Closed
Bug 474744
Opened 16 years ago
Closed 15 years ago
"ASSERTION: This is unsafe" with bogus protocol, setting innerHTML
Categories
(Core :: General, defect)
Tracking
()
RESOLVED
WORKSFORME
People
(Reporter: jruderman, Unassigned)
References
Details
(Keywords: assertion, testcase, Whiteboard: [sg:investigate])
Attachments
(1 file)
205 bytes,
text/html
|
Details |
###!!! ASSERTION: This is unsafe: 'nsContentUtils::IsSafeToRunScript()', file /Users/jruderman/central/layout/base/nsDocumentViewer.cpp, line 1072
Comment 1•16 years ago
|
||
Shouldn't <video> handle bogus protocol the same way as <img>, fire an error event?
Comment 2•16 years ago
|
||
For <img> content policies seems to prevent this. Bug 451004 is about adding content policies checks for <video>. We could change both <img> and <audio>/<video> to start loading using a script runner, or perhaps for 1.9.1 it is enough to add content policies for <audio>/<video> (Bug 451004 is P1 blocking1.9.1+)
Reporter | ||
Updated•16 years ago
|
Whiteboard: [sg:investigate]
Comment 3•16 years ago
|
||
> We could change both <img> and <audio>/<video> to start loading using
> a script runner
That involves one extra heap-allocation per image, no? I'm not sure I like the performance impact there...
Comment 4•16 years ago
|
||
This is now WFM in the latest trunk.
Reporter | ||
Comment 5•15 years ago
|
||
Yep. I'll add a crashtest.
Group: core-security
Status: NEW → RESOLVED
Closed: 15 years ago
Resolution: --- → WORKSFORME
Reporter | ||
Updated•15 years ago
|
Flags: in-testsuite+
You need to log in
before you can comment on or make changes to this bug.
Description
•