RE : New Lahes : 5D MInk lashes ,Different stypes are available , your local competitor sell well😍
96 LOOSE CULRY ,BODY WAVE ,STRAIGHT ,CURLY ,LOOSE WAVE WHICH YOUR END CLIENTS WANT MOSTLY Available ON Stock Color wig ,cusomized wig only need 3 wokirng days Wana know which the end clients like or any further questions just feel free to contact me . m: +8615018763458 w: [1] www.virginhairvendor.com e: [2] ama...@virginhairvendor.com Fineme on Whatsapp:+86 150 1876 3458 [3] VIEW ALL ALL is 100% virgin human hair WIG [4] 在网页中查看邮件 因为您与Virginhairvendor的合作关系,所以收到这封电子邮件。请[5] 确认您同意继续接收经由我们所发送的电子邮件。 如果您不愿意继续接收到任何相关讯息,您可以[6] 在此取消订阅。 此讯息由 ama...@virginhairvendor.com发送给 ama...@virginhairvendor.com Address: Unit1502,C/Block, Buynow Building,596Tianhe Rd., Tianhe District, Guangzhou, China, guangzhou, guangdong 51, China 取消订阅| 管理订阅| 邮件转寄| 回报为垃圾邮件 References: 1. http://virginhairvendor.benchurl.com/c/l?u=829EB9E&e=D5A030&c=E1B82&t=0&seq=1 2. mailto:ama...@virginhairvendor.com 3. http://virginhairvendor.benchurl.com/c/l?u=829EB04&e=D5A030&c=E1B82&t=0&seq=1 4. http://virginhairvendor.benchurl.com/c/v?e=D5A030&c=E1B82&t=0 5. http://virginhairvendor.benchurl.com/c/opt?e=D5A030&c=E1B82&t=0 6. http://virginhairvendor.benchurl.com/c/su?e=D5A030&c=E1B82&t=0 此讯息由 ama...@virginhairvendor.com 发送给 packa...@qa.debian.org 藉由下列连结,您可以修改或更新您的订阅资讯。 http://virginhairvendor.benchurl.com/c/su?e=E311E7&c=E1B82&l=11CBFFBD&email=zHZfZ7k8JhbPHnpcB9BHuwo7Eqk8yGgh&relid=A0B1BF2 管理订阅 http://virginhairvendor.benchurl.com/c/s?e=E311E7&c=E1B82&l=11CBFFBD&email=zHZfZ7k8JhbPHnpcB9BHuwo7Eqk8yGgh&relid=A0B1BF2 邮件转寄 http://virginhairvendor.benchurl.com/c/f?e=E311E7&c=E1B82&l=11CBFFBD&email=zHZfZ7k8JhbPHnpcB9BHuwo7Eqk8yGgh&relid=A0B1BF2 回报为垃圾邮件 http://virginhairvendor.benchurl.com/Abuse?e=E311E7&c=E1B82&l=11CBFFBD&email=zHZfZ7k8JhbPHnpcB9BHuwo7Eqk8yGgh&relid=A0B1BF2 Address: Unit1502,C/Block, Buynow Building,596Tianhe Rd., Tianhe District, Guangzhou, China, guangzhou, guangdong 51, China : http://virginhairvendor.benchurl.com/c/v?e=E311E7&c=E1B82&l=11CBFFBD&email=zHZfZ7k8JhbPHnpcB9BHuwo7Eqk8yGgh&relid=A0B1BF2 因为您与Virginhairvendor的合作关系,所以收到这封电子邮件。请确认您同意继续接收经由我们所发送的电子邮件。 如果您不愿意继续接收到任何相关讯息,您可以在此取消订阅或回报为垃圾邮件。 http://virginhairvendor.benchurl.com/c/opt?e=E311E7&c=E1B82&l=11CBFFBD&email=zHZfZ7k8JhbPHnpcB9BHuwo7Eqk8yGgh&relid=A0B1BF2 http://virginhairvendor.benchurl.com/c/su?e=E311E7&c=E1B82&l=11CBFFBD&email=zHZfZ7k8JhbPHnpcB9BHuwo7Eqk8yGgh&relid=A0B1BF2
Processing of jtb_1.4.12-2_source.changes
jtb_1.4.12-2_source.changes uploaded successfully to localhost along with the files: jtb_1.4.12-2.dsc jtb_1.4.12-2.debian.tar.xz jtb_1.4.12-2_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
Processing of lighttpd_1.4.53-4_source.changes
lighttpd_1.4.53-4_source.changes uploaded successfully to localhost along with the files: lighttpd_1.4.53-4.dsc lighttpd_1.4.53-4.debian.tar.xz lighttpd_1.4.53-4_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
Bug#926885: marked as done (lighttpd: CVE-2019-11072)
