]> git.ipfire.org Git - thirdparty/git.git/commit
path: also guard `.gitmodules` against NTFS Alternate Data Streams
authorJohannes Schindelin <johannes.schindelin@gmx.de>
Wed, 28 Aug 2019 10:22:17 +0000 (12:22 +0200)
committerJohannes Schindelin <johannes.schindelin@gmx.de>
Thu, 5 Dec 2019 14:36:51 +0000 (15:36 +0100)
commit91bd46588e6959e6903e275f78b10bd07830d547
tree00b0bb3ed0584501a3638e7eaaf28d29bc792cf6
parent7c3745fc6185495d5765628b4dfe1bd2c25a2981
path: also guard `.gitmodules` against NTFS Alternate Data Streams

We just safe-guarded `.git` against NTFS Alternate Data Stream-related
attack vectors, and now it is time to do the same for `.gitmodules`.

Note: In the added regression test, we refrain from verifying all kinds
of variations between short names and NTFS Alternate Data Streams: as
the new code disallows _all_ Alternate Data Streams of `.gitmodules`, it
is enough to test one in order to know that all of them are guarded
against.

Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
path.c
t/t0060-path-utils.sh