⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.67
Server IP:
50.6.168.112
Server:
Linux server-617809.webnetzimbabwe.com 5.14.0-570.25.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Jul 9 04:57:09 EDT 2025 x86_64
Server Software:
Apache
PHP Version:
8.4.10
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
usr
/
share
/
setroubleshoot
/
plugins
/
__pycache__
/
View File Name :
setenforce.cpython-39.pyc
a Z` @ s\ d dl Z e jdddZej Zd dlT d dlmZ edZedZed ZG d d deZ dS ) Nzsetroubleshoot-pluginsT)Zfallback)*)Pluginz7If you did not directly cause this AVC through testing.z,if you think that you might have been hacked:Contact your security administrator and report this issue.c @ sL e Zd ZedZedZdZdZedZedZ edZ dd Zd d ZdS )pluginze Your system may be seriously compromised! $SOURCE_PATH tried to modify SELinux enforcement. a SELinux has prevented $SOURCE from writing to a file under /sys/fs/selinux. Files under /sys/fs/selinux control the way SELinux is configured. All programs that need to write to files under /sys/fs/selinux should have already had policy written for them. If a compromised application tries to turn off SELinux this AVC will be generated. This is a serious issue. Your system may very well be compromised. r z5If you believe $SOURCE_PATH tried to disable SELinux.z_you may be under attack by a hacker, since confined applications should never need this access.c C s t | t d| _d S )NZred)r __init____name__level)self r //usr/share/setroubleshoot/plugins/setenforce.pyr 4 s zplugin.__init__c C s$ | dgr |dgr | S d S )NwriteZ security_t)Zhas_any_access_inZmatches_target_typesZreport)r Zavcr r r analyze8 s zplugin.analyzeN) r __module____qualname___ZsummaryZproblem_descriptionZfix_descriptionZfix_cmdif_text then_textdo_textr r r r r r r s r ) gettextZtranslationr Zsetroubleshoot.utilZsetroubleshoot.Pluginr r r r r r r r r
s