RE : New Lahes : 5D MInk lashes ,Different stypes are available , your local competitor sell well😍

2019-04-17 Thread AmandaVirginhairvendor
96
LOOSE CULRY ,BODY WAVE ,STRAIGHT ,CURLY ,LOOSE WAVE
WHICH YOUR END CLIENTS WANT MOSTLY
 Available ON Stock
Color wig ,cusomized wig only need 3 wokirng days
Wana know which the end clients like or any further questions just feel free to 
contact me .

m:
+8615018763458

w:
[1] www.virginhairvendor.com  e: [2] ama...@virginhairvendor.com

Fineme on Whatsapp:+86 150 1876 3458
[3] VIEW ALL

ALL is 100% virgin human hair WIG

[4] 在网页中查看邮件

因为您与Virginhairvendor的合作关系,所以收到这封电子邮件。请[5] 确认您同意继续接收经由我们所发送的电子邮件。 
如果您不愿意继续接收到任何相关讯息,您可以[6] 在此取消订阅。
此讯息由 ama...@virginhairvendor.com发送给 ama...@virginhairvendor.com
Address: Unit1502,C/Block, Buynow Building,596Tianhe Rd., Tianhe District, 
Guangzhou, China, guangzhou, guangdong  51, China

取消订阅| 管理订阅| 邮件转寄| 回报为垃圾邮件


 References:

1. http://virginhairvendor.benchurl.com/c/l?u=829EB9E&e=D5A030&c=E1B82&t=0&seq=1
2. mailto:ama...@virginhairvendor.com
3. http://virginhairvendor.benchurl.com/c/l?u=829EB04&e=D5A030&c=E1B82&t=0&seq=1
4. http://virginhairvendor.benchurl.com/c/v?e=D5A030&c=E1B82&t=0
5. http://virginhairvendor.benchurl.com/c/opt?e=D5A030&c=E1B82&t=0
6. http://virginhairvendor.benchurl.com/c/su?e=D5A030&c=E1B82&t=0

此讯息由 ama...@virginhairvendor.com 发送给 packa...@qa.debian.org

藉由下列连结,您可以修改或更新您的订阅资讯。

 
http://virginhairvendor.benchurl.com/c/su?e=E311E7&c=E1B82&l=11CBFFBD&email=zHZfZ7k8JhbPHnpcB9BHuwo7Eqk8yGgh&relid=A0B1BF2


管理订阅
http://virginhairvendor.benchurl.com/c/s?e=E311E7&c=E1B82&l=11CBFFBD&email=zHZfZ7k8JhbPHnpcB9BHuwo7Eqk8yGgh&relid=A0B1BF2


邮件转寄
http://virginhairvendor.benchurl.com/c/f?e=E311E7&c=E1B82&l=11CBFFBD&email=zHZfZ7k8JhbPHnpcB9BHuwo7Eqk8yGgh&relid=A0B1BF2


回报为垃圾邮件
http://virginhairvendor.benchurl.com/Abuse?e=E311E7&c=E1B82&l=11CBFFBD&email=zHZfZ7k8JhbPHnpcB9BHuwo7Eqk8yGgh&relid=A0B1BF2


Address: Unit1502,C/Block, Buynow Building,596Tianhe Rd., Tianhe District, 
Guangzhou, China, guangzhou, guangdong  51, China

   : 

http://virginhairvendor.benchurl.com/c/v?e=E311E7&c=E1B82&l=11CBFFBD&email=zHZfZ7k8JhbPHnpcB9BHuwo7Eqk8yGgh&relid=A0B1BF2


因为您与Virginhairvendor的合作关系,所以收到这封电子邮件。请确认您同意继续接收经由我们所发送的电子邮件。  
如果您不愿意继续接收到任何相关讯息,您可以在此取消订阅或回报为垃圾邮件。

http://virginhairvendor.benchurl.com/c/opt?e=E311E7&c=E1B82&l=11CBFFBD&email=zHZfZ7k8JhbPHnpcB9BHuwo7Eqk8yGgh&relid=A0B1BF2


http://virginhairvendor.benchurl.com/c/su?e=E311E7&c=E1B82&l=11CBFFBD&email=zHZfZ7k8JhbPHnpcB9BHuwo7Eqk8yGgh&relid=A0B1BF2


Processing of jtb_1.4.12-2_source.changes

2019-04-17 Thread Debian FTP Masters
jtb_1.4.12-2_source.changes uploaded successfully to localhost
along with the files:
  jtb_1.4.12-2.dsc
  jtb_1.4.12-2.debian.tar.xz
  jtb_1.4.12-2_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Processing of lighttpd_1.4.53-4_source.changes

2019-04-17 Thread Debian FTP Masters
lighttpd_1.4.53-4_source.changes uploaded successfully to localhost
along with the files:
  lighttpd_1.4.53-4.dsc
  lighttpd_1.4.53-4.debian.tar.xz
  lighttpd_1.4.53-4_amd64.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#926885: marked as done (lighttpd: CVE-2019-11072)

2019-04-17 Thread Debian Bug Tracking System
Your message dated Wed, 17 Apr 2019 14:33:59 +
with message-id 
and subject line Bug#926885: fixed in lighttpd 1.4.53-4
has caused the Debian Bug report #926885,
regarding lighttpd: CVE-2019-11072
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
926885: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926885
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: lighttpd
Version: 1.4.53-3
Severity: grave
Tags: security upstream
Forwarded: https://redmine.lighttpd.net/issues/2945

Hi,

The following vulnerability was published for lighttpd.

