Skip to content

emka.web.id

menulis pengetahuan – merekam peradaban

Menu
  • Home
  • Tutorial
  • Search
Menu

Linux News Today: Don't Panic About Recent Zero-Day Linux Kernel Vulnerability, It's Not That Bad

Posted on January 20, 2016

The kernel vulnerability that was revealed only yesterday got some users panicked, but the truth is that’s not really the case.

It’s easy to scare users with warnings of vulnerabilities in the Linux kernel, which powers pretty much everything. The vulnerability was aptly named CVE-2016-0728, which is not all that impressive. This is the first indication. When something is bad enough, it usually receives a name, like Heartbleed for OpenSSL. When you’re called CVE-2016-0728, it’s hard to become a serious threat.

The vulnerability was discovered by a security firm named Perception Point Research, which also built an exploit to show that it can really be used. It turns out that this particular vulnerability has been present in the kernel since 2012, which would make for a very long time. The good news is that the kernel security team hasn’t found any evidence that this particular vulnerability has been exploited.

It’s not all that bad

It’s important to be concerned about the security of your system, but there is no real reason to panic about CVE-2016-0728. The original announcement went into the wild with the idea that it affects all operating systems powered by anything above Linux kernel 3.8, and that included a large number of Android devices.

There are some caveats, though. Many Android phones are still using the old 3.4 branch, and not all of them have moved to newer versions. Some developers have backported some of the features, but many of the phones aren’t prone to this problem. You can give thanks for the incredible fragmentation of the Android market.

As for the Linux operating systems, all of the important ones have been updated already, and the patch has been made available. Sure, there are going to be some systems that take longer to update than others, but it’s a much safer environment than Android.

All in all, it’s a vulnerability that will give an attacker root access to the system, but it takes a long time to execute it, and security teams already know about it.

If you want to panic over vulnerabilities, do so about the more dangerous ones that have yet to be found.

Via Softpedia

Terbaru

  • Inilah Contoh Naskah Doa Upacara Hardiknas 2026 yang Syahdu dan Penuh Makna
  • Inilah 10 Peringkat SMP di Daerah Istimewa Yogyakarta Berdasarkan Hasil TKA TKAD 2025/2026 Terbaru
  • Inilah Cara Download FF Beta Versi Terbaru 2026, Lengkap Dengan Cara Daftar Advanced Server Resmi
  • Inilah Cara Menghilangkan YouTube Shorts di Beranda Biar Nggak Menghambat Scrolling Kalian!
  • Inilah Kabar Gembira Program Magang Nasional 2026, Kuota Naik Drastis Jadi 150 Ribu Peserta!
  • Inilah House of Amartha: Mengenal Bisnis Thariq Halilintar di Balik Pernikahan Mewah El Rumi dan Syifa Hadju
  • Inilah Cara Kuliah S1-S2-S3 Gratis dan Cepat Lewat Beasiswa BIB Kemenag Jalur Akselerasi 2026
  • Inilah Aturan Baru Penugasan Guru Non-ASN 2026, Nasib Kalian Ditentukan Sampai Tanggal Ini!
  • Inilah Cara Daftar Pra SPMB Banten 2026 Biar Proses Masuk Sekolah Jadi Makin Lancar
  • Inilah Rincian Biaya Jalur Mandiri Untirta 2026 Lengkap Per Fakultas dan Program Studi
  • Inilah Cara Daftar Pra SPMB Kota Semarang 2026 untuk Calon Siswa SD, Jangan Sampai Ketinggalan!
  • Inilah Cara Daftar PPOP DKI Jakarta 2026: Persiapkan Diri Kalian Jadi Calon Atlet Elite Ibu Kota!
  • Inilah Alasan Raja Ampat Disebut Surga Terakhir di Bumi dengan Biodiversitas Laut Paling Gokil di Dunia
  • Inilah Tanggapan PKB Soal KPK Usul Syarat Capres Harus Kader Partai
  • Inilah 5 Calon Ketua DPC PKB Timor Tengah Selatan dan Perubahan Aturan Seleksi yang Perlu Kalian Perhatikan
  • Inilah 51 Kode Redeem FF Terbaru 29 April 2026, Ada Gintoki Bundle dan Skin Eksklusif!
  • Inilah Profil Abdul Kadir Karding, Politikus PKB yang Resmi Dilantik Menjadi Kepala Badan Karantina Nasional!
  • Inilah 36 Kode Redeem FC Mobile Terbaru Mei 2026, Ada Trik Rahasia Dapetin Pemain OVR 119 di Event TOTS!
  • Inilah iPhone Ultra, Bocoran Ponsel Lipat Pertama Apple dan MacBook Ultra Layar Sentuh yang Siap Mengguncang Pasar!
  • Inilah Bocoran Tanggal Rilis dan Gameplay EA Sports UFC 6 yang Paling Dinantikan
  • Inilah Arti Move WA dalam Bahasa Gaul yang Sering Muncul di Aplikasi Kencan dan Media Sosial
  • Inilah realme C100, Smartphone dengan Baterai Titan 8000mAh Pertama yang Garansi Awet Sampai 7 Tahun!
  • Inilah Cara Mengatasi Third Party Software Is Interfering With Roblox yang Sering Muncul Tiba-Tiba
  • Inilah Penyebab Data Seluler Tidak Bisa Digunakan Padahal Sudah Aktif dan Solusi Praktis Mengatasinya
  • Inilah Kenapa Canva Error 503 Tidak Bisa Dibuka Hari Ini dan Cara Mengatasinya Sampai Layanan Kembali Normal
  • Inilah Cerita Hangat di Balik Muscab PKB Kebumen: Dari Urusan Dapur Hingga Strategi Pemenangan 2029!
  • Inilah Kronologi dan Identitas 4 WNI yang Disandera Perompak Somalia di Kapal MT Honour 25
  • Inilah Alasan PKB Kaji Ulang Ambang Batas DPRD Biar Sejalan Sama Putusan MK
  • Inilah Jadwal Pengumuman Hasil TKA SD dan SMP 2026 dan Cara Cek Skor Kalian Secara Online
  • Inilah HP Gaming Vivo Terbaik 2026 yang Paling Gahar, Main Game Berat Nggak Pake Ngelag!
  • How to Build Real-Time Personalization Systems Using AWS Agentic AI to Make Every User Feel Special
  • How to Transform Your Windows 11 Interface into a Sleek and Modern Aesthetic Masterpiece
  • How to Understand Google’s New TPU 8 Series for Massive AI Training and Inference
  • How to Level Up Your PC Gaming Experience with the New Valve Steam Controller and Its Advanced Features
  • Is it Time to Replace Nano? Discover Fresh, the Terminal Text Editor You Actually Want to Use
  • How to master OpenClaw voice personas to automate your business communication with a personalized human touch that builds customer trust
  • How to master AI agents using Hermes Web UI and the powerful new Xiaomi MiLM V2.5 model for beginners
  • How to Create Professional Movies and Advertisements Automatically Using the 50 Plus Artificial Intelligence Models in Studio by Abacus AI
  • How to use ChatGPT Images 2.0 to transform your creative ideas into professional visual assets
  • How to Use Dreamina SeaDance 2.0 to Create Professional Motion Graphics and Viral Videos Like a Pro
  • Apa itu Spear-Phishing via npm? Ini Pengertian dan Cara Kerjanya yang Makin Licin
  • Apa Itu Predator Spyware? Ini Pengertian dan Kontroversi Penghapusan Sanksinya
  • Mengenal Apa itu TONESHELL: Backdoor Berbahaya dari Kelompok Mustang Panda
  • Siapa itu Kelompok Hacker Silver Fox?
  • Apa itu CVE-2025-52691 SmarterMail? Celah Keamanan Paling Berbahaya Tahun 2025

©2026 emka.web.id | Design: Newspaperly WordPress Theme