Monday, February 10, 2025
HomeCyber Security NewsLinux Kernel 6.14-rc2 Released - What's Newly Added !

Linux Kernel 6.14-rc2 Released – What’s Newly Added !

Published on

SIEM as a Service

Follow Us on Google News

Linus Torvalds, lead developer of the Linux kernel, announced the second release candidate (rc2) of Linux Kernel 6.14, providing developers and enthusiasts with a glimpse at the latest updates and fixes in the kernel’s development cycle.

The announcement was made on the Linux Kernel Mailing List (LKML) on Sunday, February 9, 2025. This release follows the “fairly small” theme of the 6.14 series, with modest but notable updates.

Key Highlights of Linux Kernel 6.14-rc2

Linus described the release as “on the smaller side,” indicative of the kernel’s relatively stable development cycle. However, despite its compact nature, there are several points worth mentioning:

1. s390 KVM Cleanups Dominate the Patch

One of the standout features of 6.14-rc2 is the significant work done on the s390 architecture, particularly regarding Kernel-based Virtual Machine (KVM) cleanups.

Changes related to s390 accounted for about a third of the overall patch, making it the most substantial update in this release candidate.

These changes primarily involved code movement and optimization rather than introducing new features. While s390 updates are not common in other releases, they took center stage this time.

2. Selftests Enhancements

The kernel’s self-testing framework also saw updates. According to Linus, developers made minor fixes that led to the creation of new self-tests.

These developments help ensure the stability and correctness of the kernel as it evolves.

3. Small Fixes Across the Board

Apart from s390 cleanups and self-test updates, the release includes various small fixes across different parts of the kernel.

These minor changes help refine performance, address bugs, and ensure overall system stability without introducing breaking changes.

Linus concluded his announcement with a call to action for developers and testers to try out this release candidate to ensure the changes work as expected.

As with all rc releases, testing by the larger community plays a critical role in discovering edge-case issues or regressions that may not surface during development.

Linux 6.14-rc2 reflects the Linux kernel project’s steady and methodical development approach, with a focus on incremental improvements and stability.

The relatively small nature of this release, coupled with targeted updates, demonstrates the maturity of the Linux kernel.

As always, developers and system administrators are encouraged to participate in testing and contribute feedback during this phase.

Are you from SOC/DFIR Team? - Join 500,000+ Researchers to Analyze Cyber Threats with ANY.RUN Sandbox - Try for Free



Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years,...

Ransomware Payments Plunge 35% as More Victims Refuse to Pay

In a significant shift within the ransomware landscape, global ransom payments plummeted by 35%...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years,...