{"id":3179,"date":"2023-02-03T17:20:07","date_gmt":"2023-02-03T11:50:07","guid":{"rendered":"https:\/\/trysiteprice.com\/blog\/?p=3179"},"modified":"2023-02-03T17:20:07","modified_gmt":"2023-02-03T11:50:07","slug":"how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728","status":"publish","type":"post","link":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/","title":{"rendered":"How To Patch and Protect Linux Kernel Zero Day Vulnerability CVE-2016-0728"},"content":{"rendered":"<p>The Linux kernel vulnerability CVE-2016-0728 is a race condition that can allow a local attacker to escalate their privileges and gain root access to the system. The vulnerability affects Linux kernels versions 3.8 and above.<\/p>\n<p>To patch this vulnerability, you should update your Linux kernel to a version that includes the fix. Here&#8217;s how you can do that on a Debian-based system like Ubuntu:<\/p>\n<ol>\n<li>Check your current Linux kernel version:\n<div class=\"bg-black mb-4 rounded-md\">\n<div class=\"flex items-center relative text-gray-200 bg-gray-800 px-4 py-2 text-xs font-sans\"><\/div>\n<div class=\"p-4 overflow-y-auto\"><code class=\"!whitespace-pre hljs language-bash\"><span class=\"hljs-built_in\">uname<\/span> -r<br \/>\n<\/code><\/div>\n<\/div>\n<\/li>\n<li>Update your system package list to ensure you have the latest information about available updates:\n<div class=\"bg-black mb-4 rounded-md\">\n<div class=\"flex items-center relative text-gray-200 bg-gray-800 px-4 py-2 text-xs font-sans\"><\/div>\n<div class=\"p-4 overflow-y-auto\"><code class=\"!whitespace-pre hljs language-sql\">sudo apt<span class=\"hljs-operator\">-<\/span><span class=\"hljs-keyword\">get<\/span> <span class=\"hljs-keyword\">update<\/span><br \/>\n<\/code><\/div>\n<\/div>\n<\/li>\n<li>Upgrade your Linux kernel to the latest version:\n<div class=\"bg-black mb-4 rounded-md\">\n<div class=\"flex items-center relative text-gray-200 bg-gray-800 px-4 py-2 text-xs font-sans\"><\/div>\n<div class=\"p-4 overflow-y-auto\"><code class=\"!whitespace-pre hljs language-csharp\">sudo apt-<span class=\"hljs-keyword\">get<\/span> upgrade<br \/>\n<\/code><\/div>\n<\/div>\n<\/li>\n<li>Reboot your system to load the updated Linux kernel:\n<div class=\"bg-black mb-4 rounded-md\">\n<div class=\"p-4 overflow-y-auto\"><code class=\"!whitespace-pre hljs\">sudo reboot<br \/>\n<\/code><\/div>\n<\/div>\n<\/li>\n<\/ol>\n<p>If you are unable to upgrade your Linux kernel, you can also protect against this vulnerability by disabling the <code>ptrace<\/code> system call, which is used by attackers to exploit the race condition. You can do this by adding the following line to your <code>\/etc\/sysctl.conf<\/code> file:<\/p>\n<div class=\"bg-black mb-4 rounded-md\">\n<div class=\"flex items-center relative text-gray-200 bg-gray-800 px-4 py-2 text-xs font-sans\"><\/div>\n<div class=\"p-4 overflow-y-auto\"><code class=\"!whitespace-pre hljs\">kernel.yama.ptrace_scope = 1<br \/>\n<\/code><\/div>\n<\/div>\n<p>Then, run the following command to reload the sysctl configuration:<\/p>\n<div class=\"bg-black mb-4 rounded-md\">\n<div class=\"flex items-center relative text-gray-200 bg-gray-800 px-4 py-2 text-xs font-sans\"><\/div>\n<div class=\"p-4 overflow-y-auto\"><code class=\"!whitespace-pre hljs language-css\">sudo sysctl -<span class=\"hljs-selector-tag\">p<\/span><br \/>\n<\/code><\/div>\n<\/div>\n<p>Keep in mind that disabling <code>ptrace<\/code> may have unintended consequences and could impact the functionality of certain programs. As such, upgrading your Linux kernel is the recommended solution to address this vulnerability.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Linux kernel vulnerability CVE-2016-0728 is a race condition that can allow a local attacker to escalate their privileges and gain root access to the system. The vulnerability affects Linux kernels versions 3.8 and above. To patch this vulnerability, you should update your Linux kernel to a version that includes the fix. Here&#8217;s how you &#8230; <a title=\"How To Patch and Protect Linux Kernel Zero Day Vulnerability CVE-2016-0728\" class=\"read-more\" href=\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/\" aria-label=\"Read more about How To Patch and Protect Linux Kernel Zero Day Vulnerability CVE-2016-0728\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3179","post","type-post","status-publish","format-standard","hentry","category-best-tutorial"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How To Patch and Protect Linux Kernel Zero Day Vulnerability CVE-2016-0728 - TrySitePrice<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Patch and Protect Linux Kernel Zero Day Vulnerability CVE-2016-0728 - TrySitePrice\" \/>\n<meta property=\"og:description\" content=\"The Linux kernel vulnerability CVE-2016-0728 is a race condition that can allow a local attacker to escalate their privileges and gain root access to the system. The vulnerability affects Linux kernels versions 3.8 and above. To patch this vulnerability, you should update your Linux kernel to a version that includes the fix. Here&#8217;s how you ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/\" \/>\n<meta property=\"og:site_name\" content=\"TrySitePrice\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-03T11:50:07+00:00\" \/>\n<meta name=\"author\" content=\"Rahul Sahu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/\"},\"author\":{\"name\":\"Rahul Sahu\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/#\/schema\/person\/358e04eeea4281deacad2f30c58e67f4\"},\"headline\":\"How To Patch and Protect Linux Kernel Zero Day Vulnerability CVE-2016-0728\",\"datePublished\":\"2023-02-03T11:50:07+00:00\",\"dateModified\":\"2023-02-03T11:50:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/\"},\"wordCount\":198,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/#organization\"},\"articleSection\":[\"Best\/Tutorial\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/\",\"url\":\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/\",\"name\":\"How To Patch and Protect Linux Kernel Zero Day Vulnerability CVE-2016-0728 - TrySitePrice\",\"isPartOf\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/#website\"},\"datePublished\":\"2023-02-03T11:50:07+00:00\",\"dateModified\":\"2023-02-03T11:50:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/trysiteprice.