Bug 1331780
Summary: | typo errors in various plugins | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Milos Malik <mmalik> | |
Component: | setroubleshoot-plugins | Assignee: | Vit Mojzis <vmojzis> | |
Status: | CLOSED ERRATA | QA Contact: | Milos Malik <mmalik> | |
Severity: | low | Docs Contact: | ||
Priority: | low | |||
Version: | 7.3 | CC: | eng-l10n-bugs, ljanda, lvrabec, mgrepl, mmalik, plautrba, qe-i18n-bugs, smaitra, vmojzis | |
Target Milestone: | rc | Keywords: | StringChange, Translation | |
Target Release: | --- | |||
Hardware: | All | |||
OS: | Linux | |||
Whiteboard: | ||||
Fixed In Version: | Doc Type: | Bug Fix | ||
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 1331786 1393898 (view as bug list) | Environment: | ||
Last Closed: | 2018-04-10 18:36:14 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 1393898, 1473148 |
Description
Milos Malik
2016-04-29 13:37:13 UTC
https://github.com/fedora-selinux/setroubleshoot/pull/45 https://github.com/fedora-selinux/setroubleshoot/pull/44 # rpm -qa setr\* setroubleshoot-plugins-3.0.65-1.el7.noarch setroubleshoot-server-3.2.27.2-3.el7.x86_64 # Following patterns were not corrected: # grep -R "signal a intrusion" /usr/share/setroubleshoot/plugins/* /usr/share/setroubleshoot/plugins/connect_ports.py: to connect to $PORT_NUMBER, this could signal a intrusion attempt. Binary file /usr/share/setroubleshoot/plugins/connect_ports.pyc matches Binary file /usr/share/setroubleshoot/plugins/connect_ports.pyo matches /usr/share/setroubleshoot/plugins/httpd_can_sendmail.py: signal a intrusion attempt. Binary file /usr/share/setroubleshoot/plugins/httpd_can_sendmail.pyc matches Binary file /usr/share/setroubleshoot/plugins/httpd_can_sendmail.pyo matches /usr/share/setroubleshoot/plugins/rsync_data.py: it could indicate either a bug or it could signal a intrusion attempt. Binary file /usr/share/setroubleshoot/plugins/rsync_data.pyc matches Binary file /usr/share/setroubleshoot/plugins/rsync_data.pyo matches /usr/share/setroubleshoot/plugins/samba_share.py: it could indicate either a bug or it could signal a intrusion attempt. Binary file /usr/share/setroubleshoot/plugins/samba_share.pyc matches Binary file /usr/share/setroubleshoot/plugins/samba_share.pyo matches /usr/share/setroubleshoot/plugins/sandbox_connect.py: to connect to $PORT_NUMBER, this could signal a intrusion attempt. Binary file /usr/share/setroubleshoot/plugins/sandbox_connect.pyc matches Binary file /usr/share/setroubleshoot/plugins/sandbox_connect.pyo matches /usr/share/setroubleshoot/plugins/swapfile.py: signal a intrusion attempt. Binary file /usr/share/setroubleshoot/plugins/swapfile.pyc matches Binary file /usr/share/setroubleshoot/plugins/swapfile.pyo matches # # grep -R "tries modify" /usr/share/setroubleshoot/plugins/* /usr/share/setroubleshoot/plugins/mmap_zero.py: for them. If a compromised application tries modify the kernel this AVC Binary file /usr/share/setroubleshoot/plugins/mmap_zero.pyc matches Binary file /usr/share/setroubleshoot/plugins/mmap_zero.pyo matches # # grep -R "be a mislabeled" /usr/share/setroubleshoot/plugins/* /usr/share/setroubleshoot/plugins/openvpn.py: be a mislabeled. openvpn is allowed to read content in home directory if it Binary file /usr/share/setroubleshoot/plugins/openvpn.pyc matches Binary file /usr/share/setroubleshoot/plugins/openvpn.pyo matches /usr/share/setroubleshoot/plugins/restorecon.py: be a mislabeled. $TARGET_PATH default SELinux type is Binary file /usr/share/setroubleshoot/plugins/restorecon.pyc matches Binary file /usr/share/setroubleshoot/plugins/restorecon.pyo matches /usr/share/setroubleshoot/plugins/restorecon_source.py: be a mislabeled. $SOURCE_PATH default SELinux type is Binary file /usr/share/setroubleshoot/plugins/restorecon_source.pyc matches Binary file /usr/share/setroubleshoot/plugins/restorecon_source.pyo matches /usr/share/setroubleshoot/plugins/sshd_root.py: be a mislabeled. sshd is allowed to read content in /root/.ssh directory if it Binary file /usr/share/setroubleshoot/plugins/sshd_root.pyc matches Binary file /usr/share/setroubleshoot/plugins/sshd_root.pyo matches # Assigning to ljanda as requested in comment 12. I believe this ticket can be closed as solved. I checked the concerned strings in Zanata. And after you have changes the English versions, it had no effect on translations. Which is good. I was able to find all concerned strings and all of them are correctly translated. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2018:0995 |