Bug 1811464 Comment 9 Edit History

Note: The actual edited comment in the bug view page will always show the original commenter’s name and original timestamp.

### Beta/Release Uplift Approval Request
* **User impact if declined**: invalid pointer dereferences, possibly exploitable although there are no known exploits.
* **Is this code covered by automated tests?**: Yes
* **Has the fix been verified in Nightly?**: Yes
* **Needs manual test from QE?**: No
* **If yes, steps to reproduce**: Existing crashtests should now crash in debug as there's a new MOZ_ASSERT in the patch.
* **List of other uplifts needed**: None
* **Risk to taking this patch**: Low
* **Why is the change risky/not risky? (and alternatives if risky)**: Patch is fairly small and includes an assert.
* **String changes made/needed**: none
* **Is Android affected?**: Unknown

### ESR Uplift Approval Request
* **If this is not a sec:{high,crit} bug, please state case for ESR consideration**: It's set:high currently.
* **User impact if declined**: invalid pointer dereferences, possibly exploitable although there are no known exploits.
* **Fix Landed on Version**: 111
* **Risk to taking this patch**: Low
* **Why is the change risky/not risky? (and alternatives if risky)**: Patch is fairly small and includes an assert.
### Beta/Release Uplift Approval Request
* **User impact if declined**: invalid pointer dereferences, possibly exploitable although there are no known exploits.
* **Is this code covered by automated tests?**: Yes
* **Has the fix been verified in Nightly?**: Yes
* **Needs manual test from QE?**: No
* **If yes, steps to reproduce**: Existing crashtests should now crash in debug as there's a new MOZ_ASSERT in the patch.
* **List of other uplifts needed**: None
* **Risk to taking this patch**: Low
* **Why is the change risky/not risky? (and alternatives if risky)**: Patch is fairly small and includes an assert.
* **String changes made/needed**: none
* **Is Android affected?**: Unknown

### ESR Uplift Approval Request
* **If this is not a sec:{high,crit} bug, please state case for ESR consideration**: It's sec:high currently.
* **User impact if declined**: invalid pointer dereferences, possibly exploitable although there are no known exploits.
* **Fix Landed on Version**: 111
* **Risk to taking this patch**: Low
* **Why is the change risky/not risky? (and alternatives if risky)**: Patch is fairly small and includes an assert.

Back to Bug 1811464 Comment 9