| From: |
| Greg Kroah-Hartman <gregkh-AT-linuxfoundation.org> |
| To: |
| linux-kernel-AT-vger.kernel.org, akpm-AT-linux-foundation.org, torvalds-AT-linux-foundation.org, stable-AT-vger.kernel.org |
| Subject: |
| Linux 6.19.8 |
| Date: |
| Fri, 13 Mar 2026 17:36:56 +0100 |
| Message-ID: |
| <2026031357-rambling-taekwondo-bb7a@gregkh> |
| Cc: |
| lwn-AT-lwn.net, jslaby-AT-suse.cz, Greg Kroah-Hartman <gregkh-AT-linuxfoundation.org> |
| Archive-link: |
| Article |
I'm announcing the release of the 6.19.8 kernel.
All users of the 6.19 kernel series must upgrade.
The updated 6.19.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-6.19.y
and can be browsed at the normal kernel.org git web browser:
https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...
thanks,
greg k-h
------------
Makefile | 2
include/net/act_api.h | 1
include/net/tc_act/tc_gate.h | 33 ++-
net/sched/act_ct.c | 6
net/sched/act_gate.c | 265 +++++++++++++++++++++---------
net/sched/cls_api.c | 7
security/apparmor/apparmorfs.c | 225 +++++++++++++++----------
security/apparmor/include/label.h | 16 -
security/apparmor/include/lib.h | 12 +
security/apparmor/include/match.h | 1
security/apparmor/include/policy.h | 10 -
security/apparmor/include/policy_ns.h | 2
security/apparmor/include/policy_unpack.h | 75 +++++---
security/apparmor/label.c | 12 -
security/apparmor/match.c | 58 ++++--
security/apparmor/policy.c | 77 +++++++-
security/apparmor/policy_ns.c | 2
security/apparmor/policy_unpack.c | 49 ++++-
18 files changed, 590 insertions(+), 263 deletions(-)
Greg Kroah-Hartman (1):
Linux 6.19.8
John Johansen (6):
apparmor: fix: limit the number of levels of policy namespaces
apparmor: Fix double free of ns_name in aa_replace_profiles()
apparmor: fix unprivileged local user can do privileged policy management
apparmor: fix differential encoding verification
apparmor: fix race on rawdata dereference
apparmor: fix race between freeing data and fs accessing it
Massimiliano Pellizzer (5):
apparmor: validate DFA start states are in bounds in unpack_pdb
apparmor: fix memory leak in verify_header
apparmor: replace recursive profile removal with iterative approach
apparmor: fix side-effect bug in match_char() macro usage
apparmor: fix missing bounds check on DEFAULT table in verify_dfa()
Paul Moses (1):
net/sched: act_gate: snapshot parameters with RCU on replace
Victor Nogueira (1):
net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks