"> <!ENTITY paragraph "&#x00B6;"> <!ENTITY perp "&#8869;"> <!ENTITY plusMinus "&#x00B1;"> <!ENTITY point "&#x2316;"> <!ENTITY polyline "&#x2608;"> <!ENTITY polygon "&#x2302;"> <!ENTITY proportional "&#x223C;"> <!ENTITY rarr "&#8594;"> <!ENTITY return "&#x23CE;"> <!ENTITY rightAngle "&#x22BE;"> <!ENTITY rightOver " &#x21B7;"> <!ENTITY rightTurn " &#x21BB;"> <!ENTITY save "&#x2707;"> <!ENTITY sector "&#x2314;"> <!ENTITY segment "&#x2313;"> <!ENTITY slope "&#x2333;"> <!ENTITY symmCross "&#x271C;"> <!ENTITY symmetric "&#x232F;"> <!ENTITY text "&#x2328;"> <!ENTITY totalRunout "&#x2330;"> <!ENTITY undo "&#x238C;"> <!ENTITY waste "&#x2672;"> <!ENTITY wavyLine "&#x2307;"> <!ENTITY warning "&#x26A0;"> <!ENTITY alpha "&#x0251;"> <!ENTITY beta "&#x03B2;"> <!ENTITY gamma "&#x0263;"> <!ENTITY delta "&#x03B4;"> <!ENTITY epsilon "&#x03B5;"> <!ENTITY zeta "&#x03B6;"> <!ENTITY eta "&#x03B7;"> <!ENTITY theta "&#x03B8;"> <!ENTITY kappa "&#x03BA;"> <!ENTITY lambda "&#x03BB;"> <!ENTITY mu "&#x03BC;"> <!ENTITY nu "&#x03BD;"> <!ENTITY xi "&#x03BE;"> <!ENTITY omicron "&#x03BF;"> <!ENTITY pi "&#x03C0;"> <!ENTITY plane "&#x03B5;"> <!ENTITY rho "&#x03C1;"> <!ENTITY sigma "&#x03C3;"> <!ENTITY tau "&#x03C4;"> <!ENTITY upsilon "&#x03C5;"> <!ENTITY phi "&#x03C6;"> <!ENTITY chi "&#x03C7;"> <!ENTITY psi "&#x03C8;"> <!ENTITY omega "&#x03C9;"> <!ENTITY increment "&#x2206;"> <!ENTITY Alpha "&#x0391;"> <!ENTITY Beta "&#x0392;"> <!ENTITY Gamma "&#x0393;"> <!ENTITY Delta "&#x0394;"> <!ENTITY Epsilon "&#x0395;"> <!ENTITY Zeta "&#x0396;"> <!ENTITY Eta "&#x0397;"> <!ENTITY Theta "&#x0398;"> <!ENTITY Kappa "&#x039A;"> <!ENTITY Lambda "&#x039B;"> <!ENTITY Mu "&#x039C;"> <!ENTITY Nu "&#x039D;"> <!ENTITY Xi "&#x039E;"> <!ENTITY Omicron "&#x039F;"> <!ENTITY Pi "&#x03A0;"> <!ENTITY Rho "&#x03A1;"> <!ENTITY Sigma "&#x03A3;"> <!ENTITY Tau "&#x03A4;"> <!ENTITY Upsilon "&#x03A5;"> <!ENTITY Phi "&#x3A6;"> <!ENTITY Chi "&#x03A7;"> <!ENTITY Psi "&#x03A8;"> <!ENTITY Omega "&#x03A9;"> ]> <html xmlns="http://www.w3.org/1999/xhtml" xmlns:svg="http://www.w3.org/2000/svg" xmlns:xul="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul" xmlns:xlink="http://www.w3.org/1999/xlink"> <head> <title>sCADch</title> <script type="text/javascript" src="Basic_sCADch.js"/> <script type="text/javascript" src="Basic1_sCADch.js"></script> </head> <body onload="init();"> <!-- p class="msg">start body</p --> <svg:svg id="Pic" onkeyup=""> <!-- onmouseover="focus=Fxz" style="z-index:2000;" !- width="900px" height="600px" style="position: fixed; top: 0; left: 0; cursor: crosshair;" --> <svg:defs> <svg:g class="invisible"> <svg:foreignObject x="200" y="180" width="100" height="30"> <input type="text" value="demo" class="stranger" onchange="objectModifier(this)" /> </svg:foreignObject> </svg:g> <svg:path id="P" d="M0 5v-10M-5 0h10a5 5 0 0 1 0 5" class="P"/> <!-- svg:marker id="Triangle" viewBox="0 0 10 10" refX="0" refY="5" markerUnits="strokeWidth" markerWidth="4" markerHeight="3" orient="auto" style="stroke: orange; fill-opacity: 0.4;" --> <svg:marker id="Triangle" viewBox="0 0 10 10" refX="0" refY="5" style="marker-units: stroke-width; marker-width: 10px; marker-height: 10px; orient: auto; stroke: orange; fill-opacity: 0.4;"> <svg:path d="M0 0L10 5L0 10z" /> </svg:marker> <svg:pattern id="steel1" patternUnits="userSpaceOnUse" x="0" y="0" width="30" height="30" viewBox="0 0 50 50"> <svg:line x1="0" y1="7" x2="7" y2="0" class="steel"/> <!-- to be implemented in Mozilla SVG --> </svg:pattern> <svg:linearGradient id="Gl" gradientUnits="objectBoundingBox" x1="0%" x2="35%" y1="0%" y2="35%" spreadMethod="reflect"> <!-- style="offset: 5%; stop-color: #F60F00;"--> <svg:stop offset="0%" stop-color="#F60F00"/> <svg:stop offset="100%" stop-color="#0060FF" /> </svg:linearGradient> <svg:linearGradient id="Gr" gradientUnits="userSpaceOnUse" x1="0%" x2="35%" y1="0%" y2="35%" spreadMethod="repeat"> <svg:stop offset="0%" stop-color="#000000"/> <!--style="offset:5%; stop-color:#F60000;" /--> <svg:stop offset="100%" stop-color="#000FFF"/> <!-- style="offset:95%; stop-color:#FFFFFF;" /--> <!-- stop offset="70%" stop-color="#FFF000" / --> </svg:linearGradient> <svg:symbol id="SyP" class="pt" viewBox="0 0 10 10" width="10" height="10" > <svg:desc>sCADch symbol for "Point"</svg:desc> <svg:g class="pt"> <svg:rect class="pt" x="2" y="2" height="6" width="6"/> <svg:line class="pt" x1="0" y1="0" x2="4" y2="4"/> <svg:line class="pt" x1="0" y1="10" x2="4" y2="6"/> <svg:line class="pt" x1="10" y1="0" x2="6" y2="4"/> <svg:line class="pt" x1="10" y1="10" x2="6" y2="6"/> </svg:g> </svg:symbol> </svg:defs> <!-- "corporate design" objects (test objects!!) --> <svg:g class="example" transform="translate(600,300)" id="corps"> <svg:circle id="circ" r="1cm" cx="7.5cm" cy="0.28562cm" style="fill: RGB(160,255,230); stroke: blue; fill-opacity: 0.3; stroke-width: 0; z-index: inherit;"/> <svg:circle id="circE" r="1cm" cx="7.50cm" cy="7.58562cm" style="fill: RGB(255,245,210); fill-opacity: 0.5; stroke-width: 0; z-index: inherit;"/> <svg:rect x="10" y="10" width="50" height="50" style="fill: url(#steel1);"/> <!-- waiting for a version with Schraffur in Mozilla SVG --> <svg:rect x="10" y="60" width="30" height="50" style="fill: url(#Gl); opacity:0.5;"/> <svg:rect x="10" y="110" width="30" height="50" fill="url(#Gr)"/> <svg:rect id="schr" x="40" y="110" width="30" height="50" fill="url(#Gr)" style="fill-opacity:0.3;"/> <svg:rect x="40" y="210" width="-30" height="-50" style="fill: url(#Gr);"/> <svg:use x="10" y="20" xlink:href="#schr" width="100" height="100" /> <svg:line id="marktest" x1="50" y1="200" x2="200" y2="100" style="stroke: #E8F0F0; marker-end: url(#Triangle); stroke-width: 2; marker-start: url(#Triangle);"/> <!-- marker: url(#Triangle); marker:'url(#Triangle)' xlink:href="#Triangle"/ --> <svg:line id="marktest2" x1="60" y1="200" x2="210" y2="100" class="test"/> <!-- svg:line id="linma" x1="50" y1="200" x2="200" y2="100" style="marker: 'url(#Triangle)'; stroke-width: 2;"/ --> <!-- svg:line id="linmA" x1="50" y1="200" marker='url(#Triangle)' x2="100" y2="60" style="stroke-width: 2;"/ --> </svg:g> <svg:g id="Gxz" onmouseover="focus=Fxz"> <svg:svg id="Sxz" width="600px" height="300px" viewBox="0 0 600 300"> <svg:polygon class="svg" points="0,0 599,0 599,299 0,299"/> <!-- style="stroke: #CCCCB0; fill: #C0DDDD; opacity: 0.2;"/ --> </svg:svg> </svg:g> <!-- svg:path transform="translate(0,0)" id="Xxz" d="M0 2000 L0 5 M0 -5 L 0 -2000 M-2000 0 L-5 0 M5 0 L2000 0" class="cross"/ --> <svg:path transform="translate(0,0)" id="Xxz" d="M0 2000 L 0 -2000 M-2000 0 L2000 0" class="cross"/> <svg:g id="Gxy" class="svg" transform="translate(0,300)" onmouseover="focus=Fxy"> <svg:svg id="Sxy" width="600px" height="300px" viewBox="0 0 600 300"> <!-- style="stroke: red; stroke-width: 1; fill: #DDC0DD; fill-opacity: 0.3; overflow: hidden;"--> <svg:polyline class="svg" points="0,0 599,0 599,299 0,299 0,0"/> <!--style="stroke: #CCCCB0; fill: #C0DDDD; opacity: 0.2;"/--> <svg:line id="Xxy" x1="-2000" y1="0" x2="2000" y2="0" class="cross"/> <!-- svg:path transform="translate(0,0)" id="Xxy" d="M2000 0 L5 0 M-5 0 L -2000 0" class="cross"/ --> </svg:svg> </svg:g> <svg:g id="Gyz" transform="translate(600,0)" onmouseover="focus=Fyz"> <svg:svg id="Syz" width="300px" height="300px" viewBox="0 0 300 300"> <!-- style="stroke: #88AABB; stroke-width: 1; fill: #DDDDC0; fill-opacity: 0.2; overflow: hidden;"--> <svg:polyline class="svg" points="0,0 299,0 299,299 0,299 0,0"/> <svg:line id="Xyz" x1="0" y1="2000" x2="0" y2="-2000" class="cross"/> <!