Shirley the LTS says it gets security updates for a mere 10 years.
The CVE-2022-0185 vulnerability in Ubuntu is severe enough that Red Hat is also advising immediate patching. The flaw allows a process inside a Linux user namespace to escape, which means it potentially affects any machine running containers. If you're not running any containers, you can just disable the user-namespace …
Distros will be backporting the fix from mainline  and/or the v5.16.2 stable tree 
author Jamie Hill-Daniel <firstname.lastname@example.org> 2022-01-18 08:06:04 +0100
committer Linus Torvalds <email@example.com> 2022-01-18 09:23:19 +0200
vfs: fs_context: fix up param length parsing in legacy_parse_param The "PAGE_SIZE - 2 - size" calculation in legacy_parse_param() is an unsigned type so a large value of "size" results in a high positive value instead of a negative value as expected. Fix this by getting rid of the subtraction.
lol yikes, you think hackers don't do their research independent of the news? You think the people responsible for patching the "CVEs that are fixed EVERYDAY in Linux" shouldn't be made aware of something without trawling CVE directories, mailing lists, and Twitter? Delete your post, you special person.
Biting the hand that feeds IT © 1998–2022