|
Server : Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 DAV/2 PHP/5.2.17 System : Linux localhost 2.6.18-419.el5 #1 SMP Fri Feb 24 22:47:42 UTC 2017 x86_64 User : nobody ( 99) PHP Version : 5.2.17 Disable Function : NONE Directory : /proc/21585/root/usr/share/setroubleshoot/plugins/ |
Upload File : |
mò
¡8Hc @ sR d k Z e i d d d e ƒi Z d k Td k l Z d e f d „ ƒ YZ d S( Ns setroubleshoot-pluginss /usr/share/localet fallback( t *( s Plugint pluginc B sD t Z e d ƒ Z e d ƒ Z e d ƒ Z d Z d „ Z d „ Z RS( NsG
SELinux prevented $SOURCE from accessing the cron spool file.
sG
SELinux prevented $SOURCE from accessing the cron spool file.
This is access is normally needed when using fcron as a cron daemon
(<a href="http://fcron.free.fr/">http://fcron.free.fr</a>). If you are using fcron you should allow this
access. Otherwise this access attempt may signal an intrusion attempt.
sh
Changing the "$BOOLEAN" boolean to true will allow this access:
"setsebool -P $BOOLEAN=1."
s setsebool -P $BOOLEAN=1c C s t i | t ƒ d S( N( t Plugint __init__t selft __name__( R ( ( t0 /usr/share/setroubleshoot/plugins/fcron_crond.pyR . s c C s– | i d g ƒ o{ | i d g ƒ oh | i | i ƒ oU | i d g ƒ oB | i d d ƒ | i | t d ƒ | i
| i | i | i
ƒ Sn d Sd S( Nt crond_tt system_cron_spool_tt filet BOOLEANt fcron_crondt CRON( t avct matches_source_typest matches_target_typest all_accesses_are_int create_file_permst
has_tclass_int set_template_substitutionsR t reportt _t summaryt problem_descriptiont fix_descriptiont fix_cmdt None( R R ( ( R t analyze1 s L( R t
__module__R R R R R R R ( ( ( R R s ( t gettextt translationt Truet lgettextR t setroubleshoot.utilt setroubleshoot.PluginR R ( R R R R ( ( R t ? s