Sh3ll
OdayForums


Server : Apache
System : Linux 145.162.205.92.host.secureserver.net 5.14.0-611.45.1.el9_7.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Apr 1 05:56:53 EDT 2026 x86_64
User : tradze ( 1001)
PHP Version : 8.1.34
Disable Function : NONE
Directory :  /usr/share/setroubleshoot/plugins/__pycache__/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //usr/share/setroubleshoot/plugins/__pycache__/setenforce.cpython-39.opt-1.pyc
a

�Z`�	�@s\ddlZejddd�ZejZddlTddlmZed�Zed�Zed	�ZGd
d�de�Z	dS)�Nzsetroubleshoot-pluginsT)Zfallback)�*)�Pluginz7If you did not directly cause this AVC through testing.z,if you think that you might have been hacked�:Contact your security administrator and report this issue.c@sLeZdZed�Zed�ZdZdZed�Zed�Z	ed�Z
dd�Zd	d
�ZdS)�pluginze
    Your system may be seriously compromised! $SOURCE_PATH tried to modify SELinux enforcement.
    a�
    SELinux has prevented $SOURCE from writing to a file under /sys/fs/selinux.
    Files under /sys/fs/selinux control the way SELinux is configured.
    All programs that need to write to files under /sys/fs/selinux should have already had policy
    written for them. If a compromised application tries to turn off SELinux
    this AVC will be generated. This is a serious issue. Your system may very
    well be compromised.
    r�z5If you believe $SOURCE_PATH tried to disable SELinux.z_you may be under attack by a hacker, since confined applications should never need this access.cCst�|t�d|_dS)NZred)r�__init__�__name__�level)�self�r�//usr/share/setroubleshoot/plugins/setenforce.pyr4szplugin.__init__cCs$|�dg�r |�dg�r |��SdS)N�writeZ
security_t)Zhas_any_access_inZmatches_target_typesZreport)r
Zavcrrr�analyze8s

�zplugin.analyzeN)
r�
__module__�__qualname__�_ZsummaryZproblem_descriptionZfix_descriptionZfix_cmd�if_text�	then_text�do_textrrrrrrrs	r)
�gettextZtranslationrZsetroubleshoot.utilZsetroubleshoot.Pluginrrrrrrrrr�<module>s

ZeroDay Forums Mini