Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 12 Dec 2009 16:33:52 -0700 (MST)
From:      "M. Warner Losh" <imp@bsdimp.com>
To:        wmoran@potentialtech.com
Cc:        freebsd-current@FreeBSD.org, mexas@bristol.ac.uk, freebsd-questions@FreeBSD.org
Subject:   Re: Root exploit for FreeBSD
Message-ID:  <20091212.163352.850602504923947435.imp@bsdimp.com>
In-Reply-To: <20091210095122.a164bf95.wmoran@potentialtech.com>
References:  <20091210144141.GB834@mech-cluster241.men.bris.ac.uk> <20091210095122.a164bf95.wmoran@potentialtech.com>

next in thread | previous in thread | raw e-mail | index | archive | help
In message: <20091210095122.a164bf95.wmoran@potentialtech.com>
            Bill Moran <wmoran@potentialtech.com> writes:
: In response to Anton Shterenlikht <mexas@bristol.ac.uk>:
: 
: > >From my information security manager:
: > 
: > 	FreeBSD isn't much used within the University (I understand) and has a
: > 	(comparatively) poor security record. Most recently, for example:
: > 
: > 	http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html
: 
: Are you trying to make your infosec guy look like an idiot?  Does he
: realize that FreeBSD has a grand total of 16 security problems for all
: of 2009?  Hell, Microsoft has that many in an average month.

And many of them were for code supplied by others...

: If he can find something (other than OpenBSD) with a better record than
: that, I'd love to hear about it.

Are you sure that OpenBSD has a better record?

Warner



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20091212.163352.850602504923947435.imp>