Comment 7 for bug 506702

Revision history for this message
Johan Kiviniemi (ion) wrote :

Malicious software in Windows has been known to try getting past simple file type checks by spreading a zip file containing the actual executable.

In our case, a user could get a tarball containing an executable with the +x bit set from a malicious user.

Perhaps make file-roller ask the user before unpacking archives that have the executable bit set.