From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
patches@lists.linux.dev, linux-kernel@vger.kernel.org,
torvalds@linux-foundation.org, akpm@linux-foundation.org,
linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org,
lkft-triage@lists.linaro.org, pavel@nabladev.com,
jonathanh@nvidia.com, f.fainelli@gmail.com,
sudipm.mukherjee@gmail.com, rwarsow@gmx.de, conor@kernel.org,
hargar@microsoft.com, broonie@kernel.org, achill@achill.org,
sr@sladewatkins.com
Subject: [PATCH 6.18 00/13] 6.18.18-rc1 review
Date: Thu, 12 Mar 2026 21:03:41 +0100 [thread overview]
Message-ID: <20260312200326.246396673@linuxfoundation.org> (raw)
This is the start of the stable review cycle for the 6.18.18 release.
There are 13 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Fri, 13 Mar 2026 20:03:15 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.18.18-rc1.gz
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-6.18.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Linux 6.18.18-rc1
John Johansen <john.johansen@canonical.com>
apparmor: fix race between freeing data and fs accessing it
John Johansen <john.johansen@canonical.com>
apparmor: fix race on rawdata dereference
John Johansen <john.johansen@canonical.com>
apparmor: fix differential encoding verification
John Johansen <john.johansen@canonical.com>
apparmor: fix unprivileged local user can do privileged policy management
John Johansen <john.johansen@canonical.com>
apparmor: Fix double free of ns_name in aa_replace_profiles()
Massimiliano Pellizzer <massimiliano.pellizzer@canonical.com>
apparmor: fix missing bounds check on DEFAULT table in verify_dfa()
Massimiliano Pellizzer <massimiliano.pellizzer@canonical.com>
apparmor: fix side-effect bug in match_char() macro usage
John Johansen <john.johansen@canonical.com>
apparmor: fix: limit the number of levels of policy namespaces
Massimiliano Pellizzer <massimiliano.pellizzer@canonical.com>
apparmor: replace recursive profile removal with iterative approach
Massimiliano Pellizzer <massimiliano.pellizzer@canonical.com>
apparmor: fix memory leak in verify_header
Massimiliano Pellizzer <massimiliano.pellizzer@canonical.com>
apparmor: validate DFA start states are in bounds in unpack_pdb
Victor Nogueira <victor@mojatatu.com>
net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks
Paul Moses <p@1g4.org>
net/sched: act_gate: snapshot parameters with RCU on replace
-------------
Diffstat:
Makefile | 4 +-
include/net/act_api.h | 1 +
include/net/tc_act/tc_gate.h | 33 +++-
net/sched/act_ct.c | 6 +
net/sched/act_gate.c | 267 +++++++++++++++++++++---------
net/sched/cls_api.c | 7 +
security/apparmor/apparmorfs.c | 225 +++++++++++++++----------
security/apparmor/include/label.h | 16 +-
security/apparmor/include/lib.h | 12 ++
security/apparmor/include/match.h | 1 +
security/apparmor/include/policy.h | 10 +-
security/apparmor/include/policy_ns.h | 2 +
security/apparmor/include/policy_unpack.h | 83 ++++++----
security/apparmor/label.c | 12 +-
security/apparmor/match.c | 58 +++++--
security/apparmor/policy.c | 77 +++++++--
security/apparmor/policy_ns.c | 2 +
security/apparmor/policy_unpack.c | 65 +++++---
18 files changed, 604 insertions(+), 277 deletions(-)
next reply other threads:[~2026-03-12 20:05 UTC|newest]
Thread overview: 22+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-03-12 20:03 Greg Kroah-Hartman [this message]
2026-03-12 20:03 ` [PATCH 6.18 01/13] net/sched: act_gate: snapshot parameters with RCU on replace Greg Kroah-Hartman
2026-03-12 20:03 ` [PATCH 6.18 02/13] net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks Greg Kroah-Hartman
2026-03-12 20:03 ` [PATCH 6.18 03/13] apparmor: validate DFA start states are in bounds in unpack_pdb Greg Kroah-Hartman
2026-03-12 20:03 ` [PATCH 6.18 04/13] apparmor: fix memory leak in verify_header Greg Kroah-Hartman
2026-03-12 20:03 ` [PATCH 6.18 05/13] apparmor: replace recursive profile removal with iterative approach Greg Kroah-Hartman
2026-03-12 20:03 ` [PATCH 6.18 06/13] apparmor: fix: limit the number of levels of policy namespaces Greg Kroah-Hartman
2026-03-12 20:03 ` [PATCH 6.18 07/13] apparmor: fix side-effect bug in match_char() macro usage Greg Kroah-Hartman
2026-03-12 20:03 ` [PATCH 6.18 08/13] apparmor: fix missing bounds check on DEFAULT table in verify_dfa() Greg Kroah-Hartman
2026-03-12 20:03 ` [PATCH 6.18 09/13] apparmor: Fix double free of ns_name in aa_replace_profiles() Greg Kroah-Hartman
2026-03-12 20:03 ` [PATCH 6.18 10/13] apparmor: fix unprivileged local user can do privileged policy management Greg Kroah-Hartman
2026-03-12 20:03 ` [PATCH 6.18 11/13] apparmor: fix differential encoding verification Greg Kroah-Hartman
2026-03-12 20:03 ` [PATCH 6.18 12/13] apparmor: fix race on rawdata dereference Greg Kroah-Hartman
2026-03-12 20:03 ` [PATCH 6.18 13/13] apparmor: fix race between freeing data and fs accessing it Greg Kroah-Hartman
2026-03-12 20:41 ` [PATCH 6.18 00/13] 6.18.18-rc1 review Brett A C Sheffield
2026-03-13 3:23 ` Shuah Khan
2026-03-13 5:24 ` Ron Economos
2026-03-13 10:56 ` Barry K. Nathan
2026-03-13 16:16 ` Jon Hunter
2026-03-13 16:40 ` Mark Brown
2026-03-13 18:03 ` Florian Fainelli
2026-03-13 21:15 ` Miguel Ojeda
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260312200326.246396673@linuxfoundation.org \
--to=gregkh@linuxfoundation.org \
--cc=achill@achill.org \
--cc=akpm@linux-foundation.org \
--cc=broonie@kernel.org \
--cc=conor@kernel.org \
--cc=f.fainelli@gmail.com \
--cc=hargar@microsoft.com \
--cc=jonathanh@nvidia.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux@roeck-us.net \
--cc=lkft-triage@lists.linaro.org \
--cc=patches@kernelci.org \
--cc=patches@lists.linux.dev \
--cc=pavel@nabladev.com \
--cc=rwarsow@gmx.de \
--cc=shuah@kernel.org \
--cc=sr@sladewatkins.com \
--cc=stable@vger.kernel.org \
--cc=sudipm.mukherjee@gmail.com \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox