{"id":"CVE-2019-1353","details":"An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. When running Git in the Windows Subsystem for Linux (also known as \"WSL\") while accessing a working directory on a regular Windows drive, none of the NTFS protections were active.","modified":"2026-04-11T12:10:35.568114Z","published":"2020-01-24T22:15:19.253Z","related":["SUSE-SU-2019:3311-1","SUSE-SU-2020:0045-1","SUSE-SU-2020:1121-1","openSUSE-SU-2020:0123-1","openSUSE-SU-2020:0598-1","openSUSE-SU-2024:10786-1","openSUSE-SU-2024:10943-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"15.1"}]}]},"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html"},{"type":"WEB","url":"https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u"},{"type":"WEB","url":"https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202003-30"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/git/git","events":[{"introduced":"4384e3cde2ce8ecd194202e171ae16333d241326"},{"fixed":"66d2a6159f511924e7e0b8a21c93538879bfd622"},{"introduced":"cb5918aa0d50f50e83787f65c2ddc3dcb10159fe"},{"fixed":"7cdafcaacf677b9e0700fa988c247bda192db48d"},{"introduced":"2512f15446149235156528dafbe75930c712b29e"},{"fixed":"eb288bc455ac67e3ceeff90daf6f25972bb586d0"},{"introduced":"468165c1d8a442994a825f3684528361727cd8c0"},{"fixed":"a5ab8d03173458b76b8452efd90a7173f490c132"},{"introduced":"53f9a3e157dbbc901a02ac2c73346d375e24978c"},{"fixed":"9877106b01cbd346b862cc8cd2c52e496dd40ed5"},{"introduced":"1d4361b0f344188ab5eec6dcea01f61a3a3a1670"},{"fixed":"caccc527ca7f4b3e6f4bb6775cbff94b27741482"},{"introduced":"5d826e972970a784bd7a7bdf587512510097b8c7"},{"fixed":"4cd1cf31efed9b16db5035c377bfa222f5272458"},{"introduced":"8104ec994ea3849a968b4667d072fedd1e688642"},{"fixed":"367f12b7e92aef4e8a41fe601d90984a2b7a0381"},{"introduced":"b697d92f56511e804b8ba20ccbe7bdc85dc66810"},{"fixed":"d9589d4051537c387b70dc76e430c61b4c85a86d"},{"introduced":"5fa0f5238b0cd46cfe7f6fa76c3f526ea98148d9"},{"fixed":"a7312d1a28ff3ab0a5a5427b35f01d943103cba8"},{"introduced":"da72936f544fec5a335e66432610e4cef4430991"},{"fixed":"53a06cf39b756eddfe4a2a34da93e3d04eb7b728"}],"database_specific":{"cpe":"cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"2.14.0"},{"fixed":"2.14.6"},{"introduced":"2.15.0"},{"fixed":"2.15.4"},{"introduced":"2.16.0"},{"fixed":"2.16.6"},{"introduced":"2.17.0"},{"fixed":"2.17.3"},{"introduced":"2.18.0"},{"fixed":"2.18.2"},{"introduced":"2.19.0"},{"fixed":"2.19.3"},{"introduced":"2.20.0"},{"fixed":"2.20.2"},{"introduced":"2.21.0"},{"fixed":"2.21.1"},{"introduced":"2.22.0"},{"fixed":"2.22.2"},{"introduced":"2.23.0"},{"fixed":"2.23.1"},{"introduced":"2.24.0"},{"fixed":"2.24.1"}]}}],"versions":["v2.14.0","v2.14.1","v2.14.2","v2.14.3","v2.14.4","v2.14.5","v2.15.0","v2.15.1","v2.15.2","v2.15.3","v2.16.0","v2.16.1","v2.16.2","v2.16.3","v2.16.4","v2.16.5","v2.17.0","v2.17.1","v2.17.2","v2.18.0","v2.18.1","v2.19.0","v2.19.1","v2.19.2","v2.20.0","v2.20.1","v2.21.0","v2.22.0","v2.22.1","v2.23.0","v2.24.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-1353.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}