Closed Bug 157968 Opened 22 years ago Closed 22 years ago

"View Page Info" / Links crashes browser

Categories

(SeaMonkey :: Page Info, defect)

x86
Windows 2000
defect
Not set
critical

Tracking

(Not tracked)

VERIFIED DUPLICATE of bug 154692

People

(Reporter: bugzilla, Assigned: db48x)

References

()

Details

From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.1a+) Gecko/20020715
BuildID:    2002071508

When I open http://www.atvnuernberg-badminton.de.vu, a second window is is
opened via JS. On this window, if you press right mouse-button, open "View Page
Info", click on "Links", Mozilla crashes!

See incidents:
TB8414047M
TB8414009M
TB8413962Q

(Btw: would be really nice if you could copy & paste the incident-numbers from
talkback!)


Reproducible: Always
Steps to Reproduce:
1. open http://www.atvnuernberg-badminton.de.vu & wait until second window opens
2. press right mouse-button over the new window & select "View Page Info"
3. click on "Links"


Actual Results:  *** MOZILLA-CRASH! ***


Expected Results:  List of links

Well, I am not really sure if it is really critical. This function is not used
that frequently, I guess :-)
js_GetProperty(JSContext * 0x054d9ef0, JSObject * 0x055d5950, long 24535168,
long * 0x0012b5e8) line 2520 + 3 bytes
js_Interpret(JSContext * 0x054d9ef0, long * 0x0012b798) line 2574 + 2032 bytes
js_Invoke(JSContext * 0x054d9ef0, unsigned int 1, unsigned int 2) line 805 + 13
bytes
nsXPCWrappedJSClass::CallMethod(nsXPCWrappedJSClass * const 0x057bf218,
nsXPCWrappedJS * 0x057d4da8, unsigned short 3, const nsXPTMethodInfo *
0x01600540, nsXPTCMiniVariant * 0x0012bc8c) line 1193 + 21 bytes
nsXPCWrappedJS::CallMethod(nsXPCWrappedJS * const 0x057d4da8, unsigned short 3,
const nsXPTMethodInfo * 0x01600540, nsXPTCMiniVariant * 0x0012bc8c) line 430
PrepareAndDispatch(nsXPTCStubBase * 0x057d4da8, unsigned int 3, unsigned int *
0x0012bd3c, unsigned int * 0x0012bd2c) line 115 + 31 bytes
SharedStub() line 139
nsTreeWalker::TestNode(nsIDOMNode * 0x04608e00, short * 0x0012bdc0) line 596 +
34 bytes
nsTreeWalker::ChildOf(nsIDOMNode * 0x04608aec, int -1, int 0, int 6, nsIDOMNode
* * 0x0012c4ec) line 534 + 21 bytes
nsTreeWalker::FirstChildOf(nsIDOMNode * 0x04608aec, int 0, int 6, nsIDOMNode * *
0x0012c4ec) line 318 + 28 bytes
nsTreeWalker::ChildOf(nsIDOMNode * 0x046089c0, int -1, int 0, int 5, nsIDOMNode
* * 0x0012c4ec) line 551 + 32 bytes
nsTreeWalker::FirstChildOf(nsIDOMNode * 0x046089c0, int 0, int 5, nsIDOMNode * *
0x0012c4ec) line 318 + 28 bytes
nsTreeWalker::ChildOf(nsIDOMNode * 0x046082e0, int -1, int 0, int 4, nsIDOMNode
* * 0x0012c4ec) line 551 + 32 bytes
nsTreeWalker::FirstChildOf(nsIDOMNode * 0x046082e0, int 0, int 4, nsIDOMNode * *
0x0012c4ec) line 318 + 28 bytes
nsTreeWalker::ChildOf(nsIDOMNode * 0x05529eb0, int -1, int 0, int 3, nsIDOMNode
* * 0x0012c4ec) line 551 + 32 bytes
nsTreeWalker::FirstChildOf(nsIDOMNode * 0x05529eb0, int 0, int 3, nsIDOMNode * *
0x0012c4ec) line 318 + 28 bytes
nsTreeWalker::ChildOf(nsIDOMNode * 0x0552fa40, int -1, int 0, int 2, nsIDOMNode
* * 0x0012c4ec) line 551 + 32 bytes
nsTreeWalker::FirstChildOf(nsIDOMNode * 0x0552fa40, int 0, int 2, nsIDOMNode * *
0x0012c4ec) line 318 + 28 bytes
nsTreeWalker::ChildOf(nsIDOMNode * 0x0419add0, int -1, int 0, int 1, nsIDOMNode
* * 0x0012c4ec) line 551 + 32 bytes
nsTreeWalker::FirstChildOf(nsIDOMNode * 0x0419add0, int 0, int 1, nsIDOMNode * *
0x0012c4ec) line 318 + 28 bytes
nsTreeWalker::ChildOf(nsIDOMNode * 0x0420adcc, int -1, int 0, int 0, nsIDOMNode
* * 0x0012c4ec) line 551 + 32 bytes
nsTreeWalker::FirstChildOf(nsIDOMNode * 0x0420adcc, int 0, int 0, nsIDOMNode * *
0x0012c4ec) line 318 + 28 bytes
nsTreeWalker::NextInDocumentOrderOf(nsIDOMNode * 0x0420adcc, int 0, int -1,
nsIDOMNode * * 0x0012c4ec) line 404 + 27 bytes
nsTreeWalker::NextNode(nsTreeWalker * const 0x057d4e10, nsIDOMNode * *
0x0012c4ec) line 269
XPTC_InvokeByIndex(nsISupports * 0x057d4e10, unsigned int 15, unsigned int 1,
nsXPTCVariant * 0x0012c4ec) line 106
XPCWrappedNative::CallMethod(XPCCallContext & {...}, XPCWrappedNative::CallMode
CALL_METHOD) line 1994 + 42 bytes
XPC_WN_CallMethod(JSContext * 0x054d9ef0, JSObject * 0x055d5708, unsigned int 0,
long * 0x057b2fe8, long * 0x0012c7c8) line 1266 + 14 bytes
js_Invoke(JSContext * 0x054d9ef0, unsigned int 0, unsigned int 0) line 788 + 23
bytes
js_Interpret(JSContext * 0x054d9ef0, long * 0x0012d608) line 2743 + 15 bytes
...
...


A page with a java applet crashes PI at the moment..


*** This bug has been marked as a duplicate of 154692 ***
Status: NEW → RESOLVED
Closed: 22 years ago
Resolution: --- → DUPLICATE
vrfy dupe
Status: RESOLVED → VERIFIED
Product: Browser → Seamonkey
You need to log in before you can comment on or make changes to this bug.