CVE-2019-11072[0]:
| lighttpd before 1.4.54 has a signed integer overflow, which might
| allow remote attackers to cause a denial of service (application
| crash) or possibly have unspecified other impact via a malicious HTTP
| GET request, as demonstrated by mishandling of /%2F? in
| burl_normalize_2F_to_slash_fix in burl.c.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-11072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11072
[1] https://redmine.lighttpd.net/issues/2945
[2] 
https://github.com/lighttpd/lighttpd1.4/commit/32120d5b8b3203fc21ccb9eafb0eaf824bb59354

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: lighttpd
Source-Version: 1.4.53-4

We believe that the bug you reported is fixed in the latest version of
lighttpd, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 926...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Glenn Strauss  (supplier of updated lighttpd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 13 Apr 2019 00:00:00 -0400
Source: lighttpd
Architecture: source
Version: 1.4.53-4
Distribution: unstable
Urgency: high
Maintainer: Debian QA Group 
Changed-By: Glenn Strauss 
Closes: 926885
Changes:
 lighttpd (1.4.53-4) unstable; urgency=high
 .
   * QA upload.
   * fix mixed use of srv->split_vals array (regression)
   * mod_magnet:fix invalid script return-type crash
   * fix assertion with server.error-handler
   * mod_wstunnel:fix wstunnel.ping-interval for big-endian architectures
   * fix abort in server.http-parseopts with url-path-2f-decode enabled
 CVE-2019-11072 (closes: #926885)
Checksums-Sha1:
 b609f87fcac5281e0dea93b72ba74b9db2fe0a24 3879 lighttpd_1.4.53-4.dsc
 b79ba0fa89ad031f0fe979a2bd6d0667390459b7 44060 lighttpd_1.4.53-4.debian.tar.xz
 5b34212f522882d440645fc8636cd8d68265e282 16638 
lighttpd_1.4.53-4_amd64.buildinfo
Checksums-Sha256:
 d496e9a6879a70451402d8a19f0396e781dc00fc902c9bf0b567c6c8b6b63257 3879 
lighttpd_1.4.53-4.dsc
 b11b1ff4831671cc67da207009d5cb9dac71fea5b17ac10144a980cb5903dcc4 44060 
lighttpd_1.4.53-4.debian.tar.xz
 c70fdd421bf1240ca925390e01c9cd14a4c121dfab3d4c6a215175fabdcb1eb0 16638 
lighttpd_1.4.53-4_amd64.buildinfo
Files:
 f0d901e9c6b3d9ab91179b4d54567aa4 3879 httpd optional lighttpd_1.4.53-4.dsc
 f0b909359a42999d57044af80513cc39 44060 httpd optional 
lighttpd_1.4.53-4.debian.tar.xz
 ebed16c45ec61b788fb19f1696944831 16638 httpd optional 
lighttpd_1.4.53-4_amd64.buildinfo

-BEGIN PGP SIGNATURE-
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=ZGri
-END PGP SIGNATURE End Message ---


