Server IP : 172.24.0.40 / Your IP : 216.73.216.10 Web Server : Apache System : Linux dbweb26.ust.edu.ph 4.18.0-513.5.1.el8_9.x86_64 #1 SMP Fri Sep 29 05:21:10 EDT 2023 x86_64 User : apache ( 48) PHP Version : 8.2.18 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /usr/share/setroubleshoot/plugins/__pycache__/ |
Upload File : |
3 �wTad � @ s\ d dl Z e jddd�Zej Zd dlT d dlmZ ed�Zed�Zed �ZG d d� de�Z dS )� Nzsetroubleshoot-pluginsT)Zfallback)�*)�PluginzaIf you do not believe your $SOURCE_PATH should be modifying the kernel, by loading kernel moduleszYou might have been hacked.z:Contact your security administrator and report this issue.c @ sL e Zd Zed�Zed�ZdZed�Zed�Zed�Z dZ dd� Zd d � ZdS )�pluginz_ Your system may be seriously compromised! $SOURCE_PATH tried to load a kernel module. aT SELinux has prevented $SOURCE from loading a kernel module. All confined programs that need to load kernel modules should have already had policy written for them. If a compromised application tries to modify the kernel this AVC will be generated. This is a serious issue. Your system may very well be compromised. z:Contact your security administrator and report this issue.zmIf you do not believe that $SOURCE_PATH should be attempting to modify the kernel by loading a kernel module.z7A process might be attempting to hack into your system.� c C s t j| t� | jd� d| _d S )N�d Zred)r �__init__�__name__Zset_priority�level)�self� r �//usr/share/setroubleshoot/plugins/sys_module.pyr 2 s zplugin.__init__c C s |j dg�r| j� S d S )N� sys_module)Zhas_any_access_inZreport)r Zavcr r r �analyze7 s zplugin.analyzeN) r � __module__�__qualname__�_ZsummaryZproblem_descriptionZfix_description�if_text� then_text�do_textZfix_cmdr r r r r r r s r ) �gettextZtranslationr Zsetroubleshoot.utilZsetroubleshoot.Pluginr r r r r r r r r �<module> s