Malicious software in Windows has been known to try getting past simple
file type checks by spreading a zip file containing the actual
executable.

In our case, a user could get a tarball containing an executable with
the +x bit set from a malicious user.

Perhaps make file-roller ask the user before unpacking archives that
have the executable bit set.

-- 
needs to block non-executable files from executing
https://bugs.launchpad.net/bugs/506702
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to