Your message dated Wed, 17 Apr 2019 14:33:59 + with message-id and subject line Bug#926885: fixed in lighttpd 1.4.53-4 has caused the Debian Bug report #926885, regarding lighttpd: CVE-2019-11072 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 926885: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926885 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: lighttpd Version: 1.4.53-3 Severity: grave Tags: security upstream Forwarded: https://redmine.lighttpd.net/issues/2945 Hi, The following vulnerability was published for lighttpd. CVE-2019-11072[0]: | lighttpd before 1.4.54 has a signed integer overflow, which might | allow remote attackers to cause a denial of service (application | crash) or possibly have unspecified other impact via a malicious HTTP | GET request, as demonstrated by mishandling of /%2F? in | burl_normalize_2F_to_slash_fix in burl.c. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2019-11072 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11072 [1] https://redmine.lighttpd.net/issues/2945 [2] https://github.com/lighttpd/lighttpd1.4/commit/32120d5b8b3203fc21ccb9eafb0eaf824bb59354 Please adjust the affected versions in the BTS as needed. Regards, Salvatore --- End Message --- --- Begin Message --- Source: lighttpd Source-Version: 1.4.53-4 We believe that the bug you reported is fixed in the latest version of lighttpd, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 926...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Glenn Strauss (supplier of updated lighttpd package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 13 Apr 2019 00:00:00 -0400 Source: lighttpd Architecture: source Version: 1.4.53-4 Distribution: unstable Urgency: high Maintainer: Debian QA Group Changed-By: Glenn Strauss Closes: 926885 Changes: lighttpd (1.4.53-4) unstable; urgency=high . * QA upload. * fix mixed use of srv->split_vals array (regression) * mod_magnet:fix invalid script return-type crash * fix assertion with server.error-handler * mod_wstunnel:fix wstunnel.ping-interval for big-endian architectures * fix abort in server.http-parseopts with url-path-2f-decode enabled CVE-2019-11072 (closes: #926885) Checksums-Sha1: b609f87fcac5281e0dea93b72ba74b9db2fe0a24 3879 lighttpd_1.4.53-4.dsc b79ba0fa89ad031f0fe979a2bd6d0667390459b7 44060 lighttpd_1.4.53-4.debian.tar.xz 5b34212f522882d440645fc8636cd8d68265e282 16638 lighttpd_1.4.53-4_amd64.buildinfo Checksums-Sha256: d496e9a6879a70451402d8a19f0396e781dc00fc902c9bf0b567c6c8b6b63257 3879 lighttpd_1.4.53-4.dsc b11b1ff4831671cc67da207009d5cb9dac71fea5b17ac10144a980cb5903dcc4 44060 lighttpd_1.4.53-4.debian.tar.xz c70fdd421bf1240ca925390e01c9cd14a4c121dfab3d4c6a215175fabdcb1eb0 16638 lighttpd_1.4.53-4_amd64.buildinfo Files: f0d901e9c6b3d9ab91179b4d54567aa4 3879 httpd optional lighttpd_1.4.53-4.dsc f0b909359a42999d57044af80513cc39 44060 httpd optional lighttpd_1.4.53-4.debian.tar.xz ebed16c45ec61b788fb19f1696944831 16638 httpd optional lighttpd_1.4.53-4_amd64.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEETMLS2QqNFlTb+HOqLRqqzyREREIFAly3KT8ACgkQLRqqzyRE REKqlQ//URCooawWK1Z5e1/RRYLF8DBPyahxrI2DEJG83Xp9ikdVy1+0KAGfdTOC yOJY9trdRuek7liGr4mKu+fIeF4Mj12eoz9QV6678A4VuegdgRiPWGbWN6Nc3xlV jP2Z9j+RVBXU59v3SdAYTDeUBindqk7P5qGl8YtLS0Asub4cGVX1MmmI2sv/Lk/A ihdQvXFeaN8VnbF/0Um5cnzEL3gh+Z/oEo6YnGxn6FVUG/ZJ6vFAvUwkLOuIIvkO Qh4JeJ5c0ujJHYa6b7zQIRobQBsUVWh3K6AZ6plVqE10YdSt+3yG2/Cgmc5YfqdC MVmzkGe6UdNKHua09YEFkSbmIynfHIVwUJytylv0pryl4TTKv1ZKnJeO5a9Mw9Vq UuffUZEwLwtwnevYyu8ycp7IVip7lor04JmQFUa6vqpW2MdS9OEEeRtRDWjWlGdM yAhMKHvz2PAMUROnpztgLHDvtSHv8WYsCuo5dk92FCq9amgG3gwtvsxvhPGge9k3 owIhbeblxtopj8geyQtk0G714+Olrpq77ZjlszE1HHATH2hMIziXPy6haieJxZ3Q uJnpmRW1AX4ovWM4g2jxo0K0wyyflMG4YMX0jken0XTiA+pkF+QQQPlEAm+i32nf Pt5cQxrt/m5+ncC8iZ/beTPdNPYQWXM3/Yt1zDP77pY9GuUaWZk= =ZGri -END PGP SIGNATURE End Message ---
lighttpd_1.4.53-4_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 13 Apr 2019 00:00:00 -0400 Source: lighttpd Architecture: source Version: 1.4.53-4 Distribution: unstable Urgency: high Maintainer: Debian QA Group Changed-By: Glenn Strauss Closes: 926885 Changes: lighttpd (1.4.53-4) unstable; urgency=high . * QA upload. * fix mixed use of srv->split_vals array (regression) * mod_magnet:fix invalid script return-type crash * fix assertion with server.error-handler * mod_wstunnel:fix wstunnel.ping-interval for big-endian architectures * fix abort in server.http-parseopts with url-path-2f-decode enabled CVE-2019-11072 (closes: #926885) Checksums-Sha1: b609f87fcac5281e0dea93b72ba74b9db2fe0a24 3879 lighttpd_1.4.53-4.dsc b79ba0fa89ad031f0fe979a2bd6d0667390459b7 44060 lighttpd_1.4.53-4.debian.tar.xz 5b34212f522882d440645fc8636cd8d68265e282 16638 lighttpd_1.4.53-4_amd64.buildinfo Checksums-Sha256: d496e9a6879a70451402d8a19f0396e781dc00fc902c9bf0b567c6c8b6b63257 3879 lighttpd_1.4.53-4.dsc b11b1ff4831671cc67da207009d5cb9dac71fea5b17ac10144a980cb5903dcc4 44060 lighttpd_1.4.53-4.debian.tar.xz c70fdd421bf1240ca925390e01c9cd14a4c121dfab3d4c6a215175fabdcb1eb0 16638 lighttpd_1.4.53-4_amd64.buildinfo Files: f0d901e9c6b3d9ab91179b4d54567aa4 3879 httpd optional lighttpd_1.4.53-4.dsc f0b909359a42999d57044af80513cc39 44060 httpd optional lighttpd_1.4.53-4.debian.tar.xz ebed16c45ec61b788fb19f1696944831 16638 httpd optional lighttpd_1.4.53-4_amd64.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEETMLS2QqNFlTb+HOqLRqqzyREREIFAly3KT8ACgkQLRqqzyRE REKqlQ//URCooawWK1Z5e1/RRYLF8DBPyahxrI2DEJG83Xp9ikdVy1+0KAGfdTOC yOJY9trdRuek7liGr4mKu+fIeF4Mj12eoz9QV6678A4VuegdgRiPWGbWN6Nc3xlV jP2Z9j+RVBXU59v3SdAYTDeUBindqk7P5qGl8YtLS0Asub4cGVX1MmmI2sv/Lk/A ihdQvXFeaN8VnbF/0Um5cnzEL3gh+Z/oEo6YnGxn6FVUG/ZJ6vFAvUwkLOuIIvkO Qh4JeJ5c0ujJHYa6b7zQIRobQBsUVWh3K6AZ6plVqE10YdSt+3yG2/Cgmc5YfqdC MVmzkGe6UdNKHua09YEFkSbmIynfHIVwUJytylv0pryl4TTKv1ZKnJeO5a9Mw9Vq UuffUZEwLwtwnevYyu8ycp7IVip7lor04JmQFUa6vqpW2MdS9OEEeRtRDWjWlGdM yAhMKHvz2PAMUROnpztgLHDvtSHv8WYsCuo5dk92FCq9amgG3gwtvsxvhPGge9k3 owIhbeblxtopj8geyQtk0G714+Olrpq77ZjlszE1HHATH2hMIziXPy6haieJxZ3Q uJnpmRW1AX4ovWM4g2jxo0K0wyyflMG4YMX0jken0XTiA+pkF+QQQPlEAm+i32nf Pt5cQxrt/m5+ncC8iZ/beTPdNPYQWXM3/Yt1zDP77pY9GuUaWZk= =ZGri -END PGP SIGNATURE- Thank you for your contribution to Debian.
jtb_1.4.12-2_source.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 17 Apr 2019 13:43:38 + Source: jtb Architecture: source Version: 1.4.12-2 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By: Niels Thykier Closes: 927243 Changes: jtb (1.4.12-2) unstable; urgency=medium . * QA upload. * Set maintainer to Debian QA to match #922601. * Remove obsolete javabuild file and call to jh_build. The real jar file has been generated by upstream's build system since stretch. (Closes: #927243) * Set Rules-Requires-Root to "no" as the package does not need (fake)root. * Update code for cleaning the package to ensure the package can be built twice in a row without failures. Checksums-Sha1: 3e45e6010bdee038a1906d36751f0607b9e6fbf4 1911 jtb_1.4.12-2.dsc 28dd6410495b77c25223c3321d745c5356a20a47 5696 jtb_1.4.12-2.debian.tar.xz e78d4642bbf944e64c11fa1fdc6ab0a34f3ea72a 7712 jtb_1.4.12-2_source.buildinfo Checksums-Sha256: 4dd442f02b74b28ab99f930958c906daf5ca1ea903dc2e7499cfea1dfbe6f614 1911 jtb_1.4.12-2.dsc a200cfa37f1e1c2f2d86342f867254e08e00ca616106d2a522f650e374e8cc82 5696 jtb_1.4.12-2.debian.tar.xz 934f20cc0f8be469a7016cf2e41d6df5930ab5a5cf2e80275fbae7f7b5086641 7712 jtb_1.4.12-2_source.buildinfo Files: abe04ea9326d38b224b4b8d13eab1219 1911 devel optional jtb_1.4.12-2.dsc 09b43e77b8ea8405b67ca8f9c736cc63 5696 devel optional jtb_1.4.12-2.debian.tar.xz 3093a7371a4fff2657f01c939e125936 7712 devel optional jtb_1.4.12-2_source.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEE8f9dDX4ALfD+VfsMplt42+Z8eqwFAly3L/oACgkQplt42+Z8 eqz/rA//dlIvjULSIOiRS6KDJsNefGmI81FWSH+QqSQJ4Aa1Y6Ij1Vt47yJ/8H8c cV4QoEMxzRbAMQPGAbYND1RX5IjbSDC68KyXCDxKz9XYMdZUcwdQRmbcCSzTKnWv thQFBUCM/G/9FZc6nFoRJrv26NVJWJgkaPkH+ENgv6wbBWCV1wHKrTwRSxMsXtCh pMGCt3XDNDQUahYTTEJvyGx09cspHq2dyvMElm8kR9eUHPt4Di/Dk9bCgQPPojZe YWlmmXQIeJuYvdBa8wZ/hONznLj8d2M17n4F58FXx6b+nM+b39fjAat5LSts02H/ 6JjBiMPV1MkxxLpJVsAHn5SdcxEy+zJE5PhKQ12lq5NSfEBFF1CZbi90q/5iQOQX IWzIbsr3dC6tvRAgOusowfSi9Z21NiBCVrj9JrxU30sUKCMTVF+A3suqHJwE+IHf Y1OfGmYxidHNXtSuSrL1yWJO+E8+zaHvf/gkAbS6FElflpeJuFRy9MQflVGPBUXD 25vGMlgPXRj7gyOq/rfkETRD79wogJoCOJWR16Z7Pku5xRMucLElMdYmYQ2uLm3z 9NjJgiALX3n6h1hQagy3MhJFuj0X4dRdrVW2J3S68Nxr3yWQ7eBBlhbMoRyu98QN aIKHjWk2ArGUX4arl89u7sri8ygQkRjuNZJZwUEyjJQgzpr+Irk= =I/LI -END PGP SIGNATURE- Thank you for your contribution to Debian.