On Dec 10, 2009, at 8:41 AM, Anton Shterenlikht wrote:

>> From my information security manager:
> 
>       FreeBSD isn't much used within the University (I understand) and has a
>       (comparatively) poor security record. Most recently, for example:
> 
>       
> http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html



From 
http://www.serverwatch.com/eur/article.php/3850401/FreeBSD-Shines-While-Apple-Fails.htm

> All software has bugs, but it's how people react when things go wrong that 
> you can judge them. Did the FreeBSD folks sit around and do nothing? Did they 
> busy themselves with other things and leave 8.0, 7.1 and 7.0 users vulnerable 
> to pwnage? No, they did not! A matter of hours later Colin Percival, 
> FreeBSD's security officer, made this announcement:
> 
> A short time ago a 'local root' exploit was posted to the full-disclosure 
> mailing list; as the name suggests, this allows a local user to execute 
> arbitrary code as root ... since exploit code is already widely available I 
> want to make a patch available ASAP.
> And with that, he released said patch.
> 

So what OS does your information security manager run on his {desk,lap}top?

-stacey._______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "freebsd-questions-unsubscr...@freebsd.org"

Reply via email to