Bug 1331786

Summary: typo errors in various plugins
Product: Red Hat Enterprise Linux 6 Reporter: Milos Malik <mmalik>
Component: setroubleshoot-pluginsAssignee: Petr Lautrbach <plautrba>
Status: CLOSED WONTFIX QA Contact: Dalibor Pospíšil <dapospis>
Severity: low Docs Contact:
Priority: low    
Version: 6.7CC: dapospis, lvrabec, mgrepl, mmalik, plautrba
Target Milestone: rc   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: 1331780 Environment:
Last Closed: 2016-11-07 15:09:08 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Milos Malik 2016-04-29 13:42:34 UTC
+++ This bug was initially created as a clone of Bug #1331780 +++

Description of problem - incorrect English words or collocations:
compromized -> compromised
signal a intrusion -> signal an intrusion
be a mislabeled -> be mislabeled
tries modify -> tries to modify

Version-Release number of selected component (if applicable):
setroubleshoot-plugins-3.0.40-2.el6.noarch
setroubleshoot-server-3.0.47-9.1.el6.i686

How reproducible:
always

Steps to Reproduce:
# cd /usr/share/setroubleshoot/plugins/
# grep -R "compromized" *.py
allow_execmod.py:    application is compromized or not.  This could be a serious issue. Your 
allow_execmod.py:setroubleshoot examined '$FIX_TARGET_PATH' to make sure it was built correctly, but can not determine if this application has been compromized.  This alert could be a serious issue and your system could be compromised.
# grep -R "a intrusion" *.py
connect_ports.py:    to connect to $PORT_NUMBER, this could signal a intrusion attempt.
httpd_can_sendmail.py:    signal a intrusion attempt.
rsync_data.py:    it could indicate either a bug or it could signal a intrusion attempt.
samba_share.py:    it could indicate either a bug or it could signal a intrusion attempt.
swapfile.py:    signal a intrusion attempt.
# grep -R "be a mislabeled" *.py
openvpn.py:    be a mislabeled. openvpn is allowed to read content in home directory if it 
restorecon.py:    be a mislabeled.  $TARGET_PATH default SELinux type is
sshd_root.py:    be a mislabeled. sshd is allowed to read content in /root/.ssh directory if it 
# grep -R "tries modify" *.py
mmap_zero.py:    for them.  If a compromised application tries modify the kernel this AVC 
#

Expected results:
* typo errors are gone

Comment 2 Petr Lautrbach 2016-11-07 15:09:08 UTC
Red Hat Enterprise Linux version 6X is in the Production 2 phase of its lifetime and this bug doesn't meet the criteria for it, i.e. only high severity issues will be fixed. Please see https://access.redhat.com/support/policy/updates/errata/ for further information.