Bug 1331780

Summary: typo errors in various plugins
Product: Red Hat Enterprise Linux 7 Reporter: Milos Malik <mmalik>
Component: setroubleshoot-pluginsAssignee: Vit Mojzis <vmojzis>
Status: CLOSED ERRATA QA Contact: Milos Malik <mmalik>
Severity: low Docs Contact:
Priority: low    
Version: 7.3CC: eng-l10n-bugs, ljanda, lvrabec, mgrepl, mmalik, plautrba, qe-i18n-bugs, smaitra, vmojzis
Target Milestone: rcKeywords: StringChange, Translation
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
: 1331786 1393898 (view as bug list) Environment:
Last Closed: 2018-04-10 18:36:14 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1393898, 1473148    

Description Milos Malik 2016-04-29 13:37:13 UTC
Description of problem - incorrect English words or collocations:
compromized -> compromised
signal a intrusion -> signal an intrusion
be a mislabeled -> be mislabeled
tries modify -> tries to modify

Version-Release number of selected component (if applicable):
setroubleshoot-server-3.2.25-2.el7.x86_64
setroubleshoot-3.2.25-2.el7.x86_64
setroubleshoot-plugins-3.0.59-1.el7.noarch

How reproducible:
always

Steps to Reproduce:
# cd /usr/share/setroubleshoot/plugins/
# grep -R "compromized" *.py
allow_execmod.py:    application is compromized or not.  This could be a serious issue. Your 
allow_execmod.py:setroubleshoot examined '$FIX_TARGET_PATH' to make sure it was built correctly, but can not determine if this application has been compromized.  This alert could be a serious issue and your system could be compromised.
# grep -R "a intrusion" *.py
connect_ports.py:    to connect to $PORT_NUMBER, this could signal a intrusion attempt.
httpd_can_sendmail.py:    signal a intrusion attempt.
rsync_data.py:    it could indicate either a bug or it could signal a intrusion attempt.
samba_share.py:    it could indicate either a bug or it could signal a intrusion attempt.
sandbox_connect.py:    to connect to $PORT_NUMBER, this could signal a intrusion attempt.
swapfile.py:    signal a intrusion attempt.
# grep -R "be a mislabeled" *.py
openvpn.py:    be a mislabeled. openvpn is allowed to read content in home directory if it 
restorecon.py:    be a mislabeled.  $TARGET_PATH default SELinux type is
restorecon_source.py:    be a mislabeled.  $SOURCE_PATH default SELinux type is
sshd_root.py:    be a mislabeled. sshd is allowed to read content in /root/.ssh directory if it 
# grep -R "tries modify" *.py
mmap_zero.py:    for them.  If a compromised application tries modify the kernel this AVC 
# 

Expected results:
* typo errors are gone

Comment 5 Milos Malik 2017-03-21 07:50:48 UTC
# rpm -qa setr\*
setroubleshoot-plugins-3.0.65-1.el7.noarch
setroubleshoot-server-3.2.27.2-3.el7.x86_64
#

Following patterns were not corrected:

# grep -R "signal a intrusion" /usr/share/setroubleshoot/plugins/*
/usr/share/setroubleshoot/plugins/connect_ports.py:    to connect to $PORT_NUMBER, this could signal a intrusion attempt.
Binary file /usr/share/setroubleshoot/plugins/connect_ports.pyc matches
Binary file /usr/share/setroubleshoot/plugins/connect_ports.pyo matches
/usr/share/setroubleshoot/plugins/httpd_can_sendmail.py:    signal a intrusion attempt.
Binary file /usr/share/setroubleshoot/plugins/httpd_can_sendmail.pyc matches
Binary file /usr/share/setroubleshoot/plugins/httpd_can_sendmail.pyo matches
/usr/share/setroubleshoot/plugins/rsync_data.py:    it could indicate either a bug or it could signal a intrusion attempt.
Binary file /usr/share/setroubleshoot/plugins/rsync_data.pyc matches
Binary file /usr/share/setroubleshoot/plugins/rsync_data.pyo matches
/usr/share/setroubleshoot/plugins/samba_share.py:    it could indicate either a bug or it could signal a intrusion attempt.
Binary file /usr/share/setroubleshoot/plugins/samba_share.pyc matches
Binary file /usr/share/setroubleshoot/plugins/samba_share.pyo matches
/usr/share/setroubleshoot/plugins/sandbox_connect.py:    to connect to $PORT_NUMBER, this could signal a intrusion attempt.
Binary file /usr/share/setroubleshoot/plugins/sandbox_connect.pyc matches
Binary file /usr/share/setroubleshoot/plugins/sandbox_connect.pyo matches
/usr/share/setroubleshoot/plugins/swapfile.py:    signal a intrusion attempt.
Binary file /usr/share/setroubleshoot/plugins/swapfile.pyc matches
Binary file /usr/share/setroubleshoot/plugins/swapfile.pyo matches
# 

# grep -R "tries modify" /usr/share/setroubleshoot/plugins/*
/usr/share/setroubleshoot/plugins/mmap_zero.py:    for them.  If a compromised application tries modify the kernel this AVC 
Binary file /usr/share/setroubleshoot/plugins/mmap_zero.pyc matches
Binary file /usr/share/setroubleshoot/plugins/mmap_zero.pyo matches
#

# grep -R "be a mislabeled" /usr/share/setroubleshoot/plugins/*
/usr/share/setroubleshoot/plugins/openvpn.py:    be a mislabeled. openvpn is allowed to read content in home directory if it
Binary file /usr/share/setroubleshoot/plugins/openvpn.pyc matches
Binary file /usr/share/setroubleshoot/plugins/openvpn.pyo matches
/usr/share/setroubleshoot/plugins/restorecon.py:    be a mislabeled.  $TARGET_PATH default SELinux type is
Binary file /usr/share/setroubleshoot/plugins/restorecon.pyc matches
Binary file /usr/share/setroubleshoot/plugins/restorecon.pyo matches
/usr/share/setroubleshoot/plugins/restorecon_source.py:    be a mislabeled.  $SOURCE_PATH default SELinux type is
Binary file /usr/share/setroubleshoot/plugins/restorecon_source.pyc matches
Binary file /usr/share/setroubleshoot/plugins/restorecon_source.pyo matches
/usr/share/setroubleshoot/plugins/sshd_root.py:    be a mislabeled. sshd is allowed to read content in /root/.ssh directory if it
Binary file /usr/share/setroubleshoot/plugins/sshd_root.pyc matches
Binary file /usr/share/setroubleshoot/plugins/sshd_root.pyo matches
#

Comment 14 Vit Mojzis 2017-11-09 12:33:49 UTC
Assigning to ljanda as requested in comment 12.

Comment 15 Ludek Janda 2017-11-09 13:03:23 UTC
I believe this ticket can be closed as solved. I checked the concerned strings in Zanata. And after you have changes the English versions, it had no effect on translations. Which is good. I was able to find all concerned strings and all of them are correctly translated.

Comment 19 errata-xmlrpc 2018-04-10 18:36:14 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2018:0995