crash when saving user/password if a null db key is given

VERIFIED FIXED in M14

Status

SeaMonkey
Passwords & Permissions
P3
normal
VERIFIED FIXED
19 years ago
14 years ago

People

(Reporter: Trent Jarvi, Assigned: Stephen P. Morse)

Tracking

Firefox Tracking Flags

(Not tracked)

Details

(Whiteboard: [PDT+], URL)

(Reporter)

Description

19 years ago
In the process of saving login user id and password, if one does not enter a db
key (NULL), mozilla closes.  I observed this at my.yahoo.com and
www.cnbc.com.

I'd expect a dialog box stating the key was invalid like I get when I enter
123 as the db key.

Build ID 2000021416
(Assignee)

Comment 1

19 years ago
Let me clarify this a bit because from the information above I was about to 
close it out as works-for-me.  I then tried the following steps and was able to 
demonstrate the problem.  And I got a crash, not just a normla exit! :-(

1. Save a password from a previous session and thereby create a (non-null) 
master password.

2. Go to my.yahoo.com in current session.

3. Dialog pops up asking for master password.  Don't enter anything and click OK

4. Crashes with the following stack trace:

nsBasicStreamGenerator::GetByte(nsBasicStreamGenerator * const 0x0316a080, 
unsigned int 0, unsigned char * 0x0012ef08) line 93 + 25 bytes
Wallet_GetKey(int 35, int 0) line 1419 + 25 bytes
wallet_ReadKeyFile(int 0) line 1656 + 93 bytes
Wallet_SetKey(int 0) line 1825 + 12 bytes
si_SetKey() line 326 + 7 bytes
SI_LoadSignonData(int 1) line 1787 + 5 bytes
SINGSIGN_RestoreSignonData(char * 0x02f01650, unsigned short * 0x02f03530, 
unsigned short * * 0x0012fa14, unsigned int 0) line 2416 + 7 bytes
nsWalletlibService::OnEndDocumentLoad(nsWalletlibService * const 0x02134ddc, 
nsIDocumentLoader * 0x02a9ba20, nsIChannel * 0x02c2c110, unsigned int 0) line 
313 + 48 bytes
nsDocLoaderImpl::FireOnEndDocumentLoad(nsDocLoaderImpl * 0x02a9ba20, nsIChannel 
* 0x02c2c110, unsigned int 0) line 603
nsDocLoaderImpl::FireOnEndDocumentLoad(nsDocLoaderImpl * 0x02a9ba20, nsIChannel 
* 0x02c2c110, unsigned int 0) line 611
nsDocLoaderImpl::FireOnEndDocumentLoad(nsDocLoaderImpl * 0x02a9ba20, nsIChannel 
* 0x02c2c110, unsigned int 0) line 611
nsDocLoaderImpl::DocLoaderIsEmpty(unsigned int 0) line 494
nsDocLoaderImpl::OnStopRequest(nsDocLoaderImpl * const 0x02a9ba24, nsIChannel * 
0x02f694c0, nsISupports * 0x00000000, unsigned int 0, const unsigned short * 
0x00000000) line 438
nsLoadGroup::RemoveChannel(nsLoadGroup * const 0x02a9b9c0, nsIChannel * 
0x02f694c0, nsISupports * 0x00000000, unsigned int 0, const unsigned short * 
0x00000000) line 535 + 42 bytes
nsHTTPChannel::ResponseCompleted(nsIChannel * 0x02fd3eb4, nsIStreamListener * 
0x02fdefd0, unsigned int 0, const unsigned short * 0x00000000) line 1344
nsHTTPResponseListener::OnStopRequest(nsHTTPResponseListener * const 0x02fd8da0, 
nsIChannel * 0x02fd3eb4, nsISupports * 0x02f694c0, unsigned int 0, const 
unsigned short * 0x00000000) line 255
nsOnStopRequestEvent::HandleEvent(nsOnStopRequestEvent * const 0x02fdfbb0) line 
279
nsStreamListenerEvent::HandlePLEvent(PLEvent * 0x02fdfb60) line 93 + 12 bytes
PL_HandleEvent(PLEvent * 0x02fdfb60) line 526 + 10 bytes
PL_ProcessPendingEvents(PLEventQueue * 0x010232c0) line 487 + 9 bytes
_md_EventReceiverProc(HWND__ * 0x11c60760, unsigned int 49335, unsigned int 0, 
long 16921280) line 975 + 9 bytes
USER32! 77e71268()
010232c0()
Status: NEW → ASSIGNED
Keywords: beta1
Target Milestone: M14

Comment 2

19 years ago
setting sairuh as qa contact

QA Contact: paulmac → sairuh
(Assignee)

Updated

19 years ago
Summary: when saving user/password if a null db key is given mozilla closes → crash when saving user/password if a null db key is given
(Assignee)

Comment 3

19 years ago
Further clarification.  This is not restricted to a particular site -- the crash 
will occur anytime you are asked to unlock the single-signon database and you 
reply with a null password.
(Assignee)

Comment 4

19 years ago
I have a fix in hand.  Very simple and safe.  Awaiting code review and checkin 
approval.

Comment 5

19 years ago
Putting on the PDT+ radar for beta1.
Whiteboard: [PDT+]
(Assignee)

Comment 6

19 years ago
Checked in new version of wallet.cpp to fix this problem.
Status: ASSIGNED → RESOLVED
Last Resolved: 19 years ago
Resolution: --- → FIXED

Comment 7

19 years ago
Bulk move to Single Signon component, which has subsumed Password Cache.
Component: Password Cache → Single Signon
verif w/2000021708 comm bits on linux, mac and winNT.
Status: RESOLVED → VERIFIED
Product: Browser → Seamonkey
You need to log in before you can comment on or make changes to this bug.