what if someone distributes a malicious elf/a.out binary as
foo-1.5-2.i386.rpm the user will open the file with gmc/nautilus and
instead of telling the user "no viewer capable of opening this file" (or
whatever it says when someone runs a binary w/o the execute bit) it will
set the execute bit and run the file. boom!
On 22 May 2001 20:23:38 -0400, Miguel de Icaza wrote:
>
> Currently when people download executables from the network, say for
> installing software, they can not execute them because the execute bit
> is not set.
>
> So typical installation instructions for a Unix application look like
> this:
>
> 1. Click on this link to download.
> 2. Run a shell
> 3. type chmod +x file
> 4. Run
>
> Ideally, we want to avoid this problem in GNOME, and we just want
> executables to just work. As they do in Windows.
>
> So I would like to suggest that we set this bit manually if the user
> double clicks on a file that happens to have an a.out or ELF
> signature. Maybe we could popup a warning or something, but the
> result should be that files downloaded in this way would just work.
>
> Comments?
>
> Miguel.
>
> _______________________________________________
> Nautilus-list mailing list
> [EMAIL PROTECTED]
> http://lists.eazel.com/mailman/listinfo/nautilus-list
>
_______________________________________________
Mc mailing list
[EMAIL PROTECTED]
http://mail.gnome.org/mailman/listinfo/mc