Hi Dne Mon, 29 Jun 2009 13:39:19 +0200 Thijs Kinkhorst <th...@debian.org> napsal(a):
> Right, but the reporter is basing his report on the presence of log lines > trying to exploit the original issue. Which should not be possible anymore. No, in the log, he is using exploited config file (with some custom code inside). -- Michal Čihař | http://cihar.com | http://blog.cihar.com
signature.asc
Description: PGP signature