I have been using Debian since version 0.93 and I have also had the occasion to use RedHat. I cannot speak for specifically for the security of one against the other, but the only RedHat server I ran for any time did get rooted and had a rootkit installed on it. Now this isn't to say that RedHat is less secure than Debian, but it was up to date on all packages and the point of entry was an ssh exploit. An exploit that even though the software version in use in the Debian package was older than the RedHat one, it had already been back patched by the maintainers for this particular exploit. I replaced the ssh package on RedHat the day the exploit announcement came out, unfortunatly the box had been rooted two days prior to the announcement.
Wednesday, June 12 2002 -- | ERROR: ERROR: ERROR: ERROR: ERROR: Timm Gleason | {SMACK} C:\> http://www.gleason.to/ | http://www.uranushertz.to/ | Quis custodiet iposos custodes? | -----PGP PUBLIC KEY BLOCK AVAILABLE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]