21.04 LTS
Shirley the LTS says it gets security updates for a mere 10 years.
The CVE-2022-0185 vulnerability in Ubuntu is severe enough that Red Hat is also advising immediate patching. The flaw allows a process inside a Linux user namespace to escape, which means it potentially affects any machine running containers. If you're not running any containers, you can just disable the user-namespace …
Distros will be backporting the fix from mainline [0] and/or the v5.16.2 stable tree [1]
author Jamie Hill-Daniel <jamie@hill-daniel.co.uk> 2022-01-18 08:06:04 +0100
committer Linus Torvalds <torvalds@linux-foundation.org> 2022-01-18 09:23:19 +0200
vfs: fs_context: fix up param length parsing in legacy_parse_param The "PAGE_SIZE - 2 - size" calculation in legacy_parse_param() is an unsigned type so a large value of "size" results in a high positive value instead of a negative value as expected. Fix this by getting rid of the subtraction.
[0] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de29310e8aa03fcbdb41fc92c521756
[1] https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.16.2&id=8b1530a3772ae5b49c6d8d171fd3146bb947430f
lol yikes, you think hackers don't do their research independent of the news? You think the people responsible for patching the "CVEs that are fixed EVERYDAY in Linux" shouldn't be made aware of something without trawling CVE directories, mailing lists, and Twitter? Delete your post, you special person.