xlock clarification....

David Hedley (hedley@CS.BRIS.AC.UK)
Mon, 28 Apr 1997 13:30:08 +0100

Just to clarify the xlock problem for people (as I've received email
from several people who aren't sure if they're vulnerable or not). The
length of the parameter has to exceed 1024 bytes (as the buffer being
overflowed is 1024 characters). e.g. try: xlock -name xxxxx<insert 1000+x's>

Regards,

David

--
 David Hedley (hedley@cs.bris.ac.uk)
 finger hedley@cs.bris.ac.uk for PGP key
 Computer Graphics Group | University of Bristol | UK