[Webkit-unassigned] [Bug 91376] New: [Qt] http/tests/security/sandboxed-iframe-modify-self.html flaky
bugzilla-daemon at webkit.org
bugzilla-daemon at webkit.org
Mon Jul 16 04:55:57 PDT 2012
https://bugs.webkit.org/show_bug.cgi?id=91376
Summary: [Qt]
http/tests/security/sandboxed-iframe-modify-self.html
flaky
Product: WebKit
Version: 528+ (Nightly build)
Platform: Unspecified
OS/Version: Unspecified
Status: UNCONFIRMED
Severity: Normal
Priority: P2
Component: Tools / Tests
AssignedTo: webkit-unassigned at lists.webkit.org
ReportedBy: zarvai at inf.u-szeged.hu
Test is flaky on Qt.
--- /ramdisk/qt-linux-release/build/layout-test-results/http/tests/security/sandboxed-iframe-modify-self-expected.txt
+++ /ramdisk/qt-linux-release/build/layout-test-results/http/tests/security/sandboxed-iframe-modify-self-actual.txt
@@ -1,3 +1,5 @@
+CONSOLE MESSAGE: Unsafe JavaScript attempt to initiate a navigation change for frame with URL http://127.0.0.1:8000/security/sandboxed-iframe-form-top.html from frame with URL http://127.0.0.1:8000/security/resources/sandboxed-iframe-form-top.html.
+
CONSOLE MESSAGE: Unsafe JavaScript attempt to access frame with URL http://127.0.0.1:8000/security/sandboxed-iframe-modify-self.html from frame with URL http://127.0.0.1:8000/security/resources/sandboxed-iframe-modify-self.html. Domains, protocols and ports must match.
This is a "sanity" test case to verify that a sandboxed frame cannot break out of its sandbox by modifying its own sandbox attribute. Two attempts are made:
--
Configure bugmail: https://bugs.webkit.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.
More information about the webkit-unassigned
mailing list