control: severity -1 important > Please verify which of them (if any) actually apply to Debian's version > of webkit. All of the appear to apply to some kind of memory corruption > or access restriction bypass which makes them good candidates. If they > turn out not to pose a risk for the user, please downgrade this bug.
As stated in the release notes, the src:webkit package will not get any security support during the wheezy release unfortunately. This is due to lack of any stable upstream security releases. Best wishes, Mike -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org