(In reply to Eric Rich from comment #0)
> +++ This bug was initially created as a clone of Bug #1175960 +++
This BZ is a clone of a security issues, that does not effect RHEL, however clients are requesting that the git client be updated to the include the software fix in 1.8.5.6, 1.9.5, 2.0.5, 2.1.4 or 2.2.1 to help assist with server implementations from allowing malicious files from being put into the repo.
Created attachment 1023160[details]
patch
Promised patch is here, based on upstream and debian solution - because upstream patches are only for newer versions of git (1.8.5+) and this bug it's solved on debian for git v1.7.9. I haven't tested this well, yet, but if anyone want to test this, I will be glad for feedback.
Created attachment 1024123[details]
test patch
Here is added test patch, which modify+add tests for git-1.7.1 for this CVE, used by updstream. patch2 is OK according to these tests.