⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.24
Server IP:
50.6.168.112
Server:
Linux server-617809.webnetzimbabwe.com 5.14.0-570.25.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Jul 9 04:57:09 EDT 2025 x86_64
Server Software:
Apache
PHP Version:
8.4.10
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
usr
/
share
/
setroubleshoot
/
plugins
/
__pycache__
/
View File Name :
automount_exec_config.cpython-39.opt-1.pyc
a Z` @ sD d dl Z e jdddZej Zd dlT d dlmZ G dd deZdS ) Nzsetroubleshoot-pluginsT)Zfallback)*)Pluginc @ sD e Zd ZedZedZedZdZdZdZ dZ dd Zd d ZdS ) pluginzj SELinux is preventing the $SOURCE_PATH from executing potentially mislabeled files $TARGET_PATH. a SELinux has denied the $SOURCE_PATH from executing potentially mislabeled files $TARGET_PATH. Automounter can be setup to execute configuration files. If $TARGET_PATH is an automount executable configuration file it needs to have a file label of bin_t. If automounter is trying to execute something that it is not supposed to, this could indicate an intrusion attempt. a, If you want to change the file context of $TARGET_PATH so that the automounter can execute it you can execute "chcon -t bin_t $TARGET_PATH". If you want this to survive a relabel, you need to permanently change the file context: execute "semanage fcontext -a -t bin_t '$FIX_TARGET_PATH'". ze/usr/sbin/semanage fcontext -a -t bin_t '$FIX_TARGET_PATH';/usr/sbin/restorecon -v '$FIX_TARGET_PATH'z8If you want to allow automounter to execute $TARGET_PATHz3Change the file context of '$TARGET_PATH' to bin_t.z# chcon -t bin_t '$FIX_TARGET_PATH' If you want this to survive a relabel, execute # semanage fcontext -a -t bin_t '$FIX_TARGET_PATH';restorecon -v '$FIX_TARGET_PATH' c C s t | t d| _td| _d S )NTzChange file context.)r __init____name__Zfixable_Zbutton_text)self r :/usr/share/setroubleshoot/plugins/automount_exec_config.pyr 6 s zplugin.__init__c C s2 | dgr.|ddgr.|dgr.| S d S )NZautomount_tZexecuteZexecute_no_transfile)Zmatches_source_typesZall_accesses_are_inZ has_tclass_inZreport)r Zavcr r r analyze; s zplugin.analyzeN) r __module____qualname__r ZsummaryZproblem_descriptionZfix_descriptionZfix_cmdZif_textZ then_textZdo_textr r r r r r r s r )gettextZtranslationr Zsetroubleshoot.utilZsetroubleshoot.Pluginr r r r r r
s