<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.openvz.org/index.php?action=history&amp;feed=atom&amp;title=Download%2Fkernel%2Frhel6%2F042stab137.1%2Fchanges</id>
	<title>Download/kernel/rhel6/042stab137.1/changes - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.openvz.org/index.php?action=history&amp;feed=atom&amp;title=Download%2Fkernel%2Frhel6%2F042stab137.1%2Fchanges"/>
	<link rel="alternate" type="text/html" href="https://wiki.openvz.org/index.php?title=Download/kernel/rhel6/042stab137.1/changes&amp;action=history"/>
	<updated>2026-05-14T17:41:55Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.31.1</generator>
	<entry>
		<id>https://wiki.openvz.org/index.php?title=Download/kernel/rhel6/042stab137.1/changes&amp;diff=23090&amp;oldid=prev</id>
		<title>Vvs: Created page with &quot;== Changes == Since {{kernel link|rhel6|042stab136.1}}:  * Rebase to RHEL6u10 kernel 2.6.32-754.12.1.el6 * '''[Important]''' A vulnerability was found in the fs/inode.c:inode_...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.openvz.org/index.php?title=Download/kernel/rhel6/042stab137.1/changes&amp;diff=23090&amp;oldid=prev"/>
		<updated>2019-05-06T08:52:57Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;== Changes == Since {{kernel link|rhel6|042stab136.1}}:  * Rebase to RHEL6u10 kernel 2.6.32-754.12.1.el6 * &amp;#039;&amp;#039;&amp;#039;[Important]&amp;#039;&amp;#039;&amp;#039; A vulnerability was found in the fs/inode.c:inode_...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Changes ==&lt;br /&gt;
Since {{kernel link|rhel6|042stab136.1}}:&lt;br /&gt;
&lt;br /&gt;
* Rebase to RHEL6u10 kernel 2.6.32-754.12.1.el6&lt;br /&gt;
* '''[Important]''' A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the Linux kernel that allows local users to create files with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. (CVE-2018-13405) &lt;br /&gt;
* Minor ploop improvements.&lt;br /&gt;
&lt;br /&gt;
=== See also ===&lt;br /&gt;
* {{RHSA|2019:0717}}&lt;br /&gt;
* {{CVE|2018-13405}}&lt;/div&gt;</summary>
		<author><name>Vvs</name></author>
		
	</entry>
</feed>