Malicious software in Windows has been known to try getting past simple file type checks by spreading a zip file containing the actual executable.
In our case, a user could get a tarball containing an executable with the +x bit set from a malicious user. Perhaps make file-roller ask the user before unpacking archives that have the executable bit set. -- needs to block non-executable files from executing https://bugs.launchpad.net/bugs/506702 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
