control: severity -1 important

> Please verify which of them (if any) actually apply to Debian's version
> of webkit. All of the appear to apply to some kind of memory corruption
> or access restriction bypass which makes them good candidates. If they
> turn out not to pose a risk for the user, please downgrade this bug.

As stated in the release notes, the src:webkit package will not get
any security support during the wheezy release unfortunately.  This is
due to lack of any stable upstream security releases.

Best wishes,
Mike


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to