Malicious software in Windows has been known to try getting past simple file type checks by spreading a zip file containing the actual executable.
In our case, a user could get a tarball containing an executable with the +x bit set from a malicious user. Perhaps make file-roller ask the user before unpacking archives that have the executable bit set. -- needs to block non-executable files from executing https://bugs.launchpad.net/bugs/506702 You received this bug notification because you are a member of Ubuntu Desktop Bugs, which is subscribed to nautilus in ubuntu. -- desktop-bugs mailing list desktop-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/desktop-bugs