-- svg:path transform="translate(0,0)" id="Xyz" d="M0 2000 L0 5 M0 -5 L 0 -2000" class="cross"/ --> </svg:svg> </svg:g> </svg:svg> <form id="cmdTableau"> <p><input type="text" width="23" readonly="readonly" id="ioLine" title="show input value on click"/> <input type="text" width="12" readonly="readonly" id="ioChar" title="general IO input line"/> </p> <p><span>&point;</span><img src="space.gif" class="cmdCol1"/> <button type="button" id="NumPoint" onclick="setPoint()" title="set a point with actual coordinates" style="color: black;"><h3>&point;</h3></button> <button type="button" title="set next | read actual point: x coord" style="border-style:none; z-index: 0; position: absolute; background-color: transparent;" class="block"><tt>x</tt></button><input type="text" id="NumX" value="" onclick="copyText(this)"/> <button type="button" title="set next | read actual point: y coord" style="border-style:none; z-index: 0; position: absolute; background-color: transparent;" class="block"><tt>y</tt></button><input type="text" id="NumY" value="" onclick="copyText(this)"/> <button type="button" title="set next | read actual point: z coord" style="border-style:none; z-index: 0; position: absolute; background-color: transparent;" class="block"><tt>z</tt></button><input type="text" id="NumZ" value="" onclick="copyText(this)"/> </p> <p><span>&line;</span><img src="space.gif" class="cmdCol1"/> <button type="button" id="Line" title="make one distinct construction line(s)" onclick="makeLine()" class="L"><h1>&line;</h1></button> <button type="button" id="Lines" title="make connected, but distinct construction lines" onclick="makeLines()" class="L"><h3>&lines;</h3></button> </p> <p class="P"><span>&polygon;</span><img src="space.gif" class="cmdCol1"/> <button type="button" id="Polygon" title="polygon; 3D straight lines, auto closing" onclick="makePolyline(Polygonclass,'polygon')" class="P"><h3>&polygon;</h3></button> <button type="button" id="PolygonHold" title="polygon, hold points; 3D straight lines, auto closing" onclick="makePolyline(Polygonclass,'polygon',1)" class="P"><h3>&polygon;</h3><em>&nbsp;&nbsp;&point;</em></button> <button type="button" id="Polyline" title="polyline; 3D straight lines" onclick="makePolyline(Polylineclass,'polyline')"><h3>&polyline;</h3></button> <button type="button" id="PolylineHold" title="polyline, hold points; 3D straight lines" onclick="makePolyline(Polylineclass,'polyline',1)"><h3>&polyline;</h3><em>&nbsp;&nbsp;&point;</em></button> </p> <p class="C"><span>&circle;</span><img src="space.gif" class="cmdCol1"/> <button type="button" id="doCircle" title="circle from 3 peripheral points" onclick="makeCircle()" class="C"><u>&circle;</u></button> <button type="button" id="doCircleHold" title="circle from 3 peripheral points, hold points" onclick="makeCircle(1)" class="C"><u>&circle;</u><em>&nbsp;&nbsp;&point;</em></button> <button type="button" id="doEllipse" title="ellipse, &point;1-&point;3:plane, &point;1+&point;4:&circ;&cylindric; axe, &point;2 on &ellipse;" onclick="makeEllipse()"><em>&ellipse;</em></button> <button type="button" id="doEllipseHold" title="ellipse, hold points" onclick="makeEllipse(1)"><em>&ellipse;</em><em>&nbsp;&nbsp;&point;</em></button> </p> <p><span>&plane;</span><img src="space.gif" class="cmdCol1"/> <button type="button" id="Ebene" title="make plane, 3 points" onclick="setPlane()" class="E"><h3>&dot1u2;</h3></button> <button type="button" id="EbeneN" title="make plane, &perp;" onclick="setPlaneN()" class="E"><h3>&perp;</h3></button> <button type="button" id="WorksPlane" title="+/- set/unset work plane" onclick="setWorkPlane('this')" class="E"><em>&plane;</em><h3>&plusmn;</h3></button> <button type="button" id="Ebene3" title="3rd coordinate of points: point on work plane" onclick="setToPlane()" class="E"><em>&plane;</em><h3>&rarr;</h3></button> </p> <p><span>?</span><img src="space.gif" class="cmdCol1"/> <button type="button" id="erase" title="erase elements" onclick="EraseObjects()" class="W"><h3>&erase;</h3><h2>&kill;</h2></button> <button type="button" id="crazy" title="init, to be used, when auto init was failing" onclick="init()" class="S"><u>&aleph;</u></button> <!-- <button type="button" id="ttxt" onclick="tytxt()">ttxt</button> --> <button type="button" id="ClearText" title="clear information text area" onclick="ClearWrite()" class="S"><em>&text;</em><h3>&erase;</h3></button> <button type="button" id="toDump" title="dump notes to text area; toggle button" onclick="dumpen=!dumpen" class="S"><em>&text;</em><h3>&plusmn;</h3></button> </p> <p> <span id="ButtRest">&button;</span><img src="space.gif" class="cmdCol1"/> <button type="button" class="block"><tt>id</tt></button> <input type="text" id="idButt" title="button identifier" onclick="copyText(this)"/> <button type="button" class="block"><tt>sym</tt></button> <input type="text" id="symButt" title="button text/symbol (use unicode chars)" onclick="copyText(this)"/> <button type="button" class="block"><tt>func</tt></button> <input type="text" id="fuButt" title="button functionality, event action, e.g. function call" onclick="copyText(this)"/> <button type="button" class="block"><tt>class</tt></button><input type="text" id="classButt" title="button style class, optional, for definition requirements see class butt" onclick="copyText(this)"/> <button type="button" class="block"><tt>type</tt></button> <input type="text" id="typeButt" title="button type, mainly 'button'|'text'" value="button" onclick="copyText(this)"/> <button type="button" class="block"><tt>desc</tt></button> <input type="text" id="descButt" title="key title, describe functionality!" onclick="copyText(this)"/> <button type="button" id="mkButt" onclick="makeButton()" title="make button. button position: mousedown and mousemove. fix position: &not; button"><em>&make;</em></button> <button type="button" onclick="standardButtonPlaces()" title="position moveable or, when confirming: first click: last button places, second: initial places"><h1>&larr;</h1></button> <button type="button" onclick="cancelButton('idButt')" title="pos button using key m, mousedown and mousemove"><h1>&not;</h1></button> </p> <p> <textarea id="Dump"></textarea> </p> </form> <!-- p class="msg">at end of body</p --> </body> </html>
279,205
2,392,416
I think (though of course I'm not entirely sure) that this is fallout from bug 244366; I only started crashing with today's build; usually when loading large pages (such as Bonsai checkins) and doing something while it's doing that (i.e. moving the mouse). I still don't have the steps to reproduce yet, sorry. 0x00000000 nsEventStateManager::DispatchMouseEvent [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/content/events/src/nsEventStateManager.cpp, line 2542] nsEventStateManager::GenerateMouseEnterExit [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/content/events/src/nsEventStateManager.cpp, line 2618] nsEventStateManager::PreHandleEvent [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/content/events/src/nsEventStateManager.cpp, line 474] PresShell::HandleEventInternal [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/base/nsPresShell.cpp, line 5902] PresShell::HandleEvent [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/layout/base/nsPresShell.cpp, line 5761] nsViewManager::HandleEvent [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/view/src/nsViewManager.cpp, line 2424] nsViewManager::DispatchEvent [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/view/src/nsViewManager.cpp, line 2151] HandleEvent [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/view/src/nsView.cpp, line 174] nsWindow::DispatchEvent [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsWindow.cpp, line 1103] nsWindow::DispatchMouseEvent [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsWindow.cpp, line 5402] ChildWindow::DispatchMouseEvent [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsWindow.cpp, line 5653] nsWindow::WindowProc [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsWindow.cpp, line 1389] USER32.dll + 0x8709 (0x77d48709) USER32.dll + 0x87eb (0x77d487eb) USER32.dll + 0x89a5 (0x77d489a5) USER32.dll + 0x89e8 (0x77d489e8) nsAppShell::Run [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/widget/src/windows/nsAppShell.cpp, line 159] nsAppStartup::Run [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/xpfe/components/startup/src/nsAppStartup.cpp, line 208] main [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/xpfe/bootstrap/nsAppRunner.cpp, line 1811] WinMain [c:/builds/tinderbox/MozillaTrunk/WINNT_5.0_Clobber/mozilla/xpfe/bootstrap/nsAppRunner.cpp, line 1839] kernel32.dll + 0x16d4f (0x7c816d4f)
322,636
2,741,561
Using the redo shortcut if you haven't used undo first, in the find bar, crashes firefox when you try typing again. Steps to reproduce: 1. Open fayt by typing or ctrl-f for find 2. Hit the redo shortcut (ctrl-y in windows, or F3 if you have a Microsoft kb with the function lock off, heh) 3. Wait for the bar to disappear. 4. Type again to open fayt bar/ctrl-f for find (either of these will do no matter which one you did for 1) 5. Yay! Doesn't crash if you undo first.
