a potential arbitrary code execution vulnerability – which can be triggered by merely cloning a malicious repository . The security hole , CVE-2018-11235 , reportedVulnerability-related.DiscoverVulnerabilityby Etienne Stalmans , stems from a flaw in Git whereby sub-module names supplied by the .gitmodules file are not properly validated when appended to $ GIT_DIR/modules . Including `` .. / '' in a name could result in directory hopping . Post-checkout hooks could then be executed , potentially causing all manner of mayhem to ensue on the victim 's system . Another vulnerability , CVE-2018-11233 , describesVulnerability-related.DiscoverVulnerabilitya flaw in the processing of pathnames in Git on NTFS-based systems , allowing the reading of memory contents . In a change from normal programming , the vulnerability appears to be cross platform . Fear not , however , because a patch is availableVulnerability-related.PatchVulnerability. The Git team releasedVulnerability-related.PatchVulnerabilitythe update in 2.13.7 of the popular coding , collaboration and control tool and forward-ported it to versions 2.14.4 , 2.15.2 , 2.16.4 and 2.13.7 . For its part , Microsoft has urged users to download 2.17.1 ( 2 ) of Git for Windows and has blocked the malicious repositories from being pushed to Visual Studio Team Services users . The software giant has also promised a hotfix will `` shortly '' be availableVulnerability-related.PatchVulnerabilityfor its popular Visual Studio 2017 platform . Other vendors , such as Debian , have been updatingVulnerability-related.PatchVulnerabilitytheir Linux and software distributions to include the patched code and recommend that users upgradeVulnerability-related.PatchVulnerabilityto thwart ne'er-do-wells seeking to exploitVulnerability-related.DiscoverVulnerabilitythe vulnerability .