Open Bug 199182 Opened 21 years ago Updated 2 years ago

Clear exception set by secMan before proceeding with the alternative security mode.

Categories

(Core :: XML, defect)

x86
Windows XP
defect

Tracking

()

People

(Reporter: harishd, Unassigned)

Details

Attachments

(1 file, 1 obsolete file)

The new secutiy model code is executed only if the security manager has denied
access. On denying access, the security manager, pushes in an exception into the
JS exception stack that makes the new security code's decision worthless. To
avoid this problem we have to clear the JS exception.
Attached patch patch v1.0 (obsolete) — Splinter Review
Thsi patch does the following:
1) Checks if "UnversalBrowserRead" is set.
2) Clears JS exception if CheckSameOrigin fails.
Status: NEW → ASSIGNED
Attachment #118466 - Flags: superreview?(jst)
Attachment #118466 - Flags: review?(heikki)
Attached patch patch v1.1Splinter Review
Attachment #118466 - Attachment is obsolete: true
Attachment #118466 - Flags: superreview?(jst)
Attachment #118466 - Flags: review?(heikki)
Attachment #118483 - Flags: superreview?(jst)
Attachment #118483 - Flags: review?(heikki)
Comment on attachment 118483 [details] [diff] [review]
patch v1.1

sr=jst
Attachment #118483 - Flags: superreview?(jst) → superreview+
Comment on attachment 118483 [details] [diff] [review]
patch v1.1

r=heikki, but please get in touch with mstoltz later to see if there is a
better way to do this.
Attachment #118483 - Flags: review?(heikki) → review+
Assignee: harishd → nobody
Status: ASSIGNED → NEW
QA Contact: ashshbhatt → xml
Severity: normal → S3
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: