Get Expert Website Hosting

Choose website reliability and expertise with SiteGround!

Security

Linux kernel local root exploit (CVE-2016-8655) fixed

Dec 07, 2016 2 min read Daniel Kanchev

Yesterday a Linux kernel local root exploit was found and reported. One more time our dedicated Linux kernel team acted quickly and was able to apply the official vulnerability patch in less than 24 hours. All our shared and cloud servers are now protected and again we managed to do this with no reboots and downtime. Read below to find out more about the security problem and how we patched it.

What is the exact security problem?

The security hole allows attackers to gain root access to servers by taking advantage of a race condition in the “net/packet/af_packet.c” part of the kernel. If performed successfully an attack will provide the attacker with a root shell and full access to the server. For more technical information you may check this page. Also the official patch which we used to update our kernels is available here. Philip Pettersson, the engineer, who found the issue said that he will release a PoC but he will wait some more time for people to patch their systems.

How widespread is the issue?

The bug was introduced on Aug 19, 2011 which means that many of the major Linux distributions are affected. All of the kernels based on the official kernel code before the official patch are most probably vulnerable.

What is the standard-issue resolution?

The easiest way to protect your computers running Linux is to update your Linux distro to the latest version. Unfortunately, in this case, most distribution vendors have not released new official versions of their kernels yet. If you are not building your own kernel then you’ll have to wait for the official PoC to be released in order to test if your Linux machines are vulnerable. Also, keep an eye on the packages released by your vendors and update as soon as a new kernel is released.

What SiteGround did to resolve this issue?

As we mentioned in our previous blog post about the Dirty COW vulnerability we build our own custom kernel and we have more control over our kernel patching and distribution process. We do not use the kernels provided by the official vendors and that is why we managed to act so quickly and patch our servers.

We got the official patch and again we used the kpatch tool to build modules for our kernels and patch them without rebooting the machines. This way we prevented downtime which is mandatory if a server is rebooted in order to upgrade its kernel. Needless to say, we tested the patch on different servers and different configurations in order to make sure that our whole fleet will be protected and no side issues will occur.

Right now all shared and cloud SiteGround servers are patched. We are still checking our dedicated servers because some of them are not affected by this security problem at all. The dedicated servers will be also patched as soon as possible.

Share this article

Daniel Kanchev

Director Product Development

Daniel is responsible for bringing new products to life at SiteGround. This involves handling all types of tasks and communication across multiple teams. Enthusiastic about technology, user experience, security and performance, you can never be bored hanging around him. Also an occasional conference speaker and travel addict.

More by Daniel

Related Posts

The Complete WordPress Security Guide + the Best Fixes

WordPress powers over a whopping 40% of the web. That’s an awful lot of websites—and also…

  • Feb 12, 2025
  • 9 min read

How to Secure a Website in 2025: 10 Critical Tactics

The question “how to secure a website” might seem daunting at first. With terms like HTTPS,…

  • Jan 07, 2025
  • 8 min read

7 Website Security Vulnerabilities + Simple Fixes

The internet can often feel like the Wild West—a vast frontier filled with opportunities but also…

  • Dec 30, 2024
  • 8 min read

Comments ( 1 )

author avatar

sowndharya

Feb 19, 2025

Thanks for sharing this blog! The explanation on the CVE-2016-8655 local root exploit and its fix is very clear and useful. I feel more informed about securing my Linux systems

Reply

Leave a comment

Add comment