[chop]
>
> Here's a wrapper for this bug and for the older XF86 security vulnerability
> (i.e. XF86_XX -config /etc/shadow)
FYI, Debian GNU/Linux has included such a wrapper for some time now.
However, Debian's wrapper is dynamically customizable (ie, your X
server is specified in a config file, etc). It will check for these
sorts of problems and prevent them from reaching the X server, similar
to your implementation.
-- John Goerzen Southwind Internet Access, Inc, Business e-mail: jgoerzen@southwind.netPersonal e-mail: jgoerzen@complete.org Wichita State University e-mail: jgoerzen@cs.twsu.edu Developer, Debian GNU/Linux <http://www.debian.org>