Date: Sat, 12 Dec 2009 16:33:52 -0700 (MST) From: "M. Warner Losh" <imp@bsdimp.com> To: wmoran@potentialtech.com Cc: freebsd-current@FreeBSD.org, mexas@bristol.ac.uk, freebsd-questions@FreeBSD.org Subject: Re: Root exploit for FreeBSD Message-ID: <20091212.163352.850602504923947435.imp@bsdimp.com> In-Reply-To: <20091210095122.a164bf95.wmoran@potentialtech.com> References: <20091210144141.GB834@mech-cluster241.men.bris.ac.uk> <20091210095122.a164bf95.wmoran@potentialtech.com>
next in thread | previous in thread | raw e-mail | index | archive | help
In message: <20091210095122.a164bf95.wmoran@potentialtech.com> Bill Moran <wmoran@potentialtech.com> writes: : In response to Anton Shterenlikht <mexas@bristol.ac.uk>: : : > >From my information security manager: : > : > FreeBSD isn't much used within the University (I understand) and has a : > (comparatively) poor security record. Most recently, for example: : > : > http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html : : Are you trying to make your infosec guy look like an idiot? Does he : realize that FreeBSD has a grand total of 16 security problems for all : of 2009? Hell, Microsoft has that many in an average month. And many of them were for code supplied by others... : If he can find something (other than OpenBSD) with a better record than : that, I'd love to hear about it. Are you sure that OpenBSD has a better record? Warner
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20091212.163352.850602504923947435.imp>