Skip to content

emka.web.id

menulis pengetahuan – merekam peradaban

Menu
  • Home
  • Tutorial
  • Search
Menu

Linux News Today: Don't Panic About Recent Zero-Day Linux Kernel Vulnerability, It's Not That Bad

Posted on January 20, 2016

The kernel vulnerability that was revealed only yesterday got some users panicked, but the truth is that’s not really the case.

It’s easy to scare users with warnings of vulnerabilities in the Linux kernel, which powers pretty much everything. The vulnerability was aptly named CVE-2016-0728, which is not all that impressive. This is the first indication. When something is bad enough, it usually receives a name, like Heartbleed for OpenSSL. When you’re called CVE-2016-0728, it’s hard to become a serious threat.

The vulnerability was discovered by a security firm named Perception Point Research, which also built an exploit to show that it can really be used. It turns out that this particular vulnerability has been present in the kernel since 2012, which would make for a very long time. The good news is that the kernel security team hasn’t found any evidence that this particular vulnerability has been exploited.

It’s not all that bad

It’s important to be concerned about the security of your system, but there is no real reason to panic about CVE-2016-0728. The original announcement went into the wild with the idea that it affects all operating systems powered by anything above Linux kernel 3.8, and that included a large number of Android devices.

There are some caveats, though. Many Android phones are still using the old 3.4 branch, and not all of them have moved to newer versions. Some developers have backported some of the features, but many of the phones aren’t prone to this problem. You can give thanks for the incredible fragmentation of the Android market.

As for the Linux operating systems, all of the important ones have been updated already, and the patch has been made available. Sure, there are going to be some systems that take longer to update than others, but it’s a much safer environment than Android.

All in all, it’s a vulnerability that will give an attacker root access to the system, but it takes a long time to execute it, and security teams already know about it.

If you want to panic over vulnerabilities, do so about the more dangerous ones that have yet to be found.

Via Softpedia

Terbaru

  • Ini Arti Kode Transaksi Bank ‘Kor MCD Transaction DB Otomatis’
  • Update Terbaru Januari 2026! Ini Trik Kode Plant Brainrot Simulator Biar Garden Kalian Makin OP
  • Belum Tahu? Inilah Asal Nomor Telepon 021 300 yang Sering Ganggu Kalian!
  • Bingung Menu Multi Payment Livin Mandiri Hilang? Inilah Cara Bayar Tagihan Apapun dengan Mudah!
  • Cara Nonton Anime di Anoboy dan Gabung Komunitas Discord Official Anoboy
  • Inilah Cara Nonton dan Link Website Anime Samehadaku Terbaru yang Paling Update!
  • Inilah Cara Kerja APK Sumber Dana, Penipuan atau Tidak?
  • Apakah Aplikasi Nonton Drama ReelFlick Penipuan?
  • Inilah Fakta di Balik Isu Video Blunder Risaatjan yang Viral di Media Sosial
  • Menu Hadiah Melolo Hilang Tiba-Tiba? Jangan Panik, Ini Trik Ampuh Mengatasinya!
  • CCTV Kematian Lula Lahfah?
  • Inilah Kronologi Meninggalnya Lula Lahfah
  • Cara Login SP Datadik Terbaru Biar Kerja Operator Sekolah Makin Sat-set!
  • Ketemu Link Video Viral ‘Petualangan Ustadzah Rahma’? Hati-hati, Kamu Bisa Dihack
  • Ikon Mic Roblox Hilang? Gini Caranya Mengaktifkan Kembali Voice Chat Biar Bisa Mabar Lagi!
  • Ini Cara Hapus Rombel Ganda di EMIS 4.0 yang Nggak Muncul Tombol Hapus
  • Inilah Kenapa Data Info GTK Kalian Nggak Berubah Padahal Dapodik Udah Sinkron
  • Belum Tahu CoreTax? Ini Trik Supaya Affiliator Lancar Lapor SPT Tahunan 2025 Tanpa Ribet
  • Inilah Cara Pendaftaran Peserta TKA SD dan SMP yang Benar Biar Nggak Salah Langkah!
  • Gagal Sinkron Dapodik 2026 C? Ini Trik Lengkap Supaya Berhasil Tanpa Pusing!
  • Cara Download Bukti Potong BPA1 di CoreTax, Nggak Perlu Ribet Minta HRD Lagi!
  • Cara Lapor SPT Tahunan di CoreTax Buat Pekerjaan Bebas, Ternyata Nggak Ribet Kalau Tahu Triknya!
  • Cara Beresin Siswa Tidak Teridentifikasi dan Rombel Ganda di EMIS 4.0
  • Cara Usul PIP di Dapodik 2026.B Biar Peserta Didik Kalian Dapat Bantuan!
  • Inilah Cara Awal Mengelola Web TKA Biar Nggak Pusing Pas Pelaksanaan!
  • Inilah Cara Mengatasi Masalah Jam Mengajar di InfoGTK Biar Cepat Valid!
  • Cara Atasi Residu Verval PD yang Tetap Muncul Padahal Sudah Hijau, Operator Sekolah Wajib Tahu!
  • Mau Cuan dari Nonton Drama di Cash Reels? Jangan Buru-buru Install Sebelum Baca Ini!
  • Tertipu Saldo Palsu? Apakah Game Layer Drop Penipu?
  • Inilah Syarat Terbaru dan Cara Daftar Bansos PKH-BPNT 2026 Lewat HP!
  • Mengenal Apa itu TONESHELL: Backdoor Berbahaya dari Kelompok Mustang Panda
  • Siapa itu Kelompok Hacker Silver Fox?
  • Apa itu CVE-2025-52691 SmarterMail? Celah Keamanan Paling Berbahaya Tahun 2025
  • Apa Itu ErrTraffic? Mengenal Platform ClickFix yang Bikin Website Jadi ‘Error’ Palsu
  • What is Reflex Framework? A Full-stack Python Framework
  • Cara Buat Audio Super Realistis dengan Qwen3-TTS-Flash
  • Tutorial Python Deepseek Math v2
  • Cara Menggunakan SAM3D untuk Segmentasi dan Pembuatan Model 3D dari Teks
  • Cara Membuat AI Agent Super Cerdas dengan DeepAgents dan LangGraph
  • Perbedaan GPU vs TPU, Mana yang Terbaik
  • Mengenal Apa itu TONESHELL: Backdoor Berbahaya dari Kelompok Mustang Panda
  • Siapa itu Kelompok Hacker Silver Fox?
  • Apa itu CVE-2025-52691 SmarterMail? Celah Keamanan Paling Berbahaya Tahun 2025
  • Apa Itu ErrTraffic? Mengenal Platform ClickFix yang Bikin Website Jadi ‘Error’ Palsu
  • Ini Kronologi Hacking ESA (European Space Agency) 2025
Beli Morning Star Kursi Gaming/Kantor disini: https://s.shopee.co.id/805iTUOPRV
Beli Pemotong Rumput dengan Baterai IRONHOOF 588V Mesin Potong Rumput 88V disini https://s.shopee.co.id/70DBGTHtuJ

©2026 emka.web.id | Design: Newspaperly WordPress Theme