8000 Git needs NTFS-related protections outside of Git for Windows · Advisory · git/git · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Git needs NTFS-related protections outside of Git for Windows

High
dscho published GHSA-589j-mmg9-733v Dec 13, 2019

Package

Git

Affected versions

<=2.14.5, 2.15.3, 2.16.5, 2.17.2, 2.18.1, 2.19.2, 2.20.1, 2.21.0, 2.22.1, 2.23.0, 2.24.0

Patched versions

2.24.1, 2.23.1, 2.22.2, 2.21.1, 2.20.2, 2.19.3, 2.18.2, 2.17.3, 2.16.6, 2.15.4, 2.14.6

Description

Impact

When running Git in the Windows Subsystem for Linux and working on Windows drives directly, and when running Git on macOS and working on smb://-mounted network shares, Git is susceptible to NTFS-related attacks.

While it would seem that NTFS Alternate Data Streams (the subject of CVE-2019-1352) are disabled when accessing files or directories on Windows drives from within the Windows Subsystem for Linux, files and directories can still be accessed via their NTFS short names (where enabled).

For smb://-mounted network shares on macOS, the situation seems reversed: NTFS short names are disabled, but NTFS Alternate Data Streams are not.

Patches

The problem has been patched in the versions published on Tuesday, December 10th, 2019.

Workarounds

Turn on core.protectNTFS explicitly, e.g. via git config --global core.protectNTFS true at a user-level, or via git config --system core.protectNTFS true at the system level.

Alternatively, avoid cloning untrusted repositories.

References

Severity

High

CVE ID

CVE-2019-1353

Weaknesses

No CWEs
0