Closed
Bug 1907353
Opened 3 months ago
Closed 3 months ago
Crash in [@ mozilla::ShouldAllowAccessFor]
Categories
(Core :: Privacy: Anti-Tracking, defect)
Core
Privacy: Anti-Tracking
Tracking
()
RESOLVED
FIXED
130 Branch
Tracking | Status | |
---|---|---|
firefox-esr115 | --- | unaffected |
firefox-esr128 | --- | fixed |
firefox128 | --- | fixed |
firefox129 | --- | fixed |
firefox130 | --- | fixed |
People
(Reporter: aryx, Assigned: timhuang)
References
(Regression)
Details
(Keywords: crash, regression)
Crash Data
Attachments
(3 files)
48 bytes,
text/x-phabricator-request
|
Details | Review | |
48 bytes,
text/x-phabricator-request
|
phab-bot
:
approval-mozilla-beta+
|
Details | Review |
48 bytes,
text/x-phabricator-request
|
phab-bot
:
approval-mozilla-release+
dmeehan
:
approval-mozilla-esr128+
|
Details | Review |
8 crashes from 8 installs of Firefox 128.0, + crashes for beta and nightly builds.
Crash report: https://crash-stats.mozilla.org/report/index/02113725-88a2-4ea5-9d5c-6d6ac0240711
Reason: EXCEPTION_ACCESS_VIOLATION_READ
Top 10 frames:
0 xul.dll mozilla::ShouldAllowAccessFor(nsIChannel*, nsIURI*, unsigned int*) toolkit/components/antitracking/StorageAccess.cpp:806
1 xul.dll mozilla::(anonymous namespace)::ShouldPartitionChannel(nsIChannel*, nsICookie... toolkit/components/antitracking/StoragePrincipalHelper.cpp:39
1 xul.dll mozilla::(anonymous namespace)::ChooseOriginAttributes(nsIChannel*, mozilla::... toolkit/components/antitracking/StoragePrincipalHelper.cpp:62
2 xul.dll mozilla::StoragePrincipalHelper::Create(nsIChannel*, nsIPrincipal*, bool, nsI... toolkit/components/antitracking/StoragePrincipalHelper.cpp:185
3 xul.dll nsScriptSecurityManager::GetChannelResultStoragePrincipal(nsIChannel*, nsIPri... caps/nsScriptSecurityManager.cpp:280
4 xul.dll mozilla::ClearSiteData::ClearDataFromChannel(nsIHttpChannel*) toolkit/components/clearsitedata/ClearSiteData.cpp:161
4 xul.dll mozilla::ClearSiteData::Observe(nsISupports*, char const*, char16_t const*) toolkit/components/clearsitedata/ClearSiteData.cpp:145
5 xul.dll nsObserverList::NotifyObservers(nsISupports*, char const*, char16_t const*) xpcom/ds/nsObserverList.cpp:71
5 xul.dll nsObserverService::NotifyObservers(nsISupports*, char const*, char16_t const*) xpcom/ds/nsObserverService.cpp:289
6 xul.dll mozilla::net::nsHttpHandler::NotifyObservers(nsIChannel*, char const*) netwerk/protocol/http/nsHttpHandler.cpp:701
Flags: needinfo?(tihuang)
Assignee | ||
Updated•3 months ago
|
Assignee: nobody → tihuang
Status: NEW → ASSIGNED
Flags: needinfo?(tihuang)
Assignee | ||
Comment 1•3 months ago
|
||
Pushed by tihuang@mozilla.com:
https://hg.mozilla.org/integration/autoland/rev/fa45bb12224b
Use the loadInfo to check storage access if there is no target browsing context. r=anti-tracking-reviewers,pbz
Comment 3•3 months ago
|
||
bugherder |
Status: ASSIGNED → RESOLVED
Closed: 3 months ago
Resolution: --- → FIXED
Target Milestone: --- → 130 Branch
Assignee | ||
Comment 4•3 months ago
|
||
Original Revision: https://phabricator.services.mozilla.com/D216394
Updated•3 months ago
|
Attachment #9412721 -
Flags: approval-mozilla-beta?
Comment 5•3 months ago
|
||
beta Uplift Approval Request
- User impact if declined: Firefox might crash
- Code covered by automated testing: no
- Fix verified in Nightly: yes
- Needs manual QE test: no
- Steps to reproduce for manual QE testing: None
- Risk associated with taking this patch: Low risk
- Explanation of risk level: The patch only changes one line. The risk of taking this patch is small.
- String changes made/needed: none
- Is Android affected?: yes
Assignee | ||
Comment 6•3 months ago
|
||
Original Revision: https://phabricator.services.mozilla.com/D216394
Updated•3 months ago
|
Attachment #9412725 -
Flags: approval-mozilla-release?
Comment 7•3 months ago
|
||
release Uplift Approval Request
- User impact if declined: Firefox might crash
- Code covered by automated testing: no
- Fix verified in Nightly: yes
- Needs manual QE test: no
- Steps to reproduce for manual QE testing: None
- Risk associated with taking this patch: Low risk
- Explanation of risk level: The patch only changes two lines. So, it's low risk
- String changes made/needed: None
- Is Android affected?: no
Assignee | ||
Comment 8•3 months ago
|
||
Comment on attachment 9412725 [details]
Bug 1907353 - Use the loadInfo to check storage access if there is no target browsing context. r?#anti-tracking!
ESR Uplift Approval Request
- If this is not a sec:{high,crit} bug, please state case for ESR consideration: The patch fixes a crash issue
- User impact if declined: Firefox might crash without this patch.
- Fix Landed on Version: 130
- Risk to taking this patch: Low
- Why is the change risky/not risky? (and alternatives if risky): The change is small.
Attachment #9412725 -
Flags: approval-mozilla-esr128?
Updated•3 months ago
|
Attachment #9412721 -
Flags: approval-mozilla-beta? → approval-mozilla-beta+
Updated•3 months ago
|
Comment 10•2 months ago
|
||
Comment on attachment 9412725 [details]
Bug 1907353 - Use the loadInfo to check storage access if there is no target browsing context. r?#anti-tracking!
Approved for 128.1esr.
Attachment #9412725 -
Flags: approval-mozilla-esr128? → approval-mozilla-esr128+
Comment 11•2 months ago
|
||
uplift |
Updated•2 months ago
|
Updated•2 months ago
|
Attachment #9412725 -
Flags: approval-mozilla-release? → approval-mozilla-release+
Comment 12•2 months ago
|
||
uplift |
Updated•2 months ago
|
You need to log in
before you can comment on or make changes to this bug.
Description
•