### Beta/Release Uplift Approval Request
* **User impact if declined**: Users exposed to risk of local privilege escalation attack - not currently known to exist in the wild.
* **Is this code covered by automated tests?**: Yes
* **Has the fix been verified in Nightly?**: Yes
* **Needs manual test from QE?**: Yes
* **If yes, steps to reproduce**:
* **List of other uplifts needed**: None
* **Risk to taking this patch**: Medium
* **Why is the change risky/not risky? (and alternatives if risky)**: The code has been tested to run and is well understood. We should have this stress tested by QA to remove any doubt given the code relates to updates.
* **String changes made/needed**: none
* **Is Android affected?**: No
### ESR Uplift Approval Request
* **If this is not a sec:{high,crit} bug, please state case for ESR consideration**: This is sec-high.
* **User impact if declined**: Users exposed to risk of local privilege escalation attack - not currently known to exist in the wild.
* **Fix Landed on Version**: 133 (anticipated)
* **Risk to taking this patch**: Low
* **Why is the change risky/not risky? (and alternatives if risky)**: The code has been tested to run and is well understood. We should have this stress tested by QA to remove any doubt given the code relates to updates.
Bug 1917536 Comment 26 Edit History
Note: The actual edited comment in the bug view page will always show the original commenter’s name and original timestamp.
### Beta/Release Uplift Approval Request
* **User impact if declined**: Users exposed to risk of local privilege escalation attack - not currently known to exist in the wild.
* **Is this code covered by automated tests?**: Yes
* **Has the fix been verified in Nightly?**: Yes
* **Needs manual test from QE?**: Yes
* **If yes, steps to reproduce**: 1. Install Firefox with patch and Maintenance Service enabled. Allow Firefox to update. Verify update applies without UAC prompt.
2. Install Firefox with patch and Maintenance Service disabled. Allow Firefox to update. Verify update applies with UAC prompt.
* **List of other uplifts needed**: None
* **Risk to taking this patch**: Medium
* **Why is the change risky/not risky? (and alternatives if risky)**: The code has been tested to run and is well understood. We should have this stress tested by QA to remove any doubt given the code relates to updates.
* **String changes made/needed**: none
* **Is Android affected?**: No
### ESR Uplift Approval Request
* **If this is not a sec:{high,crit} bug, please state case for ESR consideration**: This is sec-high.
* **User impact if declined**: Users exposed to risk of local privilege escalation attack - not currently known to exist in the wild.
* **Fix Landed on Version**: 133 (anticipated)
* **Risk to taking this patch**: Low
* **Why is the change risky/not risky? (and alternatives if risky)**: The code has been tested to run and is well understood. We should have this stress tested by QA to remove any doubt given the code relates to updates.
### Beta/Release Uplift Approval Request
* **User impact if declined**: Users exposed to risk of local privilege escalation attack - not currently known to exist in the wild.
* **Is this code covered by automated tests?**: Yes
* **Has the fix been verified in Nightly?**: Yes
* **Needs manual test from QE?**: Yes
* **If yes, steps to reproduce**:
1. Install Firefox with patch and Maintenance Service enabled. Allow Firefox to update. Verify update applies without UAC prompt.
2. Install Firefox with patch and Maintenance Service disabled. Allow Firefox to update. Verify update applies with UAC prompt.
* **List of other uplifts needed**: None
* **Risk to taking this patch**: Medium
* **Why is the change risky/not risky? (and alternatives if risky)**: The code has been tested to run and is well understood. We should have this stress tested by QA to remove any doubt given the code relates to updates.
* **String changes made/needed**: none
* **Is Android affected?**: No
### ESR Uplift Approval Request
* **If this is not a sec:{high,crit} bug, please state case for ESR consideration**: This is sec-high.
* **User impact if declined**: Users exposed to risk of local privilege escalation attack - not currently known to exist in the wild.
* **Fix Landed on Version**: 133 (anticipated)
* **Risk to taking this patch**: Low
* **Why is the change risky/not risky? (and alternatives if risky)**: The code has been tested to run and is well understood. We should have this stress tested by QA to remove any doubt given the code relates to updates.
### Beta/Release Uplift Approval Request
* **User impact if declined**: Users exposed to risk of local privilege escalation attack - not currently known to exist in the wild.
* **Is this code covered by automated tests?**: Yes
* **Has the fix been verified in Nightly?**: Yes
* **Needs manual test from QE?**: Yes
* **If yes, steps to reproduce**:
1. Install Firefox with patch and Maintenance Service enabled. Allow Firefox to update. Verify update applies without UAC prompt.
2. Install Firefox with patch and Maintenance Service disabled. Allow Firefox to update. Verify update applies with UAC prompt.
* **List of other uplifts needed**: None
* **Risk to taking this patch**: Low
* **Why is the change risky/not risky? (and alternatives if risky)**: The code has been tested to run and is well understood. We should have this stress tested by QA to remove any doubt given the code relates to updates.
* **String changes made/needed**: none
* **Is Android affected?**: No
### ESR Uplift Approval Request
* **If this is not a sec:{high,crit} bug, please state case for ESR consideration**: This is sec-high.
* **User impact if declined**: Users exposed to risk of local privilege escalation attack - not currently known to exist in the wild.
* **Fix Landed on Version**: 133 (anticipated)
* **Risk to taking this patch**: Low
* **Why is the change risky/not risky? (and alternatives if risky)**: The code has been tested to run and is well understood. We should have this stress tested by QA to remove any doubt given the code relates to updates.