Server IP : 184.154.167.98 / Your IP : 18.223.170.253 Web Server : Apache System : Linux pink.dnsnetservice.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64 User : puertode ( 1767) PHP Version : 7.2.34 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /usr/share/setroubleshoot/plugins/ |
Upload File : |
# @author Thomas Liu <tliu@redhat.com> # @author Dan Walsh <dwalsh@redhat.com> # # Copyright (C) 2009 Red Hat, Inc. # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. # import gettext translation=gettext.translation('setroubleshoot-plugins', fallback=True) _=translation.gettext from setroubleshoot.util import * from setroubleshoot.Plugin import Plugin class plugin(Plugin): summary =_(''' Your system may be seriously compromised! $SOURCE_PATH tried to modify kernel configuration. ''') problem_description = _(''' SELinux has prevented $SOURCE from modifying $TARGET. This denial indicates $SOURCE was trying to modify the way the kernel runs or to actually insert code into the kernel. All applications that need this access should have already had policy written for them. If a compromised application tries to modify the kernel this AVC will be generated. This is a serious issue. Your system may very well be compromised. ''') fix_description = "Contact your security administrator and report this issue." fix_cmd = "" if_text = _("If you do not think $SOURCE_BASE_PATH should try $ACCESS access on $TARGET_BASE_PATH.") then_text = _("you may be under attack by a hacker, since confined applications should not need this access.") do_text = _("Contact your security administrator and report this issue.") def __init__(self): Plugin.__init__(self, __name__) self.level="red" def analyze(self, avc): if ((avc.has_any_access_in(['write']) or avc.open_with_write()) and avc.matches_target_types(['modules_object_t', 'modules_conf_t', 'modules_dep_t', 'kmod_exec_t', 'kmod_exec_t', 'kmod_exec_t', 'kmod_tmp_t', 'boot_t', 'system_map_t' ])): # MATCH return self.report() return None