| Name |
Last commit
|
Last update |
|---|---|---|
| .. | ||
| binaryunicode.c | ||
| checkout_helpers.c | ||
| checkout_helpers.h | ||
| conflict.c | ||
| crlf.c | ||
| head.c | ||
| icase.c | ||
| index.c | ||
| nasty.c | ||
| tree.c | ||
| typechange.c |
The Windows Subsystem for Linux (WSL) is getting increasingly popular, in particular because it makes it _so_ easy to run Linux software on Windows' files, via the auto-mounted Windows drives (`C:\` is mapped to `/mnt/c/`, no need to set that up manually). Unfortunately, files/directories on the Windows drives can be accessed via their _short names_, if that feature is enabled (which it is on the `C:` drive by default). Which means that we have to safeguard even our Linux users against the short name attacks. Further, while the default options of CIFS/SMB-mounts seem to disallow accessing files on network shares via their short names on Linux/macOS, it _is_ possible to do so with the right options. So let's just safe-guard against short name attacks _everywhere_. Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
| Name |
Last commit
|
Last update |
|---|---|---|
| .. | ||
| binaryunicode.c | Loading commit data... | |
| checkout_helpers.c | Loading commit data... | |
| checkout_helpers.h | Loading commit data... | |
| conflict.c | Loading commit data... | |
| crlf.c | Loading commit data... | |
| head.c | Loading commit data... | |
| icase.c | Loading commit data... | |
| index.c | Loading commit data... | |
| nasty.c | Loading commit data... | |
| tree.c | Loading commit data... | |
| typechange.c | Loading commit data... |