Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 7 Oct 2014 01:34:53 +0000
From: "Henry, Bobby" <Bobby.Henry@...edient.com>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
Subject: Re: Who named shellshock?

I forgot who said it, but we really missed the opportunity to call it
'Bashed'.

On 10/06/2014 06:42 PM, Larry W. Cashdollar wrote:
> turns out to be https://twitter.com/addelindh
>
> On Oct 6, 2014, at 6:12 PM, Larry W. Cashdollar <larry0@...com> wrote:
>
>> I thought it was https://twitter.com/ErrataRob
>>
>> On Oct 6, 2014, at 5:04 PM, Michal Zalewski <lcamtuf@...edump.cx> wrote:
>>
>>> I don't think it happened on Twitter - using advanced search with date
>>> ranges, I don't see any mentions that would predate this article,
>>> which already seems to be using the term:
>>>
>>> http://www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html
>>>
>>> It's odd that an article posted at 8 AM on Sept 24 would have any idea
>>> of how the bug is already being called by the security community,
>>> especially ahead of any Twitter buzz. But both Stephane and Florian
>>> implied that some of the pre-notified parties apparently started
>>> leaking details to the press and were getting ready to make a splash
>>> the moment it goes public, so maybe that's the explanation.
>>>
>>> /mz
>

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.