322,683
2,741,897
There is no clear regressionwindow/cause found for this bug but it is too critical to wait reporting reported on Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8) Gecko/20060106 Firefox/1.5 ID:2006010603 TB13674807W and Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8) Gecko/20060106 Firefox/1.5 ID:2006010603 TB13673645G Incident ID: 13674807 Stack Signature nsScriptSecurityManager::CheckSameOriginPrincipalInternal b86a7215 Product ID Firefox2 Build ID 2006010603 Trigger Time 2006-01-07 07:25:35.0 Platform Win32 Operating System Windows NT 5.1 build 2600 Module firefox.exe + (0009fcca) URL visited Yahoo! Beta Mail User Comments Since Last Crash 3730 sec Total Uptime 3730 sec Trigger Reason Access violation Source File, Line No. c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/caps/src/nsScriptSecurityManager.cpp, line 849 Stack Trace nsScriptSecurityManager::CheckSameOriginPrincipalInternal [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/caps/src/nsScriptSecurityManager.cpp, line 849] nsScriptSecurityManager::CheckSameOriginPrincipal [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/caps/src/nsScriptSecurityManager.cpp, line 596] nsGenericElement::doReplaceChild [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/content/base/src/nsGenericElement.cpp, line 3583] nsDocument::ReplaceChild [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/content/base/src/nsDocument.cpp, line 3526] XPCWrappedNative::CallMethod [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/xpconnect/src/xpcwrappednative.cpp, line 2139] XPC_WN_CallMethod [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/xpconnect/src/xpcwrappednativejsops.cpp, line 1444] js_Invoke [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/jsinterp.c, line 1177] js_Interpret [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/jsinterp.c, line 3523] js_Invoke [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/jsinterp.c, line 1197] js_Interpret [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/jsinterp.c, line 3523] js_Invoke [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/jsinterp.c, line 1197] fun_apply [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/jsfun.c, line 1606] js_Invoke [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/jsinterp.c, line 1177] js_Interpret [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/jsinterp.c, line 3523] js_Invoke [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/jsinterp.c, line 1197] nsXPCWrappedJSClass::CallMethod [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/xpconnect/src/xpcwrappedjsclass.cpp, line 1369] nsXPCWrappedJS::CallMethod [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/js/src/xpconnect/src/xpcwrappedjs.cpp, line 462] SharedStub [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/xpcom/reflect/xptcall/src/md/win32/xptcstubs.cpp, line 147] nsXMLHttpRequest::ChangeState [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/extensions/xmlextras/base/src/nsXMLHttpRequest.cpp, line 1857] nsXMLHttpRequest::RequestCompleted [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/extensions/xmlextras/base/src/nsXMLHttpRequest.cpp, line 1411] nsXMLHttpRequest::OnStopRequest [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/extensions/xmlextras/base/src/nsXMLHttpRequest.cpp, line 1359] nsMultipartProxyListener::OnStopRequest [c:/builds/tinderbox/Fx-Mozilla1.8/WINNT_5.2_Depend/mozilla/extensions/xmlextras/base/src/nsXMLHttpRequest.cpp, line 202]
324,650
2,757,252
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.10) Gecko/20050925 Firefox/1.0.4 (Debian package 1.0.4-2sarge5) Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.10) Gecko/20050925 Firefox/1.0.4 (Debian package 1.0.4-2sarge5) I built a switch-statement with 1800 cases which should generate a JSOP_LOOKUPSWITCHX. But it hangs in BuildSpanDepTable(JSContext *cx, JSCodeGenerator *cg) (in jsemit.c) in an infinite loop. Reproducible: Always Steps to Reproduce: 1. load html with big switch-statement 2. 3. Actual Results: infinite loop Expected Results: changed picture Infinite loop in: - 1.0pre (debug Linux/Windows XP) - 1.0.4 (Debian Sarge) - 1.5 (Windows)
315,453
2,690,427
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20051107 SeaMonkey/1.5a Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20051107 SeaMonkey/1.5a After you open the Composer to answer a posting(its not necessary to send the answer), SeaMonkey crash when you close SeaMonkey after that. Reproducible: Always Steps to Reproduce: 1.Open MailNews 2.Select a mail/posting 3.Klick on 'Reply' 4.Leave the composer after that(sending an answer is not necessary) 5.Close Seamonkey Actual Results: Crash after the SeaMonkey-Window allready is closed Expected Results: no crash Linux-builds are allso affected.
316,049
2,694,885
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8) Gecko/20051111 Firefox/1.5 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8) Gecko/20051111 Firefox/1.5 crash on GM Canada web site when configuring a car, choosing 'view deatil' on the car options. Reproducible: Always Steps to Reproduce: 1.Open to soon to be attach test case Actual Results: crash Firefox
316,176
2,695,842
crashed during send after clicking send version 1.6a1 (20051108) TB11749054 Incident ID: 11749054 Stack Signature nsWindowSH::GetProperty 3336da4c Product ID ThunderbirdTrunk Build ID 2005110810 Trigger Time 2005-11-12 03:36:05.0 Platform Win32 Operating System Windows NT 5.1 build 2600 Module thunderbird.exe + (00128276) URL visited User Comments sending mail s/vseerror Since Last Crash 166327 sec Total Uptime 168645 sec Trigger Reason Access violation Source File, Line No. e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/dom/src/base/nsDOMClassInfo.cpp, line 4081 Stack Trace nsWindowSH::GetProperty [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/dom/src/base/nsDOMClassInfo.cpp, line 4081] XPC_WN_Helper_GetProperty [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/js/src/xpconnect/src/xpcwrappednativejsops.cpp, line 946] js_Interpret [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/js/src/jsinterp.c, line 3616] js_Invoke [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/js/src/jsinterp.c, line 1197] nsXPCWrappedJSClass::CallMethod [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/js/src/xpconnect/src/xpcwrappedjsclass.cpp, line 1369] nsXPCWrappedJS::CallMethod [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/js/src/xpconnect/src/xpcwrappedjs.cpp, line 462] SharedStub [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/xpcom/reflect/xptcall/src/md/win32/xptcstubs.cpp, line 147] nsObserverService::NotifyObservers [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/xpcom/ds/nsObserverService.cpp, line 235] nsIOService::SetOffline [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/netwerk/base/src/nsIOService.cpp, line 549] nsIOService::Observe [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/netwerk/base/src/nsIOService.cpp, line 707] nsObserverService::NotifyObservers [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/xpcom/ds/nsObserverService.cpp, line 235] NS_ShutdownXPCOM_P [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/xpcom/build/nsXPComInit.cpp, line 795] ScopedXPCOMStartup::~ScopedXPCOMStartup [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/toolkit/xre/nsAppRunner.cpp, line 554] main [e:/builds/tinderbox/thunderbird-trunk/WINNT_5.0_Depend/mozilla/mail/app/nsMailApp.cpp, line 62] kernel32.dll + 0x16d4f (0x7c816d4f)
316,186
2,695,877
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9a1) Gecko/20051112 Firefox/1.6a1 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9a1) Gecko/20051112 Firefox/1.6a1 When attempting to view the source of this online Subversion repository viewer (which uses XSLT the last time I was able to check), Firefox dies. Reproducible: Always Steps to Reproduce: 1. Go to URL 2. Ctrl+U (or just View->Page Source) Actual Results: Firefox go boom Expected Results: Firefox shows a sexy output of XML with many pretty colours
311,629
2,650,441
Tested to occur on: 1.0.7 (Win32, release); Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20051007 Firefox/1.6a1 Steps to reproduce: 1. perl -e 'print "+ " x 60000 ;' > test.txt 1a. Somehow get a string of "+ " repeated 60 000 times otherwise :) 2. copy the contents of test.txt into the JS console and click on Evaluate 3. crash Expected Results Error in JS console, and not crash. Actual Results. Crash Discussion: This is remotely exploitable (crash also happens in <script> tags on content pages). Dataloss, I guess. First few lines of talkback: (TB10376057Q, TB10376528Q, TB10376612X) GetChar [c:/builds/tinderbox/Fx-Trunk/WINNT_5.2_Depend/mozilla/js/src/jsscan.c, line 362] js_GetToken [c:/builds/tinderbox/Fx-Trunk/WINNT_5.2_Depend/mozilla/js/src/jsscan.c, line 1294] UnaryExpr [c:/builds/tinderbox/Fx-Trunk/WINNT_5.2_Depend/mozilla/js/src/jsparse.c, line 2764] UnaryExpr [c:/builds/tinderbox/Fx-Trunk/WINNT_5.2_Depend/mozilla/js/src/jsparse.c, line 2764] UnaryExpr [c:/builds/tinderbox/Fx-Trunk/WINNT_5.2_Depend/mozilla/js/src/jsparse.c, line 2764] UnaryExpr [c:/builds/tinderbox/Fx-Trunk/WINNT_5.2_Depend/mozilla/js/src/jsparse.c, line 2764] ... etc. Same stack (different line numbers - 303/774/2592) for 1.0.7 (Thanks to Tonglebeak and ispiked on #firefox for the help)
312,351
2,665,817
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b5) Gecko/20051006 Firefox/1.4.1 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b5) Gecko/20051006 Firefox/1.4.1 When passing null to RegExp constructor, the browser crashes. Reproducible: Always Steps to Reproduce: 1. Evaluate RegExp(null) in the JavaScript console or put it in <script> node in a HTML page. Actual Results: crash Expected Results: Perhaps construct the regexp /^$/ ? so it'll match only empty strings. Tested on Ff 1.0.7 and 1.5b2, Tb 1.0.7. The module is js3250.dll
312,704
2,669,147
Crash after clicking on "Continue>" button on ebay's "Review Your Purchase" after selecting a payment method. It crashes when status bar displays "read secureinclude.ebaystatic.com". But it only crashes if JavaScript is switched *off* (javascript.enabled = false) or is prohibited for the page via policies. It crashes with Firefox Trunk Win 20051016, Seamonkey Trunk Win 20051013 and Seamonkey Trunk Linux 20051016. Talkback ID's for this are: Seamonkey Win: TB10733074Y, TB10733077G, TB10733304Z, TB10733396Q, TB10734827Y, TB10735665G Firefox Win: TB10762793X, TB10763001M
312,784
2,669,902
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b5) Gecko/20051017 Firefox/1.4.1 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b5) Gecko/20051017 Firefox/1.4.1 Firefox crash on about:config when changing a giving boolean with gmail notifier 0.5.2.1 (TB 10782990) Reproducible: Always Steps to Reproduce: 1.Install Gmail Notifier 0.5.2.1 (http://ftp.mozilla.org/pub/mozilla.org/extensions/gmail_notifier/gmail_notifier-0.5.2.1-fx+mz.xpi) 2.Restart Firefox to finish the installation 3.Log in your gmail account (using the icon on the status bar) 4.Put the mouse over the icon to get the tooltip 5.Open a new tab with about:config 6.Put 'gm' in the filter 7.Quick double click a couple of times on 'gm-notifier.ui.folderview' to switch it from true to false, to false to true, it should crash after 2-3 times
313,080
2,672,235
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8b5) Gecko/20051019 Firefox/1.5 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.8b5) Gecko/20051019 Firefox/1.5 These scripts cause Firefox crash: <element/>.__proto__(); <element/>.__parent__(); <element/>.function::__proto__(); Reproducible: Always Steps to Reproduce: Talkback Incident IDs: TB10279899 (The comment for this incident is wrong.) TB10875233Y
325,540
2,764,121
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1 The jsMath javascript library worked fine with Firefox 1.5. However, when using it in Firefox 1.5.0.1 it causes Firefox to crash immediately. You can see this at http://www.roadsignmath.com/. The jsMath library itself can be found at http://www.math.union.edu/~dpvc/jsMath/. (I have notified the author of this issue as well.) Reproducible: Always Steps to Reproduce: 1. Go to any page that uses the jsMath library. 2. 3. Actual Results: Browser crashes. Expected Results: Should have loaded the page.
