| Server IP : 68.178.164.50 / Your IP : 216.73.216.142 Web Server : Apache System : Linux 50.164.178.68.host.secureserver.net 5.14.0-611.26.1.el9_7.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Jan 29 05:24:47 EST 2026 x86_64 User : rathinambschool ( 1053) PHP Version : 8.2.30 Disable Function : exec,passthru,shell_exec,system MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /usr/share/setroubleshoot/plugins/__pycache__/ |
Upload File : |
a
�Z`�
� @ sD d dl Z e jddd�Zej Zd dlT d dlmZ G dd� de�ZdS ) � Nzsetroubleshoot-pluginsT)Zfallback)�*)�Pluginc @ sL e Zd Zed�Zed�ZdZdZed�Zed�Z ed�Z
dd� Zd d
� ZdS )�pluginzf
Your system may be seriously compromised! $SOURCE_PATH tried to modify kernel configuration.
a�
SELinux has prevented $SOURCE from modifying $TARGET. This denial
indicates $SOURCE was trying to modify the way the kernel runs or to
actually insert code into the kernel. All applications that need this
access should have already had policy written for them. If a compromised
application tries to modify the kernel this AVC will be generated. This is a
serious issue. Your system may very well be compromised.
z:Contact your security administrator and report this issue.� zUIf you do not think $SOURCE_BASE_PATH should try $ACCESS access on $TARGET_BASE_PATH.z]you may be under attack by a hacker, since confined applications should not need this access.c C s t �| t� d| _d S )NZred)r �__init__�__name__�level)�self� r
�3/usr/share/setroubleshoot/plugins/kernel_modules.pyr 0 s zplugin.__init__c C s. |� dg�s|�� r*|�g d��r*| �� S d S )N�write) Zmodules_object_tZmodules_conf_tZ
modules_dep_t�kmod_exec_tr
r
Z
kmod_tmp_tZboot_tZsystem_map_t)Zhas_any_access_inZopen_with_writeZmatches_target_typesZreport)r Zavcr
r
r �analyze4 s
�zplugin.analyzeN)
r �
__module__�__qualname__�_ZsummaryZproblem_descriptionZfix_descriptionZfix_cmdZif_textZ then_textZdo_textr r r
r
r
r r s r )�gettextZtranslationr Zsetroubleshoot.utilZsetroubleshoot.Pluginr r r
r
r
r �<module> s