From owner-freebsd-hackers Mon Feb 5 22:39:56 1996 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id WAA03120 for hackers-outgoing; Mon, 5 Feb 1996 22:39:56 -0800 (PST) Received: from okjunc.junction.net (michael@okjunc.junction.net [199.166.227.1]) by freefall.freebsd.org (8.7.3/8.7.3) with SMTP id WAA03115 for ; Mon, 5 Feb 1996 22:39:55 -0800 (PST) Received: (from michael@localhost) by okjunc.junction.net (8.6.11/8.6.11) id WAA16062; Mon, 5 Feb 1996 22:46:58 -0800 Date: Mon, 5 Feb 1996 22:46:57 -0800 (PST) From: Michael Dillon X-Sender: michael@okjunc.junction.net To: freebsd-hackers@freebsd.org Subject: Is this security hole being fixed?? Message-ID: Organization: Memra Software Inc. - Internet consulting MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-hackers@freebsd.org Precedence: bulk ---------- Forwarded message ---------- Date: Mon, 5 Feb 1996 11:04:32 GMT From: Alan Cox To: Multiple recipients of list BIG-LINUX Subject: Linux as a production system [ irrelevant details deleted ] Some of the other things are very questionable. I can break a standard Sun Solaris 2 machine in about 2 minutes from a shell prompt and about 10 otherwise unless the user is applying patchkits very fast. Currently I can break almost any BSD derived system because of a bug CERT haven't yet even published. [ note above reference to a bug in *ALL* BSD derived systems ]