Hello dear maintainer(s), The Debian LTS team would like to fix the security issues which are currently open in the Wheezy version of w3m: https://security-tracker.debian.org/tracker/CVE-2016-9621 https://security-tracker.debian.org/tracker/CVE-2016-9625 https://security-tracker.debian.org/tracker/CVE-2016-9626 https://security-tracker.debian.org/tracker/CVE-2016-9627 https://security-tracker.debian.org/tracker/CVE-2016-9630 https://security-tracker.debian.org/tracker/CVE-2016-9632 https://security-tracker.debian.org/tracker/CVE-2016-9633
Would you like to take care of this yourself? If yes, please follow the workflow we have defined here: https://wiki.debian.org/LTS/Development If that workflow is a burden to you, feel free to just prepare an updated source package and send it to [email protected] (via a debdiff, or with an URL pointing to the source package, or even with a pointer to your packaging repository), and the members of the LTS team will take care of the rest. Indicate clearly whether you have tested the updated package or not. If you don't want to take care of this update, it's not a problem, we will do our best with your package. Just let us know whether you would like to review and/or test the updated package before it gets released. You can also opt-out from receiving future similar emails in your answer and then the LTS Team will take care of w3m updates for the LTS releases. (In case we don't get any answer for months, we may also take it as an opt-out, too.) The following were also analyzed but concluded as not improtant enough for a security update. You are however welcome to work on fixing them also in wheezy-security. CVE-2016-9622 CVE-2016-9623 CVE-2016-9624 CVE-2016-9628 CVE-2016-9629 CVE-2016-9631 Thank you very much. Ola Lundqvist, on behalf of the Debian LTS team. PS: A member of the LTS team might start working on this update at any point in time. You can verify whether someone is registered on this update in this file: https://anonscm.debian.org/viewvc/secure-testing/data/dla-needed.txt?view=markup
