summaryrefslogtreecommitdiff
path: root/sha1_file.c
diff options
context:
space:
mode:
authorLibravatar Johannes Schindelin <johannes.schindelin@gmx.de>2019-08-28 12:22:17 +0200
committerLibravatar Johannes Schindelin <johannes.schindelin@gmx.de>2019-12-05 15:36:51 +0100
commit91bd46588e6959e6903e275f78b10bd07830d547 (patch)
tree00b0bb3ed0584501a3638e7eaaf28d29bc792cf6 /sha1_file.c
parentpath: safeguard `.git` against NTFS Alternate Streams Accesses (diff)
downloadtgif-91bd46588e6959e6903e275f78b10bd07830d547.tar.xz
path: also guard `.gitmodules` against NTFS Alternate Data Streams
We just safe-guarded `.git` against NTFS Alternate Data Stream-related attack vectors, and now it is time to do the same for `.gitmodules`. Note: In the added regression test, we refrain from verifying all kinds of variations between short names and NTFS Alternate Data Streams: as the new code disallows _all_ Alternate Data Streams of `.gitmodules`, it is enough to test one in order to know that all of them are guarded against. Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
Diffstat (limited to 'sha1_file.c')
0 files changed, 0 insertions, 0 deletions