Your message dated Wed, 27 Feb 2019 23:02:58 +0100 with message-id <20190227220258.55guhe5nulsgt3ss@angband.pl> and subject line Re: Bug#923406: RFS: hoteldruid/2.3.2-1 has caused the Debian Bug report #923406, regarding RFS: hoteldruid/2.3.2-1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 923406: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923406 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: RFS: hoteldruid/2.3.2-1
- From: "Marco M. F. De Santis" <marco@digitaldruid.net>
- Date: Wed, 27 Feb 2019 19:21:28 +0100
- Message-id: <[🔎] b6e9b3fc-7b0c-de43-53ff-110b415923aa@digitaldruid.net>
Package: sponsorship-requests Severity: normal Dear mentors, I am looking for a sponsor for my package "hoteldruid" * Package name : hoteldruid Version : 2.3.2-1 Upstream Author : Marco M. F. De Santis * URL : http://www.hoteldruid.com * License : AGPLv3 Section : web It builds those binary packages: hoteldruid - web-based property management system for hotels or B&BsTo access further information about this package, please visit the following URL:https://mentors.debian.net/package/hoteldruid Alternatively, one can download the package with dget using this command:dget -x https://mentors.debian.net/debian/pool/main/h/hoteldruid/hoteldruid_2.3.2-1.dscMore information about hoteldruid can be obtained from http://www.hoteldruid.com.Changes since the last upload: * New upstream release - Fixes multiple sql injection and XSS vulnerabilities. (Ref: CVE-2019-9084, CVE-2019-9085, CVE-2019-9086, CVE-2019-9087) * Removed patch fix-gestione-utenti (integrated in upstream). Regards, Marco M. F. De Santis
--- End Message ---
--- Begin Message ---
- To: 923406-done@bugs.debian.org
- Subject: Re: Bug#923406: RFS: hoteldruid/2.3.2-1
- From: Adam Borowski <kilobyte@angband.pl>
- Date: Wed, 27 Feb 2019 23:02:58 +0100
- Message-id: <20190227220258.55guhe5nulsgt3ss@angband.pl>
- In-reply-to: <[🔎] b6e9b3fc-7b0c-de43-53ff-110b415923aa@digitaldruid.net>
- References: <[🔎] b6e9b3fc-7b0c-de43-53ff-110b415923aa@digitaldruid.net>
> * Package name : hoteldruid > Version : 2.3.2-1 > Changes since the last upload: > > * New upstream release > - Fixes multiple sql injection and XSS vulnerabilities. > (Ref: CVE-2019-9084, CVE-2019-9085, CVE-2019-9086, CVE-2019-9087) > * Removed patch fix-gestione-utenti (integrated in upstream). ✓ -- ⢀⣴⠾⠻⢶⣦⠀ ⣾⠁⢠⠒⠀⣿⡁ ⢿⡄⠘⠷⠚⠋⠀ Have you accepted Khorne as your lord and saviour? ⠈⠳⣄⠀⠀⠀⠀
--- End Message ---