|
|
Log in / Subscribe / Register

Linux 6.19.8

From:  Greg Kroah-Hartman <gregkh-AT-linuxfoundation.org>
To:  linux-kernel-AT-vger.kernel.org, akpm-AT-linux-foundation.org, torvalds-AT-linux-foundation.org, stable-AT-vger.kernel.org
Subject:  Linux 6.19.8
Date:  Fri, 13 Mar 2026 17:36:56 +0100
Message-ID:  <2026031357-rambling-taekwondo-bb7a@gregkh>
Cc:  lwn-AT-lwn.net, jslaby-AT-suse.cz, Greg Kroah-Hartman <gregkh-AT-linuxfoundation.org>
Archive-link:  Article

I'm announcing the release of the 6.19.8 kernel.

All users of the 6.19 kernel series must upgrade.

The updated 6.19.y git tree can be found at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-6.19.y
and can be browsed at the normal kernel.org git web browser:
	https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...

thanks,

greg k-h

------------

 Makefile                                  |    2 
 include/net/act_api.h                     |    1 
 include/net/tc_act/tc_gate.h              |   33 ++-
 net/sched/act_ct.c                        |    6 
 net/sched/act_gate.c                      |  265 +++++++++++++++++++++---------
 net/sched/cls_api.c                       |    7 
 security/apparmor/apparmorfs.c            |  225 +++++++++++++++----------
 security/apparmor/include/label.h         |   16 -
 security/apparmor/include/lib.h           |   12 +
 security/apparmor/include/match.h         |    1 
 security/apparmor/include/policy.h        |   10 -
 security/apparmor/include/policy_ns.h     |    2 
 security/apparmor/include/policy_unpack.h |   75 +++++---
 security/apparmor/label.c                 |   12 -
 security/apparmor/match.c                 |   58 ++++--
 security/apparmor/policy.c                |   77 +++++++-
 security/apparmor/policy_ns.c             |    2 
 security/apparmor/policy_unpack.c         |   49 ++++-
 18 files changed, 590 insertions(+), 263 deletions(-)

Greg Kroah-Hartman (1):
      Linux 6.19.8

John Johansen (6):
      apparmor: fix: limit the number of levels of policy namespaces
      apparmor: Fix double free of ns_name in aa_replace_profiles()
      apparmor: fix unprivileged local user can do privileged policy management
      apparmor: fix differential encoding verification
      apparmor: fix race on rawdata dereference
      apparmor: fix race between freeing data and fs accessing it

Massimiliano Pellizzer (5):
      apparmor: validate DFA start states are in bounds in unpack_pdb
      apparmor: fix memory leak in verify_header
      apparmor: replace recursive profile removal with iterative approach
      apparmor: fix side-effect bug in match_char() macro usage
      apparmor: fix missing bounds check on DEFAULT table in verify_dfa()

Paul Moses (1):
      net/sched: act_gate: snapshot parameters with RCU on replace

Victor Nogueira (1):
      net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks



Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds