I'd also argue that keeping track of all the points that can create
a .desktop with the x bit set is certainly a much more secure way of
handling this, for instance, the DnD code could check:
Should the permissions be preserved on DnD?
Is the origin file:
* not a .desktop file? force umask
Le vendredi 13 février 2009 à 10:29 -0500, Michael S. Gilbert a écrit :
> as you have probably seen by now, there has been a lot of coverage
> about the potential avenue for exploits via kde and gnome application
> launchers (it looks like xfce is safe, for now) [1], [2], [3].
>
> the core of the
Package: nautilus
Version: 2.20-7
Severity: grave
Tags: security
as you have probably seen by now, there has been a lot of coverage
about the potential avenue for exploits via kde and gnome application
launchers (it looks like xfce is safe, for now) [1], [2], [3].
the core of the problem is that
3 matches
Mail list logo