Your message dated Wed, 27 Feb 2019 23:02:58 +0100
with message-id <[email protected]>
and subject line Re: Bug#923406: RFS: hoteldruid/2.3.2-1
has caused the Debian Bug report #923406,
regarding RFS: hoteldruid/2.3.2-1
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
923406: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923406
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: normal
Dear mentors,
I am looking for a sponsor for my package "hoteldruid"
* Package name : hoteldruid
Version : 2.3.2-1
Upstream Author : Marco M. F. De Santis
* URL : http://www.hoteldruid.com
* License : AGPLv3
Section : web
It builds those binary packages:
hoteldruid - web-based property management system for hotels or B&Bs
To access further information about this package, please visit the
following URL:
https://mentors.debian.net/package/hoteldruid
Alternatively, one can download the package with dget using this command:
dget -x
https://mentors.debian.net/debian/pool/main/h/hoteldruid/hoteldruid_2.3.2-1.dsc
More information about hoteldruid can be obtained from
http://www.hoteldruid.com.
Changes since the last upload:
* New upstream release
- Fixes multiple sql injection and XSS vulnerabilities.
(Ref: CVE-2019-9084, CVE-2019-9085, CVE-2019-9086, CVE-2019-9087)
* Removed patch fix-gestione-utenti (integrated in upstream).
Regards,
Marco M. F. De Santis
--- End Message ---
--- Begin Message ---
> * Package name : hoteldruid
> Version : 2.3.2-1
> Changes since the last upload:
>
> * New upstream release
> - Fixes multiple sql injection and XSS vulnerabilities.
> (Ref: CVE-2019-9084, CVE-2019-9085, CVE-2019-9086, CVE-2019-9087)
> * Removed patch fix-gestione-utenti (integrated in upstream).
✓
--
⢀⣴⠾⠻⢶⣦⠀
⣾⠁⢠⠒⠀⣿⡁
⢿⡄⠘⠷⠚⠋⠀ Have you accepted Khorne as your lord and saviour?
⠈⠳⣄⠀⠀⠀⠀
--- End Message ---