Monday, May 5, 2025
HomeCyber Security NewsLinux Kernel 6.14 rc3 Released With The Fixes for Critical Issues

Linux Kernel 6.14 rc3 Released With The Fixes for Critical Issues

Published on

SIEM as a Service

Follow Us on Google News

Linus Torvalds has announced the release of Linux Kernel 6.14-rc3, marking a critical milestone in stabilizing the upcoming 6.14 kernel version.

This release candidate addresses architectural vulnerabilities and introduces the lightweight “Faux Bus” framework to streamline driver development.

The update notably incorporates a substantial patch series from KVM maintainer Paolo Bonzini, targeting virtualization improvements across ARM and x86 architectures while removing legacy code to enhance maintainability.

- Advertisement - Google News

ARM Architecture Overhaul

The ARM virtualization stack received extensive updates to resolve real-world deployment issues. A revamped vector register handling system simplifies floating-point (FP) and SIMD operations while improving Scalable Vector Extension (SVE) management.

Engineers fixed a race condition between virtual CPU initialization and virtualized interrupt controller (vGIC) setup, preventing instability during guest boot cycles.

Additionally, kernel virtual addresses (VAs) are no longer erroneously used in timer emulation for non-VHE mode, eliminating a source of hypervisor crashes.

According to the Cyber Security News Report, Protected KVM (pKVM), aimed at securing cloud workloads, saw critical memory alignment corrections and error-handling refinements.

These changes ensure secure guest isolation while reducing the risk of memory corruption during dynamic resource allocation.

x86 Stability and Hyper-V Optimization

For x86 systems, updates focus on hardening AMD Secure Nested Paging (SNP) support. The Platform Security Processor (PSP) now initializes correctly when KVM is built directly into the kernel, resolving a regression that broke SNP-enabled systems.

Hyper-V compatibility received attention, with KVM now explicitly rejecting unsupported SEND_IPI hypercalls in configurations without local APIC emulation—a fix that prevents silent failures in Windows guest environments.

Debug register (DR6) handling was patched to prevent stale values from persisting during guest transitions, addressing a longstanding source of debugging inaccuracies.

Nested page table tagging for Level 2 guests has also been corrected, mitigating potential host memory leaks.

Faux Bus: Simplifying Driver Development

Kernel 6.14-rc3 debuts the Faux Bus, a minimalist framework designed for simple or “fake” devices that don’t require full platform driver complexity.

Its API reduces boilerplate with just two core functions: faux_bus_register_device() and faux_bus_unregister_device(). By abstracting lifecycle management, the framework accelerates prototyping for hardware emulation and testing environments.

Notably, it supports both C and Rust bindings, aligning with the kernel’s push for safer memory management through Rust adoption.

Bonzini’s 30-file patchset removes 427 lines of legacy code while adding 420, reflecting KVM’s ongoing optimization.

Self-tests now cover Hyper-V CPUID emulation and nested virtualization edge cases, catching regressions earlier in development.

ARM contributor Mark Rutland spearheaded vector handling simplifications, which Torvalds praised for their balance of technical debt reduction and functionality preservation.

Developers are urged to test rc3 across hybrid virtualization environments, particularly those leveraging AMD SNP or ARM SVE.

With final testing underway, the Linux community anticipates a stable 6.14 release by late September, cementing its position as a cornerstone for cloud and embedded systems.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

NCSC Warns of Ransomware Attacks Targeting UK Organisations

National Cyber Security Centre (NCSC) has issued technical guidance following a series of cyber...

Claude AI Abused in Influence-as-a-Service Operations and Campaigns

Claude AI, developed by Anthropic, has been exploited by malicious actors in a range...

Threat Actors Attacking U.S. Citizens Via Social Engineering Attack

As Tax Day on April 15 approaches, a alarming cybersecurity threat has emerged targeting...

TerraStealer Strikes: Browser Credential & Sensitive‑Data Heists on the Rise

Insikt Group has uncovered two new malware families, TerraStealerV2 and TerraLogger, attributed to the...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

NCSC Warns of Ransomware Attacks Targeting UK Organisations

National Cyber Security Centre (NCSC) has issued technical guidance following a series of cyber...

Claude AI Abused in Influence-as-a-Service Operations and Campaigns

Claude AI, developed by Anthropic, has been exploited by malicious actors in a range...

Threat Actors Attacking U.S. Citizens Via Social Engineering Attack

As Tax Day on April 15 approaches, a alarming cybersecurity threat has emerged targeting...