325,925
2,766,830
User-Agent: Mozilla/5.0 (X11; U; Linux i686 (x86_64); en-US; rv:1.8.0.1) Gecko/20060124 Firefox/1.5.0.1 Build Identifier: Mozilla/5.0 (X11; U; Linux i686 (x86_64); en-US; rv:1.8.0.1) Gecko/20060124 Firefox/1.5.0.1 If I visit http://www.visibone.com/javascript/jt2.html, type in my name and E-mail address, and then click "Run the Tests", tests run for a while and then the browser hangs (the display does not refresh for several minutes, at which point I kill it). Reproducible: Always Steps to Reproduce: 1.visit http://www.visibone.com/javascript/jt2.html 2.click "Run the Tests" Actual Results: Tests run (things flash in the textarea), then the browser hangs. Expected Results: Tests run (things flash in the textarea), the browser does not hang, I get a chance to submit new test results. I did report this hang with Talkback a few minutes ago, but I don't know how to find out what my "Talkback crash ID" was. This happens with both the official Firefox release 1.5.0.1, and the Debian package version 1.5.dfsg-4; in both cases I am running in a Debian-testing i386 chroot on an amd64 box.
325,947
2,766,953
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; da; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; da; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1 If you make a file called 1.txt and place it on c:\ on a windows machine, and then try the URL (http://www.vup.dk/test/changetype.php) the file will be uploaded, without your approval. This is indeed a high risc security issue. If you don't want to enter the url, the JS code is this: function changeType(obj) { obj.type="text"; obj.value="C:\\1.txt"; obj.type="file"; setTimeout("videre()", 1); } function videre() { document.getElementById("submit").click(); } Reproducible: Always Steps to Reproduce: 1. Make a page, and run the javascript, and make, as an example php show the output Actual Results: File gets uploaded, and content is printed Expected Results: Denied the change of the input to .file
326,467
2,770,968
NTDLL! 7c901230() js_Interpret(JSContext * 0x01ed32a8, unsigned char * 0x033ba81d, long * 0x0012c4a4) line 4495 + 93 bytes js_Execute(JSContext * 0x01ed32a8, JSObject * 0x01fb9c18, JSScript * 0x033ba7d8, JSStackFrame * 0x0012d070, unsigned int 0x00000020, long * 0x0012c620) line 1480 + 19 bytes obj_eval(JSContext * 0x01ed32a8, JSObject * 0x02cf5b88, unsigned int 0x00000002, long * 0x037d2c34, long * 0x0012c620) line 1270 + 27 bytes js_Invoke(JSContext * 0x01ed32a8, unsigned int 0x00000002, unsigned int 0x00000000) line 1230 + 23 bytes js_Interpret(JSContext * 0x01ed32a8, unsigned char * 0x02d289b9, long * 0x0012d0e0) line 3792 + 15 bytes js_Invoke(JSContext * 0x01ed32a8, unsigned int 0x00000002, unsigned int 0x00000006) line 1254 + 19 bytes fun_apply(JSContext * 0x01ed32a8, JSObject * 0x02bb2620, unsigned int 0x00000002, long * 0x037d2bd0, long * 0x0012d224) line 1656 + 15 bytes js_Invoke(JSContext * 0x01ed32a8, unsigned int 0x00000002, unsigned int 0x00000000) line 1230 + 23 bytes js_Interpret(JSContext * 0x01ed32a8, unsigned char * 0x01fa90b5, long * 0x0012dce4) line 3792 + 15 bytes js_Invoke(JSContext * 0x01ed32a8, unsigned int 0x00000003, unsigned int 0x00000000) line 1254 + 19 bytes js_Interpret(JSContext * 0x01ed32a8, unsigned char * 0x02c30548, long * 0x0012e754) line 3792 + 15 bytes js_Invoke(JSContext * 0x01ed32a8, unsigned int 0x00000001, unsigned int 0x00000002) line 1254 + 19 bytes js_InternalInvoke(JSContext * 0x01ed32a8, JSObject * 0x0327c490, long 0x030344a8, unsigned int 0x00000000, unsigned int 0x00000001, long * 0x0012e950, long * 0x0012e94c) line 1331 + 20 bytes JS_CallFunctionValue(JSContext * 0x01ed32a8, JSObject * 0x0327c490, long 0x030344a8, unsigned int 0x00000001, long * 0x0012e950, long * 0x0012e94c) line 4174 + 31 bytes nsJSContext::CallEventHandler(JSObject * 0x0327c490, JSObject * 0x030344a8, unsigned int 0x00000001, long * 0x0012e950, long * 0x0012e94c) line 1424 + 33 bytes nsJSEventListener::HandleEvent(nsJSEventListener * const 0x0320e0f0, nsIDOMEvent * 0x03a81400) line 186 + 54 bytes nsEventListenerManager::HandleEventSubType(nsListenerStruct * 0x03514fe8, nsIDOMEventListener * 0x0320e0f0, nsIDOMEvent * 0x03a81400, nsIDOMEventTarget * 0x03a36d80, unsigned int 0x00000004, unsigned int 0x00000002) line 1653 + 16 bytes nsEventListenerManager::HandleEvent(nsEventListenerManager * const 0x036439d0, nsPresContext * 0x009f78c0, nsEvent * 0x0012f73c, nsIDOMEvent * * 0x0012f044, nsIDOMEventTarget * 0x03a36d80, unsigned int 0x00000002, nsEventStatus * 0x0012f568) line 1760 nsXULElement::HandleDOMEvent(nsPresContext * 0x009f78c0, nsEvent * 0x0012f73c, nsIDOMEvent * * 0x0012f044, unsigned int 0x00000002, nsEventStatus * 0x0012f568) line 1885 nsXULElement::HandleDOMEvent(nsPresContext * 0x009f78c0, nsEvent * 0x0012f73c, nsIDOMEvent * * 0x0012f044, unsigned int 0x00000002, nsEventStatus * 0x0012f568) line 1904 + 60 bytes nsGenericElement::HandleDOMEvent(nsPresContext * 0x009f78c0, nsEvent * 0x0012f73c, nsIDOMEvent * * 0x0012f044, unsigned int 0x00000007, nsEventStatus * 0x0012f568) line 2052 + 60 bytes nsHTMLInputElement::HandleDOMEvent(nsPresContext * 0x009f78c0, nsEvent * 0x0012f73c, nsIDOMEvent * * 0x00000000, unsigned int 0x00000001, nsEventStatus * 0x0012f568) line 1360 + 31 bytes PresShell::HandleEventInternal(nsEvent * 0x0012f73c, nsIView * 0x01fa3028, unsigned int 0x00000001, nsEventStatus * 0x0012f568) line 6076 + 52 bytes PresShell::HandleEvent(PresShell * const 0x01fa35f8, nsIView * 0x01fa3028, nsGUIEvent * 0x0012f73c, nsEventStatus * 0x0012f568) line 5851 + 25 bytes nsViewManager::HandleEvent(nsView * 0x01fa3028, nsPoint {...}, nsGUIEvent * 0x0012f73c, int 0x00000000) line 1675 nsViewManager::DispatchEvent(nsViewManager * const 0x0209f2c8, nsGUIEvent * 0x0012f73c, nsEventStatus * 0x0012f68c) line 1628 + 37 bytes HandleEvent(nsGUIEvent * 0x0012f73c) line 176 nsWindow::DispatchEvent(nsWindow * const 0x01fa30fc, nsGUIEvent * 0x0012f73c, nsEventStatus & nsEventStatus_eIgnore) line 1169 + 10 bytes nsWindow::DispatchWindowEvent(nsGUIEvent * 0x0012f73c) line 1190 nsWindow::DispatchKeyEvent(unsigned int 0x00000083, unsigned short 0x0000, unsigned int 0x0000000d, long 0x001c0001, unsigned int 0x00000000) line 3382 + 15 bytes nsWindow::OnKeyDown(unsigned int 0x0000000d, unsigned int 0x0000001c, long 0x001c0001) line 3520 nsWindow::ProcessMessage(unsigned int 0x00000100, unsigned int 0x0000000d, long 0x001c0001, long * 0x0012fc8c) line 4463 + 38 bytes nsWindow::WindowProc(HWND__ * 0x0010051c, unsigned int 0x00000100, unsigned int 0x0000000d, long 0x001c0001) line 1358 + 27 bytes USER32! 77d48734() USER32! 77d48816() USER32! 77d489cd() USER32! 77d48a10() nsAppShell::Run(nsAppShell * const 0x00a1b4e8) line 135 nsAppStartup::Run(nsAppStartup * const 0x00a534a0) line 208 main1(int 0x00000002, char * * 0x002a2638, nsISupports * 0x009e5948) line 1248 + 32 bytes main(int 0x00000002, char * * 0x002a2638) line 1736 + 37 bytes mainCRTStartup() line 338 + 17 bytes KERNEL32! 7c816d4f() Steps to reproduce: (1) seamonkey -venkman (2) In the Venkman console, enter the line: for (var prop in ({1:1})) {void(prop)} Expected results: none. Actual results: crash. Thanks to timeless for helping reduce the testcase. Other variants leading to the crash: var prop = null; for (prop in ({1:1})) {void(prop)} Variants NOT crashing: var prop = null; for (prop in ({1:1}) {void(prop)} var prop; for (prop in ({1:1})) {void(prop)} // ReferenceError: prop is not defined @ <x-jsd:interactive-session> 1 This crash happens in Venkman; it does not happen in xpcshell.
327,066
2,775,835
Steps to reproduce (WARNING! This will crash your browser): 1. Click on above URL 2. Crash and burn TB IDs from a recent 1.8 nightly: TB15134809G, TB15134839Y, TB15134942E Also happens with FF 1.5.0.1.
327,170
2,776,617
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1 http://www.fatbrain.org/js-bug2.txt for the source-code version. Not much more to say, u fix ;) Reproducible: Always Steps to Reproduce: 1. Create a RegExp object. 2. Run replace function on some string: "teststring".replace(rx.compile("s", "g"), function() { fx.compile("bleh", "g"); }) 3. Crash. Actual Results: Crash
313,669
2,678,932
Summary: Flash content fails to display when it hits/pulls from bfcache. With browser.sessionhistory.max_total_viewers set to -1, I experience this bug. If I change that to 0, this works fine. Regression Range: Works: 2005-10-21-08 trunk Fails: 2005-10-22-08 trunk This affects the branch, too: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b5) Gecko/20051024 Firefox/1.5 displays this problem. Suspected bug is bug 311791. Steps to Reproduce: 1. Load http://www.macromedia.com 2. Load another page (any page) 3. Click Back Expected Results: Flash content (middle of the page) loads and displays. Actual Results: No Flash content displays.
315,189
2,688,612
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8) Gecko/20051101 Camino/1.0+ Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8) Gecko/20051101 Camino/1.0+ Not much to add. Will attach a test case to show the crashing... Reproducible: Always Steps to Reproduce: 1. Load the url Actual Results: Crashes Expected Results: Not crashing? =)
319,293
2,716,491
I'm crashing on trunk trying to look at an svg file in DOM Inspector. FF1.5 works fine. Talkbacks 12659844, TB12659807, TB12659594, TB12659568, TB12659561 Testcase (not minimized, but it's small anyway) coming up.
319,384
2,717,086
Steps to reproduce are to load the page in the URL field in a debug build. This is fallout from bug 215173. Basically, we end up hitting an error converting some random string to an integer, which means we try to report the error listed in js.msg as: 117 MSG_DEF(JSMSG_CANT_CONVERT, 35, 1, JSEXN_NONE, "can't convert {0} to an integer") Note the JSEXN_NONE there. We end up in js_ErrorToException, which assigns JSEXN_NONE to |exn|, but thsi JSEXN_NONE has made a trip through the exnType member of JSErrorFormatString, which is a uint16. So the value assigned to EXN is 65535 (-1 cast to uint16, then cast back to int). Then we get: #1 0xb7dfeb8f in js_ErrorToException (cx=0xb3fb6860, message=0xb3efc7c0 "can't convert cfunc to an integer", reportp=0xbfffced4) at ../../../mozilla/js/src/jsexn.c:955 955 JS_ASSERT(exn < JSEXN_LIMIT); And that assertion of course fails (since JSEXN_LIMIT <= 65535). Then we go on and see: 968 if (exn == JSEXN_NONE) 969 return JS_FALSE; which probably doesn't return since (int)65535 != (int)-1. I assume that may be why we crash in opt builds on this site...
319,683
2,719,122
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8) Gecko/20051111 Firefox/1.5 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8) Gecko/20051111 Firefox/1.5 the browser crashes when running the following function: function crash(){ function f(){ var x; function g(){ x=1; //reffere anything here or Moz will not crash. } } //apply an object to the __proto__ attribute f.__proto__={}; //= []; //the following call will cause Moz. to crash f(); } Reproducible: Always Steps to Reproduce: 1. create an html page with a script 2. use the code provided in the details above 3. add a button or an onload atribute to the html page which runs the crash() function 4. watch mozilla crash Actual Results: the browser crashes with the feedback agend coming up and WinXP displaying a window asking to stop the process. Expected Results: The script should run without any problems. I do understand that mozilla is using the __proto__ property on objects for it's prototype chain handling. Though, as neither mozilla's JavaScript specs nor the !ECMAScript specs disallow the use of such properties in the user's script using such properties should neither crash the script execution nor crash the entire browser. The prototype chain handling should not depend on the __proto__ it should rather use an internal object not directly visible to the script. Prototype chain handling could sill be made accessable to the script by providing function (e.g. as functions like setProto(obj, newProto) and {{{getProto(obj)}}) This way overwriting even those functions will neither affect the script nor the prototype chain handling. A script could still implement the __proto__ property by using getters and setters. The advantage would be that the __protot__ object would only exsist in that script and cause no problems to other scripts.
319,980
2,721,398
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20051212 Firefox/1.6a1 Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9a1) Gecko/20051212 Firefox/1.6a1 when creating a new array, setting it to a global variable, and populating the array with literal in a loop, the garbage collector will not collect this array, this results in the browser eating all available system memory on the other hand the array will be collected if it was populated with objects created with "new" IE6 does not have this problem this happens everytime WHEN: 1. new tabs/windows are not created 2. old tabs/windows are not refreshed/closed Reproducible: Always Steps to Reproduce: 1. call function to create array, set to a global variable, populate array 2. repeat function every x seconds 3. meanwhile, not creating/closing/refreshing tabs or windows <html><head><script type="text/javascript"> var a; function update() { a = new Array(100000); for( var i = 0; i < 100000; i++ ) { a[i] = i; //a[i] = new Number(i) has no problem } //delete a; //does not help //a = null; //does not help } setInterval( "update()", 1000 ); </script></head><body></body></html> Actual Results: FUBARed system
320,172
2,722,751
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X; en) AppleWebKit/416.12 (KHTML, like Gecko) Safari/416.13 Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8) Gecko/20051111 Firefox/1.5 When a DIV in a page is updated using the Prototype library's Ajax.Updater with evalScripts set to true, and the updated content contains inline JavaScript, Firefox crashes. We've tried this on Mac OS X on both 1.0.7 and 1.5, and on Windows XP 1.0.7 and 1.5, and on Linux 1.0.7. Firefox does not crash if the response text from the Ajax call does not contain inline JavaScript. Additionally, the actual inline JavaScript call does not seem to matter; the crash will occur with a simple "var x = 5;" or more complex code. Reproducible: Always Steps to Reproduce: 1. Visit http://www.peakstrategy.net/firefox_rules/ (also works if the files are local) 2. Wait for the Ajax call to complete. Actual Results: Firefox crashes. Expected Results: The DIV would be updated with the response text of the Ajax call, or, in the worst case, Firefox would indicate that there was a problem in the Prototype library or in our use of it, without crashing. This crash has been filed as several Talkback incidents, including TB12925669Z.
1,456,512
13,229,819
The following testcase crashes on mozilla-central revision 26e53729a109 (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --disable-tests --disable-profiling --enable-debug --enable-optimize, run with --fuzzing-safe): var wm = new WeakMap(); grayRoot().map = wm; wm = null; gczeal(13, 7); var lfOffThreadGlobal = newGlobal(); Backtrace: received signal SIGSEGV, Segmentation fault. 0x0000000000f24468 in JS::UnmarkGrayGCThingRecursively (thing=thing@entry=...) at js/src/gc/Marking.cpp:3625 #0 0x0000000000f24468 in JS::UnmarkGrayGCThingRecursively (thing=thing@entry=...) at js/src/gc/Marking.cpp:3625 #1 0x00000000004eb7bb in js::gc::TenuredCell::readBarrier (thing=0x7ffff4c8a4c0) at js/src/gc/Cell.h:397 #2 0x0000000000c8d604 in js::InternalBarrierMethods<js::UnownedBaseShape*>::readBarrier (v=<optimized out>) at js/src/gc/Barrier.h:269 #3 js::ReadBarrieredBase<js::UnownedBaseShape*>::read (this=0x7ffff4930b88) at js/src/gc/Barrier.h:593 #4 js::ReadBarriered<js::UnownedBaseShape*>::get (this=0x7ffff4930b88) at js/src/gc/Barrier.h:649 #5 js::ReadBarriered<js::UnownedBaseShape*>::operator js::UnownedBaseShape* const& (this=0x7ffff4930b88) at js/src/gc/Barrier.h:661 #6 JS::WeakCache<JS::GCHashSet<js::ReadBarriered<js::UnownedBaseShape*>, js::StackBaseShape, js::SystemAllocPolicy> >::entryNeedsSweep (prior=...) at /srv/jenkins/jobs/mozilla-central-build-jsshell/workspace/arch/64/compiler/gcc/instrumentation/none/type/debug/dist/include/js/GCHashTable.h:641 #7 JS::WeakCache<JS::GCHashSet<js::ReadBarriered<js::UnownedBaseShape*>, js::StackBaseShape, js::SystemAllocPolicy> >::Range::settle (this=this@entry=0x7fffffffce40) at dist/include/js/GCHashTable.h:671 #8 0x0000000000c8233d in JS::WeakCache<JS::GCHashSet<js::ReadBarriered<js::UnownedBaseShape*>, js::StackBaseShape, js::SystemAllocPolicy> >::Range::popFront (this=0x7fffffffce40) at dist/include/js/GCHashTable.h:664 #9 JS::Zone::checkBaseShapeTableAfterMovingGC (this=0x7ffff49ec000) at js/src/vm/Shape.cpp:1516 #10 0x0000000000ee88df in js::gc::CheckHashTablesAfterMovingGC (rt=rt@entry=0x7ffff5f19000) at js/src/gc/GC.cpp:8462 #11 0x0000000000f30a90 in js::Nursery::doCollection (this=this@entry=0x7ffff5f1c070, reason=reason@entry=JS::gcreason::DESTROY_RUNTIME, tenureCounts=...) at js/src/gc/Nursery.cpp:937 #12 0x0000000000f30e0f in js::Nursery::collect (this=0x7ffff5f1c070, reason=reason@entry=JS::gcreason::DESTROY_RUNTIME) at js/src/gc/Nursery.cpp:729 #13 0x0000000000ed83c4 in js::gc::GCRuntime::minorGC (this=0x7ffff5f19700, reason=JS::gcreason::DESTROY_RUNTIME, phase=<optimized out>) at js/src/gc/GC.cpp:7826 #14 0x0000000000eea802 in js::gc::GCRuntime::gcCycle (this=this@entry=0x7ffff5f19700, nonincrementalByAPI=nonincrementalByAPI@entry=true, budget=..., reason=reason@entry=JS::gcreason::DESTROY_RUNTIME) at js/src/gc/GC.cpp:7431 #15 0x0000000000eeaff5 in js::gc::GCRuntime::collect (this=this@entry=0x7ffff5f19700, nonincrementalByAPI=nonincrementalByAPI@entry=true, budget=..., reason=reason@entry=JS::gcreason::DESTROY_RUNTIME) at js/src/gc/GC.cpp:7622 #16 0x0000000000eeb399 in js::gc::GCRuntime::gc (this=this@entry=0x7ffff5f19700, gckind=gckind@entry=GC_NORMAL, reason=reason@entry=JS::gcreason::DESTROY_RUNTIME) at js/src/gc/GC.cpp:7692 #17 0x0000000000c3a904 in JSRuntime::destroyRuntime (this=0x7ffff5f19000) at js/src/vm/Runtime.cpp:315 #18 0x0000000000b8bc71 in js::DestroyContext (cx=0x7ffff5f15000) at js/src/vm/JSContext.cpp:201 #19 0x0000000000a0ab8a in JS_DestroyContext (cx=<optimized out>) at js/src/jsapi.cpp:496 #20 0x00000000004442b1 in main (argc=<optimized out>, argv=<optimized out>, envp=<optimized out>) at js/src/shell/js.cpp:9254 rax 0x0 0 rbx 0x7ffff4c8a4c0 140737300178112 rcx 0x7ffff6c282ad 140737333330605 rdx 0x0 0 rsi 0x7ffff6ef7770 140737336276848 rdi 0x7ffff6ef6540 140737336272192 rbp 0x7fffffffcd50 140737488342352 rsp 0x7fffffffcd30 140737488342320 r8 0x7ffff6ef7770 140737336276848 r9 0x7ffff7fe4780 140737354024832 r10 0x58 88 r11 0x7ffff6b9e7a0 140737332766624 r12 0x7ffff4c8a4c7 140737300178119 r13 0x7fffffffcda0 140737488342432 r14 0x7ffff4930b88 140737296665480 r15 0x0 0 rip 0xf24468 <JS::UnmarkGrayGCThingRecursively(JS::GCCellPtr)+168> => 0xf24468 <JS::UnmarkGrayGCThingRecursively(JS::GCCellPtr)+168>: movl $0x0,0x0 0xf24473 <JS::UnmarkGrayGCThingRecursively(JS::GCCellPtr)+179>: ud2 Also likely shell-only.
1,456,524
13,229,887
The following testcase crashes on mozilla-central revision 26e53729a109 (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --disable-tests --disable-profiling --enable-debug --without-intl-api --enable-optimize --target=i686-pc-linux-gnu --enable-simulator=arm, run with --fuzzing-safe --ion-offthread-compile=off --ion-eager): oomTest(function() { eval(` function f() { var n; for (var i = 0; i < 18; ++i) { if (k) {} } return [k, n]; } var [a, b] = f(); `); }); Backtrace: received signal SIGSEGV, Segmentation fault. #0 0x084897d1 in js::jit::MoveResolver::PendingMove::setCycleEnd (this=<optimized out>, this=<optimized out>, cycleSlot=<optimized out>) at js/src/jit/MoveResolver.h:286 #1 js::jit::MoveResolver::resolve (this=<optimized out>) at js/src/jit/MoveResolver.cpp:271 #2 0x082d8233 in js::jit::CodeGenerator::visitMoveGroup (this=0xf3d7e000, group=0xf3db31e0) at js/src/jit/CodeGenerator.cpp:3330 #3 0x08320a63 in js::jit::CodeGenerator::generateBody (this=0xf3d7e000) at js/src/jit/CodeGenerator.cpp:5775 #4 0x0832141a in js::jit::CodeGenerator::generate (this=0xf3d7e000) at js/src/jit/CodeGenerator.cpp:10119 #5 0x0834a3ed in js::jit::GenerateCode (mir=0xf3dac0f8, lir=0xf3daeb38) at js/src/jit/Ion.cpp:1913 #6 0x083a8816 in js::jit::CompileBackEnd (mir=0xf3dac0f8) at js/src/jit/Ion.cpp:1935 #7 0x083a98e9 in js::jit::IonCompile (cx=<optimized out>, cx@entry=0xf6e1d800, script=<optimized out>, baselineFrame=baselineFrame@entry=0x0, osrPc=0x0, recompile=false, optimizationLevel=js::jit::OptimizationLevel::Normal) at js/src/jit/Ion.cpp:2215 #8 0x083a9f43 in js::jit::Compile (cx=cx@entry=0xf6e1d800, script=script@entry=..., osrFrame=osrFrame@entry=0x0, osrPc=0x0, forceRecompile=false) at js/src/jit/Ion.cpp:2425 #9 0x083aa070 in js::jit::CanEnterIon (cx=0xf6e1d800, state=...) at js/src/jit/Ion.cpp:2509 #10 0x083ccacc in js::jit::MaybeEnterJit (cx=0xf6e1d800, state=...) at js/src/jit/Jit.cpp:140 #11 0x081e239f in js::RunScript (cx=<optimized out>, state=...) at js/src/vm/Interpreter.cpp:402 #12 0x081e2a05 in js::InternalCallOrConstruct (cx=<optimized out>, args=..., construct=js::NO_CONSTRUCT) at js/src/vm/Interpreter.cpp:489 #13 0x081e2cf0 in InternalCall (cx=cx@entry=0xf6e1d800, args=...) at js/src/vm/Interpreter.cpp:516 #14 0x081e2e6f in js::CallFromStack (cx=0xf6e1d800, args=...) at js/src/vm/Interpreter.cpp:522 #15 0x082be1a4 in js::jit::DoCallFallback (cx=<optimized out>, frame=0xf5bffca8, stub_=0xf3da2030, argc=0, vp=0xf5bffc78, res=...) at js/src/jit/BaselineIC.cpp:2380 #16 0x085f6410 in js::jit::Simulator::softwareInterrupt (this=0xf6e58000, instr=0xf6e78164) at js/src/jit/arm/Simulator-arm.cpp:2707 #17 0x085f6c16 in js::jit::Simulator::decodeType7 (this=0xf6e58000, instr=0xf6e78164) at js/src/jit/arm/Simulator-arm.cpp:3876 #18 0x085f4b02 in js::jit::Simulator::instructionDecode (this=0xf6e58000, instr=0xf6e78164) at js/src/jit/arm/Simulator-arm.cpp:4856 #19 0x085f882a in js::jit::Simulator::execute<false> (this=0xf6e58000) at js/src/jit/arm/Simulator-arm.cpp:4911 #20 js::jit::Simulator::callInternal (this=0xf6e58000, entry=0x20469800 "\360O-\351\004\320M\342\020\212-\355\r\200\240\341h\220\235\345\r\260\240\341t\240\235", <incomplete sequence \345>) at js/src/jit/arm/Simulator-arm.cpp:4991 #21 0x085f8a49 in js::jit::Simulator::call (this=<optimized out>, entry=<optimized out>, argument_count=<optimized out>) at js/src/jit/arm/Simulator-arm.cpp:5074 #22 0x083cbdb0 in EnterJit (cx=<optimized out>, cx@entry=0xf6e1d800, state=..., code=0x21d21670 "\004\340-\345\a") at js/src/jit/Jit.cpp:101 #23 0x083ccaef in js::jit::MaybeEnterJit (cx=0xf6e1d800, state=...) at js/src/jit/Jit.cpp:163 #24 0x081e239f in js::RunScript (cx=<optimized out>, state=...) at js/src/vm/Interpreter.cpp:402 #25 0x081e4cd9 in js::ExecuteKernel (cx=<optimized out>, script=..., envChainArg=..., newTargetValue=..., evalInFrame=..., result=<optimized out>) at js/src/vm/Interpreter.cpp:700 #26 0x0821a61a in EvalKernel (cx=<optimized out>, v=..., v@entry=..., evalType=evalType@entry=DIRECT_EVAL, caller=..., env=..., pc=0xf57b4275 "{\001", vp=...) at js/src/builtin/Eval.cpp:323 #27 0x0821acc0 in js::DirectEval (cx=<optimized out>, v=..., vp=...) at js/src/builtin/Eval.cpp:433 #28 0x082be7ed in js::jit::DoCallFallback (cx=<optimized out>, frame=0xf5bffdd8, stub_=0xf6e89050, argc=1, vp=0xf5bffd98, res=...) at js/src/jit/BaselineIC.cpp:2364 #29 0x085f6410 in js::jit::Simulator::softwareInterrupt (this=0xf6e58000, instr=0xf6e78164) at js/src/jit/arm/Simulator-arm.cpp:2707 #30 0x085f6c16 in js::jit::Simulator::decodeType7 (this=0xf6e58000, instr=0xf6e78164) at js/src/jit/arm/Simulator-arm.cpp:3876 #31 0x085f4b02 in js::jit::Simulator::instructionDecode (this=0xf6e58000, instr=0xf6e78164) at js/src/jit/arm/Simulator-arm.cpp:4856 #32 0x085f882a in js::jit::Simulator::execute<false> (this=0xf6e58000) at js/src/jit/arm/Simulator-arm.cpp:4911 #33 js::jit::Simulator::callInternal (this=0xf6e58000, entry=0x20469800 "\360O-\351\004\320M\342\020\212-\355\r\200\240\341h\220\235\345\r\260\240\341t\240\235", <incomplete sequence \345>) at js/src/jit/arm/Simulator-arm.cpp:4991 #34 0x085f8a49 in js::jit::Simulator::call (this=<optimized out>, entry=<optimized out>, argument_count=<optimized out>) at js/src/jit/arm/Simulator-arm.cpp:5074 #35 0x083cbdb0 in EnterJit (cx=<optimized out>, cx@entry=0xf6e1d800, state=..., code=0x20479e00 "\004\340-\345\a") at js/src/jit/Jit.cpp:101 #36 0x083ccaef in js::jit::MaybeEnterJit (cx=0xf6e1d800, state=...) at js/src/jit/Jit.cpp:163 #37 0x081e239f in js::RunScript (cx=<optimized out>, state=...) at js/src/vm/Interpreter.cpp:402 #38 0x081e2a05 in js::InternalCallOrConstruct (cx=<optimized out>, args=..., construct=js::NO_CONSTRUCT) at js/src/vm/Interpreter.cpp:489 #39 0x081e2cf0 in InternalCall (cx=cx@entry=0xf6e1d800, args=...) at js/src/vm/Interpreter.cpp:516 #40 0x081e2eaa in js::Call (cx=0xf6e1d800, fval=..., thisv=..., args=..., rval=...) at js/src/vm/Interpreter.cpp:535 #41 0x08638a89 in JS_CallFunction (cx=<optimized out>, obj=..., fun=..., args=..., rval=...) at js/src/jsapi.cpp:2948 #42 0x084c94d1 in OOMTest (cx=<optimized out>, argc=<optimized out>, vp=<optimized out>) at js/src/builtin/TestingFunctions.cpp:1721 [...] #65 main (argc=<optimized out>, argv=<optimized out>, envp=<optimized out>) at js/src/shell/js.cpp:9234 eax 0x0 0 ebx 0xffff9c54 -25516 ecx 0xf7d9f864 -136710044 edx 0x0 0 esi 0xf3db3448 -203738040 edi 0xf3db3448 -203738040 ebp 0xffff9c88 4294941832 esp 0xffff9bf0 4294941680 eip 0x84897d1 <js::jit::MoveResolver::resolve()+2081> => 0x84897d1 <js::jit::MoveResolver::resolve()+2081>: movl $0x0,0x0 0x84897db <js::jit::MoveResolver::resolve()+2091>: ud2
1,457,301
13,236,744
This bug was filed from the Socorro interface and is report bp-b9253079-c032-408e-906d-06d400180325. ============================================================= Seen while looking at Mac specific nightly crashes - also affects Linux: https://bit.ly/2JvwxJD. Not super huge volume. Crashes go back to Build 20180322100349. Possible regression range based on build ID: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=3d21d31141dc5e2d2aff89203458125a3cce6c64&tochange=8bf380faae74e4921be6000496ca09d4a2c44e8d Top 10 frames of crashing thread: 0 libxul.so mozilla::ipc::ProcessLink::SendMessage ipc/glue/MessageLink.cpp:164 1 libxul.so mozilla::ipc::MessageChannel::Send [clone .cold.466] 2 libxul.so mozilla::dom::PBrowserChild::SendAsyncMessage ipc/ipdl/PBrowserChild.cpp:163 3 libxul.so mozilla::dom::TabChild::DoSendAsyncMessage dom/ipc/TabChild.cpp:3073 4 libxul.so nsFrameMessageManager::DispatchAsyncMessage 5 libxul.so mozilla::dom::ContentFrameMessageManagerBinding::sendAsyncMessage 6 libxul.so mozilla::dom::ContentFrameMessageManagerBinding::genericMethod 7 libxul.so js::InternalCallOrConstruct 8 libxul.so js::Call js/src/vm/Interpreter.cpp:535 9 libxul.so js::ForwardingProxyHandler::call const =============================================================
1,457,758
13,240,359
This bug was filed from the Socorro interface and is report bp-e68668ad-3457-4255-ad00-b07bd0180428. ============================================================= This is topcrash 7 in the Windows nightly 20180426100055, with 21 crashes in around 15 different installations. The stacks are pretty much useless (AFAICS) but perhaps the driver involved is something we can block? Filing on that basis. Top 6 frames of crashing thread: 0 nvd3dumx_cfg.dll nvd3dumx_cfg.dll@0x9d471c 1 nvd3dumx_cfg.dll nvd3dumx_cfg.dll@0xa9faaf 2 nvd3dumx_cfg.dll nvd3dumx_cfg.dll@0x9cf36c 3 nvd3dumx_cfg.dll nvd3dumx_cfg.dll@0xc29a65 4 nvd3dumx_cfg.dll nvd3dumx_cfg.dll@0xaa19ee 5 nvd3dumx_cfg.dll nvd3dumx_cfg.dll@0x9d4cff =============================================================
1,461,324
13,275,639
The following testcase crashes on mozilla-central revision a7461494a7a0 (build with --enable-posix-nspr-emulation --enable-valgrind --enable-gczeal --disable-tests --disable-profiling --enable-debug --without-intl-api --enable-optimize --target=i686-pc-linux-gnu, run with --fuzzing-safe --cpu-count=2 --baseline-eager): oomTest(function() { eval(` try { (function() { for (a of [{}, { __iterator__: function() {} }]) for (b in a) return {p:1, q:2, r:3, s:4, t:5}; })(); } catch(ex) {} `); }); Backtrace: received signal SIGSEGV, Segmentation fault. #0 0x080b4d8e in JS::Value::toObject (this=0xffff9fa8) at dist/include/js/Value.h:749 #1 0x08401bf1 in js::jit::ProcessTryNotesBaseline (pc=0xffff9f5c, rfe=0xffffa264, ei=..., frame=..., cx=<optimized out>) at js/src/jit/JitFrames.cpp:432 #2 js::jit::HandleExceptionBaseline (pc=<optimized out>, rfe=0xffffa264, frame=..., cx=<optimized out>) at js/src/jit/JitFrames.cpp:524 #3 js::jit::HandleException (rfe=<optimized out>) at js/src/jit/JitFrames.cpp:710 #4 0x230e9703 in ?? () #5 0x230dbb85 in ?? () #6 0x083f7c2d in EnterJit (cx=<optimized out>, cx@entry=0xf6e17800, state=..., code=0x23c81120 "\351\033") at js/src/jit/Jit.cpp:101 #7 0x083f887f in js::jit::MaybeEnterJit (cx=0xf6e17800, state=...) at js/src/jit/Jit.cpp:163 #8 0x081e456f in js::RunScript (cx=<optimized out>, state=...) at js/src/vm/Interpreter.cpp:402 #9 0x081e4bd5 in js::InternalCallOrConstruct (cx=<optimized out>, args=..., construct=js::NO_CONSTRUCT) at js/src/vm/Interpreter.cpp:489 #10 0x081e4ec0 in InternalCall (cx=cx@entry=0xf6e17800, args=...) at js/src/vm/Interpreter.cpp:516 #11 0x081e503f in js::CallFromStack (cx=0xf6e17800, args=...) at js/src/vm/Interpreter.cpp:522 #12 0x082c3d24 in js::jit::DoCallFallback (cx=<optimized out>, frame=0xffffab08, stub_=0xf54f1010, argc=0, vp=0xffffaad0, res=...) at js/src/jit/BaselineIC.cpp:2382 #13 0x230e869a in ?? () #14 0xf54f1010 in ?? () #15 0x230dbb85 in ?? () #16 0x083f7c2d in EnterJit (cx=<optimized out>, cx@entry=0xf6e17800, state=..., code=0x23c80890 "\351\033") at js/src/jit/Jit.cpp:101 #17 0x083f887f in js::jit::MaybeEnterJit (cx=0xf6e17800, state=...) at js/src/jit/Jit.cpp:163 #18 0x081e456f in js::RunScript (cx=<optimized out>, state=...) at js/src/vm/Interpreter.cpp:402 #19 0x081e6ee9 in js::ExecuteKernel (cx=<optimized out>, script=..., envChainArg=..., newTargetValue=..., evalInFrame=..., result=<optimized out>) at js/src/vm/Interpreter.cpp:700 #20 0x0821d81a in EvalKernel (cx=<optimized out>, v=..., v@entry=..., evalType=evalType@entry=DIRECT_EVAL, caller=..., env=..., pc=0xf65b4275 "{\001", vp=...) at js/src/builtin/Eval.cpp:323 #21 0x0821dec0 in js::DirectEval (cx=<optimized out>, v=..., vp=...) at js/src/builtin/Eval.cpp:433 #22 0x082c436d in js::jit::DoCallFallback (cx=<optimized out>, frame=0xffffb778, stub_=0xf65c8050, argc=1, vp=0xffffb738, res=...) at js/src/jit/BaselineIC.cpp:2366 #23 0x230e869a in ?? () #24 0xf65c8050 in ?? () #25 0x230dbb85 in ?? () #26 0x083f7c2d in EnterJit (cx=<optimized out>, cx@entry=0xf6e17800, state=..., code=0x230fe760 "\351\033") at js/src/jit/Jit.cpp:101 [...] #32 0x086816f2 in JS_CallFunction (cx=<optimized out>, obj=..., fun=..., args=..., rval=...) at js/src/jsapi.cpp:2948 #33 0x084fdaa1 in OOMTest (cx=<optimized out>, argc=<optimized out>, vp=<optimized out>) at js/src/builtin/TestingFunctions.cpp:1774 [...] #38 0x082c3d24 in js::jit::DoCallFallback (cx=<optimized out>, frame=0xffffc2e8, stub_=0xf65b5030, argc=1, vp=0xffffc2a8, res=...) at js/src/jit/BaselineIC.cpp:2382 #39 0x230e869a in ?? () #40 0xf65b5030 in ?? () #41 0x230dbb85 in ?? () #42 0x083f7c2d in EnterJit (cx=<optimized out>, cx@entry=0xf6e17800, state=..., code=0x230ea200 "\351\033") at js/src/jit/Jit.cpp:101 [...] #53 main (argc=<optimized out>, argv=<optimized out>, envp=<optimized out>) at js/src/shell/js.cpp:9294 eax 0x0 0 ebx 0x8ea4000 149569536 ecx 0xf7d9f864 -136710044 edx 0x0 0 esi 0x8ea4000 149569536 edi 0x8401ba2 138419106 ebp 0xffff9ed8 4294942424 esp 0xffff9ed0 4294942416 eip 0x80b4d8e <JS::Value::toObject() const+62> => 0x80b4d8e <JS::Value::toObject() const+62>: movl $0x0,0x0 0x80b4d98 <JS::Value::toObject() const+72>: ud2 Marking this s-s because it only reproduces on 32-bit, it requires JIT and we had vulnerabilities with the same assertion before.
1,461,731
13,279,146
This bug was filed from the Socorro interface and is report bp-690da5e1-4448-44e9-8900-ef3db0180515. ============================================================= Currently at the top of **Mac** crash stats in 60, although present in other versions as well: https://bit.ly/2KqQba0. All users on 60 are running 10.13. Comments: *Firefox gets stuck (and sometimes crashes) since installation of 60.0 *60 is very buggy on my iMac. Freezes constantly. I have to use Chrome *no more network access (from firefox only). Safari is still ok. MOZ_CRASH(Shutdown hanging before starting.) - Seems like a bad user experience. Top 10 frames of crashing thread: 0 libsystem_kernel.dylib libsystem_kernel.dylib@0x1ca1e 1 libsystem_pthread.dylib _pthread_cond_wait 2 libsystem_pthread.dylib pthread_cond_signal_thread_np 3 libmozglue.dylib <name omitted> mozglue/misc/ConditionVariable_posix.cpp:118 4 XUL mozilla::ThreadEventQueue<mozilla::PrioritizedEventQueue<mozilla::EventQueue> >::GetEvent xpcom/threads/CondVar.h:68 5 XUL nsThread::ProcessNextEvent xpcom/threads/nsThread.cpp:967 6 XUL NS_ProcessNextEvent xpcom/threads/nsThreadUtils.cpp:517 7 XUL mozilla::net::nsHttpConnectionMgr::Shutdown xpcom/threads/nsThreadUtils.h:323 8 XUL mozilla::net::nsHttpHandler::Observe netwerk/protocol/http/nsHttpHandler.cpp:2754 9 XUL non-virtual thunk to mozilla::net::nsHttpHandler::Observe netwerk/protocol/http/nsHttpHandler.cpp =============================================================
1,461,749
13,279,255
Created attachment 8975882 trigger.html Testcase found while fuzzing mozilla-central rev cf3ee14023483cbbb57129479537c713e22c1980. ==10111==ERROR: AddressSanitizer: SEGV on unknown address 0x00000000001c (pc 0x7f2c228f7856 bp 0x7ffdaea40050 sp 0x7ffdaea40040 T0) ==10111==The signal is caused by a READ memory access. ==10111==Hint: address points to the zero page. #0 0x7f2c228f7855 in GetBoolFlag /builds/worker/workspace/build/src/dom/base/nsINode.h:1644:12 #1 0x7f2c228f7855 in GetParent /builds/worker/workspace/build/src/dom/base/nsINode.h:999 #2 0x7f2c228f7855 in mozilla::dom::ExplicitChildIterator::Seek(nsIContent const*) /builds/worker/workspace/build/src/dom/base/ChildIterator.cpp:177 #3 0x7f2c2795d231 in nsCSSFrameConstructor::ContentAppended(nsIContent*, nsCSSFrameConstructor::InsertionKind) /builds/worker/workspace/build/src/layout/base/nsCSSFrameConstructor.cpp:7152:10 #4 0x7f2c278eddaf in mozilla::RestyleManager::ProcessRestyledFrames(nsStyleChangeList&) /builds/worker/workspace/build/src/layout/base/RestyleManager.cpp:1402:27 #5 0x7f2c278fb105 in mozilla::RestyleManager::DoProcessPendingRestyles(mozilla::ServoTraversalFlags) /builds/worker/workspace/build/src/layout/base/RestyleManager.cpp:3001:9 #6 0x7f2c278b2e1d in ProcessPendingRestyles /builds/worker/workspace/build/src/layout/base/RestyleManager.cpp:3078:3 #7 0x7f2c278b2e1d in mozilla::PresShell::DoFlushPendingNotifications(mozilla::ChangesToFlush) /builds/worker/workspace/build/src/layout/base/PresShell.cpp:4315 #8 0x7f2c27842f76 in FlushPendingNotifications /builds/worker/workspace/build/src/layout/base/nsIPresShell.h:591:5 #9 0x7f2c27842f76 in nsRefreshDriver::Tick(long, mozilla::TimeStamp) /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:1925 #10 0x7f2c27852380 in TickDriver /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:337:13 #11 0x7f2c27852380 in mozilla::RefreshDriverTimer::TickRefreshDrivers(long, mozilla::TimeStamp, nsTArray<RefPtr<nsRefreshDriver> >&) /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:307 #12 0x7f2c27851f46 in mozilla::RefreshDriverTimer::Tick(long, mozilla::TimeStamp) /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:329:5 #13 0x7f2c27854cbe in RunRefreshDrivers /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:770:5 #14 0x7f2c27854cbe in mozilla::VsyncRefreshDriverTimer::RefreshDriverVsyncObserver::TickRefreshDriver(mozilla::TimeStamp) /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:683 #15 0x7f2c278548be in mozilla::VsyncRefreshDriverTimer::RefreshDriverVsyncObserver::NotifyVsync(mozilla::TimeStamp) /builds/worker/workspace/build/src/layout/base/nsRefreshDriver.cpp:584:9 #16 0x7f2c280fabff in mozilla::layout::VsyncChild::RecvNotify(mozilla::TimeStamp const&) /builds/worker/workspace/build/src/layout/ipc/VsyncChild.cpp:68:16 #17 0x7f2c20e82a6d in mozilla::layout::PVsyncChild::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/build/src/obj-firefox/ipc/ipdl/PVsyncChild.cpp:167:20 #18 0x7f2c20d46e2d in mozilla::ipc::PBackgroundChild::OnMessageReceived(IPC::Message const&) /builds/worker/workspace/build/src/obj-firefox/ipc/ipdl/PBackgroundChild.cpp:1988:28 #19 0x7f2c2085ffce in mozilla::ipc::MessageChannel::DispatchAsyncMessage(IPC::Message const&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:2136:25 #20 0x7f2c2085cf96 in mozilla::ipc::MessageChannel::DispatchMessage(IPC::Message&&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:2066:17 #21 0x7f2c2085e74c in mozilla::ipc::MessageChannel::RunMessage(mozilla::ipc::MessageChannel::MessageTask&) /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:1912:5 #22 0x7f2c2085eda8 in mozilla::ipc::MessageChannel::MessageTask::Run() /builds/worker/workspace/build/src/ipc/glue/MessageChannel.cpp:1945:15 #23 0x7f2c1f96dba3 in nsThread::ProcessNextEvent(bool, bool*) /builds/worker/workspace/build/src/xpcom/threads/nsThread.cpp:1090:14 #24 0x7f2c1f989770 in NS_ProcessNextEvent(nsIThread*, bool) /builds/worker/workspace/build/src/xpcom/threads/nsThreadUtils.cpp:519:10 #25 0x7f2c20867c6a in mozilla::ipc::MessagePump::Run(base::MessagePump::Delegate*) /builds/worker/workspace/build/src/ipc/glue/MessagePump.cpp:97:21 #26 0x7f2c207bb959 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:326:10 #27 0x7f2c207bb959 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:319 #28 0x7f2c207bb959 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:299 #29 0x7f2c272f5d5a in nsBaseAppShell::Run() /builds/worker/workspace/build/src/widget/nsBaseAppShell.cpp:157:27 #30 0x7f2c2b55d49b in XRE_RunAppShell() /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:893:22 #31 0x7f2c207bb959 in RunInternal /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:326:10 #32 0x7f2c207bb959 in RunHandler /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:319 #33 0x7f2c207bb959 in MessageLoop::Run() /builds/worker/workspace/build/src/ipc/chromium/src/base/message_loop.cc:299 #34 0x7f2c2b55ce60 in XRE_InitChildProcess(int, char**, XREChildData const*) /builds/worker/workspace/build/src/toolkit/xre/nsEmbedFunctions.cpp:719:34 #35 0x4f50dc in content_process_main /builds/worker/workspace/build/src/browser/app/../../ipc/contentproc/plugin-container.cpp:50:30 #36 0x4f50dc in main /builds/worker/workspace/build/src/browser/app/nsBrowserApp.cpp:282 #37 0x7f2c3f5f582f in __libc_start_main /build/glibc-Cl5G7W/glibc-2.23/csu/../csu/libc-start.c:291
1,461,953
13,281,264
Created attachment 8976106 Client-2018-05-16-152159.ips.beta Device: iPad Mini 4 iOS 11.4 (15F5077a) Build: 12.0 (10645) Steps to reproduce: 1. Launch Firefox 2. Login with any account 3. From the hamburger menu select the sync button (username) 4. From the account management page, tap the "Disconnect Sync" and "Disconnect" button Expected results: Account is disconnected, "Disconnect sync" option no longer available Actual results: Account is disconnected, "Disconnect sync" still available and if pressed, Firefox crashes Note: Occurs only on iPad devices.
1,462,077
13,282,326
It appears we are hitting our safety release assert in FF60 that prevents a cross-origin service worker controller. Fortunately the assertion prevents this from being a security issue, but its a bad problem and we need to figure out how this is happening. This bug was filed from the Socorro interface and is report bp-09d62ec8-7bf4-4e50-b863-aa3bd0180516. ============================================================= Top 10 frames of crashing thread: 0 xul.dll mozilla::dom::ClientSource::SetController dom/clients/manager/ClientSource.cpp:383 1 xul.dll mozilla::dom::ClientSource::Control dom/clients/manager/ClientSource.cpp:433 2 xul.dll mozilla::dom::ClientSourceOpChild::DoSourceOp<RefPtr<mozilla::MozPromise<mozilla::dom::ClientOpResult, nsresult, 0> > dom/clients/manager/ClientSourceOpChild.cpp:45 3 xul.dll mozilla::dom::ClientSourceOpChild::Init dom/clients/manager/ClientSourceOpChild.cpp:79 4 xul.dll mozilla::dom::ClientSourceChild::RecvPClientSourceOpConstructor dom/clients/manager/ClientSourceChild.cpp:49 5 xul.dll mozilla::dom::PClientSourceChild::OnMessageReceived ipc/ipdl/PClientSourceChild.cpp:241 6 xul.dll mozilla::ipc::PBackgroundChild::OnMessageReceived ipc/ipdl/PBackgroundChild.cpp:1968 7 xul.dll mozilla::ipc::MessageChannel::DispatchAsyncMessage ipc/glue/MessageChannel.cpp:2133 8 xul.dll mozilla::ipc::MessageChannel::DispatchMessageW ipc/glue/MessageChannel.cpp:2063 9 xul.dll mozilla::ipc::MessageChannel::RunMessage ipc/glue/MessageChannel.cpp:1909 =============================================================
1,462,662
13,287,333
+++ This bug was initially created as a clone of Bug #1457929 +++ As discussed in Bug 1457929 - we should clear out the container used by privacy.usercontext.about_newtab_segregation.enabled (which I believe is '5') so we don't make a persistent container that tracks the user through thumbnails. :baku proposed doing it on shutdown (and startup in case of crash.)
1,462,746
13,288,033
This bug was filed from the Socorro interface and is report bp-952bf2b4-d13d-43c1-9071-e51e60180514. ============================================================= Seen while looking at Mac crash stats: https://bit.ly/2KA0vwo. 11 crashes/9 installs on Mac in the last 7 days. Crashes seemed to have started with Build 20180512220039 Possible regression range based on Build ID: https://hg.mozilla.org/mozilla-central/pushloghtml?fromchange=aabfe960ab59fea2e85896b1f8050786e16ab23b&tochange=a7461494a7a0bb3d80c1449c1d5d484d8b568d98 Top 10 frames of crashing thread: 0 XUL mozilla::ShouldClearTargets dom/base/nsWrapperCache.h:264 1 XUL mozilla::EventDispatcher::Dispatch dom/events/EventDispatcher.cpp:955 2 XUL mozilla::EventDispatcher::DispatchDOMEvent dom/events/EventDispatcher.cpp 3 XUL nsINode::DispatchEvent dom/base/nsINode.cpp:1079 4 XUL nsContentUtils::DispatchEvent dom/base/nsContentUtils.cpp:4471 5 XUL nsContentUtils::DispatchTrustedEvent dom/base/nsContentUtils.cpp:4439 6 XUL mozilla::dom::HTMLSlotElement::FireSlotChangeEvent dom/html/HTMLSlotElement.cpp:241 7 XUL nsDOMMutationObserver::HandleMutationsInternal dom/base/nsDOMMutationObserver.cpp:949 8 XUL mozilla::CycleCollectedJSContext::PerformMicroTaskCheckPoint xpcom/base/CycleCollectedJSContext.cpp:543 9 XUL mozilla::CycleCollectedJSContext::AfterProcessTask xpcom/base/CycleCollectedJSContext.cpp:374 =============================================================