This kernel-linus update is based on upstream 5.10.70 and fixes at least the following security issues:
Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccpshctx_ccid object as a listener after being released (CVE-2020-16119).
A race condition was discovered in ext4writeinlinedataend in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13 (CVE-2021-40490).
ooprwiter in fs/iouring.c in the Linux kernel 5.10 through 5.14.6 allows local users to gain privileges by using IORINGOPPROVIDEBUFFERS to trigger a free of a kernel buffer, as demonstrated by using /proc/<pid>/maps for exploitation (CVE-2021-41073).
For other upstream fixes, see the referenced changelogs.