### Beta/Release Uplift Approval Request * **User impact if declined**: invalid pointer dereferences, possibly exploitable although there are no known exploits. * **Is this code covered by automated tests?**: Yes * **Has the fix been verified in Nightly?**: Yes * **Needs manual test from QE?**: No * **If yes, steps to reproduce**: Existing crashtests should now crash in debug as there's a new MOZ_ASSERT in the patch. * **List of other uplifts needed**: None * **Risk to taking this patch**: Low * **Why is the change risky/not risky? (and alternatives if risky)**: Patch is fairly small and includes an assert. * **String changes made/needed**: none * **Is Android affected?**: Unknown ### ESR Uplift Approval Request * **If this is not a sec:{high,crit} bug, please state case for ESR consideration**: It's set:high currently. * **User impact if declined**: invalid pointer dereferences, possibly exploitable although there are no known exploits. * **Fix Landed on Version**: 111 * **Risk to taking this patch**: Low * **Why is the change risky/not risky? (and alternatives if risky)**: Patch is fairly small and includes an assert.
Bug 1811464 Comment 9 Edit History
Note: The actual edited comment in the bug view page will always show the original commenter’s name and original timestamp.
### Beta/Release Uplift Approval Request * **User impact if declined**: invalid pointer dereferences, possibly exploitable although there are no known exploits. * **Is this code covered by automated tests?**: Yes * **Has the fix been verified in Nightly?**: Yes * **Needs manual test from QE?**: No * **If yes, steps to reproduce**: Existing crashtests should now crash in debug as there's a new MOZ_ASSERT in the patch. * **List of other uplifts needed**: None * **Risk to taking this patch**: Low * **Why is the change risky/not risky? (and alternatives if risky)**: Patch is fairly small and includes an assert. * **String changes made/needed**: none * **Is Android affected?**: Unknown ### ESR Uplift Approval Request * **If this is not a sec:{high,crit} bug, please state case for ESR consideration**: It's sec:high currently. * **User impact if declined**: invalid pointer dereferences, possibly exploitable although there are no known exploits. * **Fix Landed on Version**: 111 * **Risk to taking this patch**: Low * **Why is the change risky/not risky? (and alternatives if risky)**: Patch is fairly small and includes an assert.