Date: Thu, 10 Dec 2009 16:09:57 +0100 From: Andreas Rudisch <cyb.@gmx.net> To: Anton Shterenlikht <mexas@bristol.ac.uk> Cc: freebsd-questions@freebsd.org Subject: Re: Root exploit for FreeBSD Message-ID: <20091210160957.a91f973a.cyb.@gmx.net> In-Reply-To: <20091210144141.GB834@mech-cluster241.men.bris.ac.uk> References: <20091210144141.GB834@mech-cluster241.men.bris.ac.uk>
next in thread | previous in thread | raw e-mail | index | archive | help
--Signature=_Thu__10_Dec_2009_16_09_57_+0100_bFL4I1O2jLPhQg5O Content-Type: text/plain; charset=US-ASCII Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Thu, 10 Dec 2009 14:41:41 +0000 Anton Shterenlikht <mexas@bristol.ac.uk> wrote: > FreeBSD isn't much used within the University (I understand) and has a > (comparatively) poor security record. In comparison to what it is supposed to have a poor security record? > Most recently, for example: > http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-87335= 2.html Yes, and? http://docs.freebsd.org/cgi/getmsg.cgi?fetch=3D0+0+archive/2009/freebsd-sec= urity-notifications/20091206.freebsd-security-notifications http://security.freebsd.org/advisories/FreeBSD-SA-09:16.rtld.asc Andreas -- GnuPG key : 0x2A573565 | http://www.gnupg.org/howtos/de/ Fingerprint: 925D 2089 0BF9 8DE5 9166 33BB F0FD CD37 2A57 3565 --Signature=_Thu__10_Dec_2009_16_09_57_+0100_bFL4I1O2jLPhQg5O Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.13 (FreeBSD) iEYEARECAAYFAkshD0cACgkQ8P3NNypXNWV/ZACguMysFy4dmlf5sTKExKZu6cHM sWoAn1C74DszY4oq81MC1JYWHiveg/Kk =uxcU -----END PGP SIGNATURE----- --Signature=_Thu__10_Dec_2009_16_09_57_+0100_bFL4I1O2jLPhQg5O--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20091210160957.a91f973a.cyb.>