Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 10 Dec 2009 16:09:57 +0100
From:      Andreas Rudisch <cyb.@gmx.net>
To:        Anton Shterenlikht <mexas@bristol.ac.uk>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: Root exploit for FreeBSD
Message-ID:  <20091210160957.a91f973a.cyb.@gmx.net>
In-Reply-To: <20091210144141.GB834@mech-cluster241.men.bris.ac.uk>
References:  <20091210144141.GB834@mech-cluster241.men.bris.ac.uk>

next in thread | previous in thread | raw e-mail | index | archive | help
--Signature=_Thu__10_Dec_2009_16_09_57_+0100_bFL4I1O2jLPhQg5O
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Thu, 10 Dec 2009 14:41:41 +0000
Anton Shterenlikht <mexas@bristol.ac.uk> wrote:

> FreeBSD isn't much used within the University (I understand) and has a
> (comparatively) poor security record.

In comparison to what it is supposed to have a poor security record?

> Most recently, for example:
> http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-87335=
2.html

Yes, and?

http://docs.freebsd.org/cgi/getmsg.cgi?fetch=3D0+0+archive/2009/freebsd-sec=
urity-notifications/20091206.freebsd-security-notifications

http://security.freebsd.org/advisories/FreeBSD-SA-09:16.rtld.asc

Andreas
--
GnuPG key  : 0x2A573565    |    http://www.gnupg.org/howtos/de/
Fingerprint: 925D 2089 0BF9 8DE5 9166  33BB F0FD CD37 2A57 3565

--Signature=_Thu__10_Dec_2009_16_09_57_+0100_bFL4I1O2jLPhQg5O
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.13 (FreeBSD)

iEYEARECAAYFAkshD0cACgkQ8P3NNypXNWV/ZACguMysFy4dmlf5sTKExKZu6cHM
sWoAn1C74DszY4oq81MC1JYWHiveg/Kk
=uxcU
-----END PGP SIGNATURE-----

--Signature=_Thu__10_Dec_2009_16_09_57_+0100_bFL4I1O2jLPhQg5O--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20091210160957.a91f973a.cyb.>