| Server IP : 68.178.164.50 / Your IP : 216.73.216.142 Web Server : Apache System : Linux 50.164.178.68.host.secureserver.net 5.14.0-611.26.1.el9_7.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Jan 29 05:24:47 EST 2026 x86_64 User : rathinambschool ( 1053) PHP Version : 8.2.30 Disable Function : exec,passthru,shell_exec,system MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /proc/407308/root/usr/share/setroubleshoot/plugins/__pycache__/ |
Upload File : |
a
�Z`� � @ s\ d dl Z e jddd�Zej Zd dlT d dlmZ ed�Zed�Zed �ZG d
d� de�Z dS )� Nzsetroubleshoot-pluginsT)Zfallback)�*)�Pluginz7If you did not directly cause this AVC through testing.z,if you think that you might have been hacked�:Contact your security administrator and report this issue.c @ sL e Zd Zed�Zed�ZdZdZed�Zed�Z ed�Z
dd� Zd d
� ZdS )�pluginze
Your system may be seriously compromised! $SOURCE_PATH tried to modify SELinux enforcement.
a�
SELinux has prevented $SOURCE from writing to a file under /sys/fs/selinux.
Files under /sys/fs/selinux control the way SELinux is configured.
All programs that need to write to files under /sys/fs/selinux should have already had policy
written for them. If a compromised application tries to turn off SELinux
this AVC will be generated. This is a serious issue. Your system may very
well be compromised.
r � z5If you believe $SOURCE_PATH tried to disable SELinux.z_you may be under attack by a hacker, since confined applications should never need this access.c C s t �| t� d| _d S )NZred)r �__init__�__name__�level)�self� r �//usr/share/setroubleshoot/plugins/setenforce.pyr 4 s zplugin.__init__c C s$ |� dg�r |�dg�r | �� S d S )N�writeZ
security_t)Zhas_any_access_inZmatches_target_typesZreport)r
Zavcr r r �analyze8 s
�zplugin.analyzeN)
r �
__module__�__qualname__�_ZsummaryZproblem_descriptionZfix_descriptionZfix_cmd�if_text� then_text�do_textr r r r r r r s r )
�gettextZtranslationr Zsetroubleshoot.utilZsetroubleshoot.Pluginr r r r r r r r r �<module> s