⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.67
Server IP:
50.6.168.112
Server:
Linux server-617809.webnetzimbabwe.com 5.14.0-570.25.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Jul 9 04:57:09 EDT 2025 x86_64
Server Software:
Apache
PHP Version:
8.4.10
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
usr
/
share
/
setroubleshoot
/
plugins
/
__pycache__
/
View File Name :
selinuxpolicy.cpython-39.opt-1.pyc
a Z`_ @ sD d dl Z e jdddZej Zd dlT d dlmZ G dd deZdS ) Nzsetroubleshoot-pluginsT)Zfallback)*)Pluginc @ sL e Zd ZedZedZdZdZedZedZ edZ dd Zd d ZdS )pluginz3 Your system may be seriously compromised! a SELinux has prevented $SOURCE from modifying $TARGET. This denial indicates $SOURCE was trying to modify the selinux policy configuration. All applications that need this access should have already had policy written for them. If a compromised application tries to modify the SELinux policy this AVC will be generated. This is a serious issue. Your system may very well be compromised. z:Contact your security administrator and report this issue. zUIf you do not think $SOURCE_BASE_PATH should try $ACCESS access on $TARGET_BASE_PATH.z]you may be under attack by a hacker, since confined applications should not need this access.c C s t | t d| _d S )NZred)r __init____name__level)self r 2/usr/share/setroubleshoot/plugins/selinuxpolicy.pyr 0 s zplugin.__init__c C s. | dgs| r*|g dr*| S d S )Nwrite)Zselinux_config_tZdefault_context_tZfile_context_tZsemanage_store_tZsemanage_read_lock_tZsemanage_trans_lock_tZload_policy_exec_tZsetfiles_exec_tZcheckpolicy_exec_tZnewrole_exec_tZpolicy_src_tZrestorecond_exec_tZrun_init_exec_tZsetsebool_exec_tZsemanage_exec_tZselinux_var_lib_t)Zhas_any_access_inZopen_with_writeZmatches_target_typesZreport)r Zavcr r r analyze4 s zplugin.analyzeN) r __module____qualname___ZsummaryZproblem_descriptionZfix_descriptionZfix_cmdZif_textZ then_textZdo_textr r r r r r r s r )gettextZtranslationr Zsetroubleshoot.utilZsetroubleshoot.Pluginr r r r r r
s