Your message dated Thu, 11 Nov 2021 23:22:42 +0100 with message-id <4f8c76d3-749e-8246-634a-56cb773754c5@debian.org> and subject line Re: Bug#998460: RFS: hoteldruid/3.0.3-1 -- web-based property management system for hotels or B&Bs has caused the Debian Bug report #998460, regarding RFS: hoteldruid/3.0.3-1 -- web-based property management system for hotels or B&Bs to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 998460: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998460 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: RFS: hoteldruid/3.0.3-1 -- web-based property management system for hotels or B&Bs
- From: "Marco M. F. De Santis" <marco@digitaldruid.net>
- Date: Thu, 4 Nov 2021 16:29:18 +0100
- Message-id: <[🔎] 7f770a8d-78ea-971b-1533-f1bf1c400f28@digitaldruid.net>
Package: sponsorship-requests Severity: normal Dear mentors, I am looking for a sponsor for my package "hoteldruid": * Package name : hoteldruid Version : 3.0.3-1 Upstream Author : Marco M. F. De Santis * URL : http://www.hoteldruid.com/ * License : AGPL-3 * Vcs : None Section : web It builds those binary packages: hoteldruid - web-based property management system for hotels or B&BsTo access further information about this package, please visit the following URL:https://mentors.debian.net/package/hoteldruid/ Alternatively, one can download the package with dget using this command:dget -x https://mentors.debian.net/debian/pool/main/h/hoteldruid/hoteldruid_3.0.3-1.dscChanges since the last upload: hoteldruid (3.0.3-1) unstable; urgency=low . * New upstream release - Fixes multiple sql injection and XSS vulnerabilities. (Ref: CVE-2021-32832, CVE-2021-38733, CVE-2021-38559) (Closes: #991910) * debian/control: updated Standards-Version * debian/watch: updated debian watch file standard * Added lintian override for index.html that is not documentation * Updated appdata file with categories and content_rating * debian/postinst: replaced tempfile with mktemp (Closes: #992458) * Added autopkg tests: install-sqlite and lint * debian/config: don't set administrator-username as blank when called twice Regards, -- Marco M. F. De Santis
--- End Message ---
--- Begin Message ---
- To: 998460-done@bugs.debian.org
- Subject: Re: Bug#998460: RFS: hoteldruid/3.0.3-1 -- web-based property management system for hotels or B&Bs
- From: Bastian Germann <bage@debian.org>
- Date: Thu, 11 Nov 2021 23:22:42 +0100
- Message-id: <4f8c76d3-749e-8246-634a-56cb773754c5@debian.org>
- In-reply-to: <[🔎] 7fb10d13-ecdc-e625-96ab-a1a3280fc51e@digitaldruid.net>
- References: <[🔎] 7f770a8d-78ea-971b-1533-f1bf1c400f28@digitaldruid.net> <YYQ/JpRS5i4o+M8f@angband.pl> <[🔎] 7fb10d13-ecdc-e625-96ab-a1a3280fc51e@digitaldruid.net> <[🔎] 7fb10d13-ecdc-e625-96ab-a1a3280fc51e@digitaldruid.net>
On Thu, 11 Nov 2021 22:27:11 +0100 "Marco M. F. De Santis" <marco@digitaldruid.net> wrote:The apache configuration is not reloaded after hoteldruid configuration because invoke-rc.d fails. I have no idea why it fails, but I think invoke-rc is still the preferred way to start/stop/reload services in package scripts.Uploaded for now because of the CVEs. I corrected their IDs in the changelog. Even upstream package has the wrong CVEs mentioned in the changelog. We'll see if the autopkgtest passes...
--- End Message ---