How to fix 70 seconds Linux root shell hack (Abusing LUKS to hack the system)

You need to check if your partitions are encrypted using LUKS. To do this, run following command:

dmsetup status | awk ‘BEGIN {FS=”:”} ; /crypt\s*$/ {print “Encrypted: ” $1}’


This command will show you the names of encrypted partitions. If you don't see any partition in the list, you're safe. If you're affected, you can lookup for a patch from your Linux Distribution vendor. If there's no patch, you need to add the following lines to your boot configuration:


sed -i ‘s/GRUB_CMDLINE_LINUX_DEFAULT=”/GRUB_CMDLINE_LINUX_DEFAULT=”panic=5 /’ /etc/default/grub grub-install


For more detailed information, you may visit:









Comments

Popular posts from this blog

Configure & Install WMIC for Observium

Zabbix Proxies on CentOS 7

Join CentOS 7 into Active Directory using realm and sssd