lighttpd_1.4.53-4_source.changes ACCEPTED into unstable

2019-04-17 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 13 Apr 2019 00:00:00 -0400
Source: lighttpd
Architecture: source
Version: 1.4.53-4
Distribution: unstable
Urgency: high
Maintainer: Debian QA Group 
Changed-By: Glenn Strauss 
Closes: 926885
Changes:
 lighttpd (1.4.53-4) unstable; urgency=high
 .
   * QA upload.
   * fix mixed use of srv->split_vals array (regression)
   * mod_magnet:fix invalid script return-type crash
   * fix assertion with server.error-handler
   * mod_wstunnel:fix wstunnel.ping-interval for big-endian architectures
   * fix abort in server.http-parseopts with url-path-2f-decode enabled
 CVE-2019-11072 (closes: #926885)
Checksums-Sha1:
 b609f87fcac5281e0dea93b72ba74b9db2fe0a24 3879 lighttpd_1.4.53-4.dsc
 b79ba0fa89ad031f0fe979a2bd6d0667390459b7 44060 lighttpd_1.4.53-4.debian.tar.xz
 5b34212f522882d440645fc8636cd8d68265e282 16638 
lighttpd_1.4.53-4_amd64.buildinfo
Checksums-Sha256:
 d496e9a6879a70451402d8a19f0396e781dc00fc902c9bf0b567c6c8b6b63257 3879 
lighttpd_1.4.53-4.dsc
 b11b1ff4831671cc67da207009d5cb9dac71fea5b17ac10144a980cb5903dcc4 44060 
lighttpd_1.4.53-4.debian.tar.xz
 c70fdd421bf1240ca925390e01c9cd14a4c121dfab3d4c6a215175fabdcb1eb0 16638 
lighttpd_1.4.53-4_amd64.buildinfo
Files:
 f0d901e9c6b3d9ab91179b4d54567aa4 3879 httpd optional lighttpd_1.4.53-4.dsc
 f0b909359a42999d57044af80513cc39 44060 httpd optional 
lighttpd_1.4.53-4.debian.tar.xz
 ebed16c45ec61b788fb19f1696944831 16638 httpd optional 
lighttpd_1.4.53-4_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEETMLS2QqNFlTb+HOqLRqqzyREREIFAly3KT8ACgkQLRqqzyRE
REKqlQ//URCooawWK1Z5e1/RRYLF8DBPyahxrI2DEJG83Xp9ikdVy1+0KAGfdTOC
yOJY9trdRuek7liGr4mKu+fIeF4Mj12eoz9QV6678A4VuegdgRiPWGbWN6Nc3xlV
jP2Z9j+RVBXU59v3SdAYTDeUBindqk7P5qGl8YtLS0Asub4cGVX1MmmI2sv/Lk/A
ihdQvXFeaN8VnbF/0Um5cnzEL3gh+Z/oEo6YnGxn6FVUG/ZJ6vFAvUwkLOuIIvkO
Qh4JeJ5c0ujJHYa6b7zQIRobQBsUVWh3K6AZ6plVqE10YdSt+3yG2/Cgmc5YfqdC
MVmzkGe6UdNKHua09YEFkSbmIynfHIVwUJytylv0pryl4TTKv1ZKnJeO5a9Mw9Vq
UuffUZEwLwtwnevYyu8ycp7IVip7lor04JmQFUa6vqpW2MdS9OEEeRtRDWjWlGdM
yAhMKHvz2PAMUROnpztgLHDvtSHv8WYsCuo5dk92FCq9amgG3gwtvsxvhPGge9k3
owIhbeblxtopj8geyQtk0G714+Olrpq77ZjlszE1HHATH2hMIziXPy6haieJxZ3Q
uJnpmRW1AX4ovWM4g2jxo0K0wyyflMG4YMX0jken0XTiA+pkF+QQQPlEAm+i32nf
Pt5cQxrt/m5+ncC8iZ/beTPdNPYQWXM3/Yt1zDP77pY9GuUaWZk=
=ZGri
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



jtb_1.4.12-2_source.changes ACCEPTED into unstable

2019-04-17 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 17 Apr 2019 13:43:38 +
Source: jtb
Architecture: source
Version: 1.4.12-2
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Niels Thykier 
Closes: 927243
Changes:
 jtb (1.4.12-2) unstable; urgency=medium
 .
   * QA upload.
   * Set maintainer to Debian QA to match #922601.
   * Remove obsolete javabuild file and call to jh_build.  The
 real jar file has been generated by upstream's build system
 since stretch.  (Closes: #927243)
   * Set Rules-Requires-Root to "no" as the package does not need
 (fake)root.
   * Update code for cleaning the package to ensure the package
 can be built twice in a row without failures.
Checksums-Sha1:
 3e45e6010bdee038a1906d36751f0607b9e6fbf4 1911 jtb_1.4.12-2.dsc
 28dd6410495b77c25223c3321d745c5356a20a47 5696 jtb_1.4.12-2.debian.tar.xz
 e78d4642bbf944e64c11fa1fdc6ab0a34f3ea72a 7712 jtb_1.4.12-2_source.buildinfo
Checksums-Sha256:
 4dd442f02b74b28ab99f930958c906daf5ca1ea903dc2e7499cfea1dfbe6f614 1911 
jtb_1.4.12-2.dsc
 a200cfa37f1e1c2f2d86342f867254e08e00ca616106d2a522f650e374e8cc82 5696 
jtb_1.4.12-2.debian.tar.xz
 934f20cc0f8be469a7016cf2e41d6df5930ab5a5cf2e80275fbae7f7b5086641 7712 
jtb_1.4.12-2_source.buildinfo
Files:
 abe04ea9326d38b224b4b8d13eab1219 1911 devel optional jtb_1.4.12-2.dsc
 09b43e77b8ea8405b67ca8f9c736cc63 5696 devel optional jtb_1.4.12-2.debian.tar.xz
 3093a7371a4fff2657f01c939e125936 7712 devel optional 
jtb_1.4.12-2_source.buildinfo

-BEGIN PGP SIGNATURE-
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=I/LI
-END PGP SIGNATURE-


Thank you for your contribution to Debian.