Malicious software in Windows has been known to try getting past simple
file type checks by spreading a zip file containing the actual
executable.

In our case, a user could get a tarball containing an executable with
the +x bit set from a malicious user.

Perhaps make file-roller ask the user before unpacking archives that
have the executable bit set.

-- 
needs to block non-executable files from executing
https://bugs.launchpad.net/bugs/506702
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to nautilus in ubuntu.

-- 
desktop-bugs mailing list
desktop-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/desktop-bugs

Reply via email to