git-subtree vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the git-subtree package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Process Control

<0:2.31.1-6.el9_0
  • H
Directory Traversal

<0:2.31.1-6.el9_0
  • H
Arbitrary Code Injection

<0:2.39.3-1.el9_2
  • H
Use of Externally-Controlled Format String

<0:2.39.3-1.el9_2
  • H
Directory Traversal

<0:2.39.3-1.el9_2
  • H
Directory Traversal

<0:2.39.3-1.el9_2
  • H
Resource Leak

<0:2.39.3-1.el9_2
  • M
Out-of-bounds Write

<0:2.39.1-1.el9
  • M
Link Following

<0:2.39.1-1.el9
  • M
Improper Ownership Management

<0:2.39.1-1.el9
  • M
Uncontrolled Search Path Element

<0:2.39.1-1.el9
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el9_1
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el9_1
  • H
Directory Traversal

<0:2.43.5-1.el9_4
  • H
Symlink Following

<0:2.43.5-1.el9_4
  • H
UNIX Hard Link

<0:2.43.5-1.el9_4
  • H
Improper Process Control

<0:2.43.5-1.el9_4
  • H
Directory Traversal

<0:2.43.5-1.el9_4
  • H
Directory Traversal

<0:2.39.5-1.el9_2
  • H
Symlink Following

<0:2.39.5-1.el9_2
  • H
UNIX Hard Link

<0:2.39.5-1.el9_2
  • H
Improper Process Control

<0:2.39.5-1.el9_2
  • H
Directory Traversal

<0:2.39.5-1.el9_2
  • H
Directory Traversal

<0:2.39.5-1.el9_2
  • H
Symlink Following

<0:2.39.5-1.el9_2
  • H
UNIX Hard Link

<0:2.39.5-1.el9_2
  • H
Improper Process Control

<0:2.39.5-1.el9_2
  • H
Directory Traversal

<0:2.39.5-1.el9_2
  • H
Directory Traversal

<0:2.39.5-1.el9_2
  • H
Symlink Following

<0:2.39.5-1.el9_2
  • H
UNIX Hard Link

<0:2.39.5-1.el9_2
  • H
Improper Process Control

<0:2.39.5-1.el9_2
  • H
Directory Traversal

<0:2.39.5-1.el9_2
  • H
Directory Traversal

<0:2.43.5-1.el9_4
  • H
Symlink Following

<0:2.43.5-1.el9_4
  • H
Improper Process Control

<0:2.43.5-1.el9_4
  • H
UNIX Hard Link

<0:2.43.5-1.el9_4
  • H
Directory Traversal

<0:2.43.5-1.el9_4
  • H
Directory Traversal

<0:2.39.3-1.el9_2
  • H
Directory Traversal

<0:2.31.1-5.el9_0
  • H
Directory Traversal

<0:2.39.3-1.el9_2
  • H
Directory Traversal

<0:2.31.1-5.el9_0
  • H
Directory Traversal

<0:2.39.3-1.el9_2
  • H
Directory Traversal

<0:2.39.3-1.el9_2
  • H
Arbitrary Code Injection

<0:2.39.3-1.el9_2
  • H
Arbitrary Code Injection

<0:2.31.1-5.el9_0
  • H
Arbitrary Code Injection

<0:2.39.3-1.el9_2
  • H
Arbitrary Code Injection

<0:2.39.3-1.el9_2
  • H
Arbitrary Code Injection

<0:2.39.3-1.el9_2
  • H
Arbitrary Code Injection

<0:2.31.1-5.el9_0
  • H
Use of Externally-Controlled Format String

<0:2.39.3-1.el9_2
  • H
Use of Externally-Controlled Format String

<0:2.39.3-1.el9_2
  • H
Use of Externally-Controlled Format String

<0:2.39.3-1.el9_2
  • H
Use of Externally-Controlled Format String

<0:2.31.1-5.el9_0
  • H
Use of Externally-Controlled Format String

<0:2.31.1-5.el9_0
  • H
Use of Externally-Controlled Format String

<0:2.39.3-1.el9_2
  • H
Directory Traversal

<0:2.39.3-1.el9_2
  • H
Directory Traversal

<0:2.39.3-1.el9_2
  • H
Directory Traversal

<0:2.39.3-1.el9_2
  • H
Directory Traversal

<0:2.39.3-1.el9_2
  • H
Resource Leak

<0:2.39.3-1.el9_2
  • H
Resource Leak

<0:2.39.3-1.el9_2
  • H
Resource Leak

<0:2.39.3-1.el9_2
  • H
Resource Leak

<0:2.39.3-1.el9_2
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el9_0
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el9_1
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el9_0
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el9_1
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el9_1
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el9_1
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el9_1
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el9_1
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el9_0
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el9_1
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el9_1
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el9_0
  • M
Link Following

<0:2.39.1-1.el9
  • M
Link Following

<0:2.39.1-1.el9
  • M
Link Following

<0:2.39.1-1.el9
  • M
Link Following

<0:2.39.1-1.el9
  • M
Out-of-bounds Write

<0:2.39.1-1.el9
  • M
Out-of-bounds Write

<0:2.39.1-1.el9
  • M
Out-of-bounds Write

<0:2.39.1-1.el9
  • M
Out-of-bounds Write

<0:2.39.1-1.el9
  • M
Improper Ownership Management

<0:2.39.1-1.el9
  • M
Improper Ownership Management

<0:2.39.1-1.el9
  • M
Improper Ownership Management

<0:2.39.1-1.el9
  • M
Improper Ownership Management

<0:2.39.1-1.el9
  • M
Uncontrolled Search Path Element

<0:2.39.1-1.el9
  • M
Uncontrolled Search Path Element

<0:2.39.1-1.el9
  • M
Uncontrolled Search Path Element

<0:2.39.1-1.el9
  • M
Uncontrolled Search Path Element

<0:2.39.1-1.el9