[Webkit-unassigned] [Bug 91376] New: [Qt] http/tests/security/sandboxed-iframe-modify-self.html flaky

bugzilla-daemon at webkit.org bugzilla-daemon at webkit.org
Mon Jul 16 04:55:57 PDT 2012


https://bugs.webkit.org/show_bug.cgi?id=91376

           Summary: [Qt]
                    http/tests/security/sandboxed-iframe-modify-self.html
                    flaky
           Product: WebKit
           Version: 528+ (Nightly build)
          Platform: Unspecified
        OS/Version: Unspecified
            Status: UNCONFIRMED
          Severity: Normal
          Priority: P2
         Component: Tools / Tests
        AssignedTo: webkit-unassigned at lists.webkit.org
        ReportedBy: zarvai at inf.u-szeged.hu


Test is flaky on Qt.

--- /ramdisk/qt-linux-release/build/layout-test-results/http/tests/security/sandboxed-iframe-modify-self-expected.txt 
+++ /ramdisk/qt-linux-release/build/layout-test-results/http/tests/security/sandboxed-iframe-modify-self-actual.txt 
@@ -1,3 +1,5 @@
+CONSOLE MESSAGE: Unsafe JavaScript attempt to initiate a navigation change for frame with URL http://127.0.0.1:8000/security/sandboxed-iframe-form-top.html from frame with URL http://127.0.0.1:8000/security/resources/sandboxed-iframe-form-top.html.
+
 CONSOLE MESSAGE: Unsafe JavaScript attempt to access frame with URL http://127.0.0.1:8000/security/sandboxed-iframe-modify-self.html from frame with URL http://127.0.0.1:8000/security/resources/sandboxed-iframe-modify-self.html. Domains, protocols and ports must match.

 This is a "sanity" test case to verify that a sandboxed frame cannot break out of its sandbox by modifying its own sandbox attribute. Two attempts are made:

-- 
Configure bugmail: https://bugs.webkit.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.



More information about the webkit-unassigned mailing list