Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 11 Dec 2009 07:13:40 -0600
From:      Stacey Son <>
To:        Anton Shterenlikht <>
Subject:   Re: Root exploit for FreeBSD
Message-ID:  <>
In-Reply-To: <>
References:  <>

Next in thread | Previous in thread | Raw E-Mail | Index | Archive | Help

On Dec 10, 2009, at 8:41 AM, Anton Shterenlikht wrote:

>> =46rom my information security manager:
> 	FreeBSD isn't much used within the University (I understand) and =
has a
> 	(comparatively) poor security record. Most recently, for =
> 	=

=46rom =

> All software has bugs, but it's how people react when things go wrong =
that you can judge them. Did the FreeBSD folks sit around and do =
nothing? Did they busy themselves with other things and leave 8.0, 7.1 =
and 7.0 users vulnerable to pwnage? No, they did not! A matter of hours =
later Colin Percival, FreeBSD's security officer, made this =
> A short time ago a 'local root' exploit was posted to the =
full-disclosure mailing list; as the name suggests, this allows a local =
user to execute arbitrary code as root ... since exploit code is already =
widely available I want to make a patch available ASAP.
> And with that, he released said patch.

So what OS does your information security manager run on his =


Want to link to this message? Use this URL: <>