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Patch and Protect Linux Kernel Zero Day Vulnerability CVE-2016-0728\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/#website\",\"url\":\"https:\/\/trysiteprice.com\/blog\/\",\"name\":\"TrySitePrice\",\"description\":\"Free Website Value Calculator Tool\",\"publisher\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trysiteprice.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/#organization\",\"name\":\"TrySitePrice\",\"url\":\"https:\/\/trysiteprice.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/trysiteprice.com\/blog\/wp-content\/uploads\/2021\/12\/cropped-trysiteprice-logo.png\",\"contentUrl\":\"https:\/\/trysiteprice.com\/blog\/wp-content\/uploads\/2021\/12\/cropped-trysiteprice-logo.png\",\"width\":395,\"height\":268,\"caption\":\"TrySitePrice\"},\"image\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/#\/schema\/person\/358e04eeea4281deacad2f30c58e67f4\",\"name\":\"Rahul Sahu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/51f0f95f7b95665f62baed2211572165?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/51f0f95f7b95665f62baed2211572165?s=96&d=mm&r=g\",\"caption\":\"Rahul Sahu\"},\"sameAs\":[\"https:\/\/trysiteprice.com\/blog\"],\"url\":\"https:\/\/trysiteprice.com\/blog\/author\/rsahu4242_trysiteprice\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How To Patch and Protect Linux Kernel Zero Day Vulnerability CVE-2016-0728 - TrySitePrice","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/","og_locale":"en_US","og_type":"article","og_title":"How To Patch and Protect Linux Kernel Zero Day Vulnerability CVE-2016-0728 - TrySitePrice","og_description":"The Linux kernel vulnerability CVE-2016-0728 is a race condition that can allow a local attacker to escalate their privileges and gain root access to the system. The vulnerability affects Linux kernels versions 3.8 and above. To patch this vulnerability, you should update your Linux kernel to a version that includes the fix. Here&#8217;s how you ... Read more","og_url":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/","og_site_name":"TrySitePrice","article_published_time":"2023-02-03T11:50:07+00:00","author":"Rahul Sahu","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/#article","isPartOf":{"@id":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/"},"author":{"name":"Rahul Sahu","@id":"https:\/\/trysiteprice.com\/blog\/#\/schema\/person\/358e04eeea4281deacad2f30c58e67f4"},"headline":"How To Patch and Protect Linux Kernel Zero Day Vulnerability CVE-2016-0728","datePublished":"2023-02-03T11:50:07+00:00","dateModified":"2023-02-03T11:50:07+00:00","mainEntityOfPage":{"@id":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/"},"wordCount":198,"commentCount":0,"publisher":{"@id":"https:\/\/trysiteprice.com\/blog\/#organization"},"articleSection":["Best\/Tutorial"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/","url":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/","name":"How To Patch and Protect Linux Kernel Zero Day Vulnerability CVE-2016-0728 - TrySitePrice","isPartOf":{"@id":"https:\/\/trysiteprice.com\/blog\/#website"},"datePublished":"2023-02-03T11:50:07+00:00","dateModified":"2023-02-03T11:50:07+00:00","breadcrumb":{"@id":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-kernel-zero-day-vulnerability-cve-2016-0728\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trysiteprice.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How To Patch and Protect Linux Kernel Zero Day Vulnerability CVE-2016-0728"}]},{"@type":"WebSite","@id":"https:\/\/trysiteprice.com\/blog\/#website","url":"https:\/\/trysiteprice.com\/blog\/","name":"TrySitePrice","description":"Free Website Value Calculator Tool","publisher":{"@id":"https:\/\/trysiteprice.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trysiteprice.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/trysiteprice.com\/blog\/#organization","name":"TrySitePrice","url":"https:\/\/trysiteprice.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/trysiteprice.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/trysiteprice.com\/blog\/wp-content\/uploads\/2021\/12\/cropped-trysiteprice-logo.png","contentUrl":"https:\/\/trysiteprice.com\/blog\/wp-content\/uploads\/2021\/12\/cropped-trysiteprice-logo.png","width":395,"height":268,"caption":"TrySitePrice"},"image":{"@id":"https:\/\/trysiteprice.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/trysiteprice.com\/blog\/#\/schema\/person\/358e04eeea4281deacad2f30c58e67f4","name":"Rahul Sahu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/trysiteprice.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/51f0f95f7b95665f62baed2211572165?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/51f0f95f7b95665f62baed2211572165?s=96&d=mm&r=g","caption":"Rahul Sahu"},"sameAs":["https:\/\/trysiteprice.com\/blog"],"url":"https:\/\/trysiteprice.com\/blog\/author\/rsahu4242_trysiteprice\/"}]}},"_links":{"self":[{"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/posts\/3179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/comments?post=3179"}],"version-history":[{"count":1,"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/posts\/3179\/revisions"}],"predecessor-version":[{"id":3180,"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/posts\/3179\/revisions\/3180"}],"wp:attachment":[{"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/media?parent=3179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/categories?post=3179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/tags?post=3179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}