⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.32
Server IP:
15.204.235.159
Server:
Linux srv.techlup.co.ke 4.18.0-553.5.1.el8_10.x86_64 #1 SMP Wed Jun 5 09:12:13 EDT 2024 x86_64
Server Software:
Apache
PHP Version:
8.2.27
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
usr
/
share
/
setroubleshoot
/
plugins
/
__pycache__
/
View File Name :
setenforce.cpython-36.opt-1.pyc
3 nm�a� � @ s\ d dl Z e jddd�Zej Zd dlT d dlmZ ed�Zed�Zed �ZG d d� de�Z dS )� Nzsetroubleshoot-pluginsT)Zfallback)�*)�Pluginz7If you did not directly cause this AVC through testing.z,if you think that you might have been hackedz:Contact your security administrator and report this issue.c @ sL e Zd Zed�Zed�ZdZdZed�Zed�Z ed�Z dd� Zd d � ZdS )�pluginze Your system may be seriously compromised! $SOURCE_PATH tried to modify SELinux enforcement. a� SELinux has prevented $SOURCE from writing to a file under /sys/fs/selinux. Files under /sys/fs/selinux control the way SELinux is configured. All programs that need to write to files under /sys/fs/selinux should have already had policy written for them. If a compromised application tries to turn off SELinux this AVC will be generated. This is a serious issue. Your system may very well be compromised. z:Contact your security administrator and report this issue.� z5If you believe $SOURCE_PATH tried to disable SELinux.z_you may be under attack by a hacker, since confined applications should never need this access.c C s t j| t� d| _d S )NZred)r �__init__�__name__�level)�self� r �//usr/share/setroubleshoot/plugins/setenforce.pyr 4 s zplugin.__init__c C s$ |j dg�r |jdg�r | j� S d S )N�writeZ security_t)Zhas_any_access_inZmatches_target_typesZreport)r Zavcr r r �analyze8 s zplugin.analyzeN) r � __module__�__qualname__�_ZsummaryZproblem_descriptionZfix_descriptionZfix_cmd�if_text� then_text�do_textr r r r r r r s r ) �gettextZtranslationr Zsetroubleshoot.utilZsetroubleshoot.Pluginr r r r r r r r r �<module> s