Hide Forgot
Description of problem - incorrect English words or collocations: compromized -> compromised signal a intrusion -> signal an intrusion be a mislabeled -> be mislabeled tries modify -> tries to modify Version-Release number of selected component (if applicable): setroubleshoot-server-3.2.25-2.el7.x86_64 setroubleshoot-3.2.25-2.el7.x86_64 setroubleshoot-plugins-3.0.59-1.el7.noarch How reproducible: always Steps to Reproduce: # cd /usr/share/setroubleshoot/plugins/ # grep -R "compromized" *.py allow_execmod.py: application is compromized or not. This could be a serious issue. Your allow_execmod.py:setroubleshoot examined '$FIX_TARGET_PATH' to make sure it was built correctly, but can not determine if this application has been compromized. This alert could be a serious issue and your system could be compromised. # grep -R "a intrusion" *.py connect_ports.py: to connect to $PORT_NUMBER, this could signal a intrusion attempt. httpd_can_sendmail.py: signal a intrusion attempt. rsync_data.py: it could indicate either a bug or it could signal a intrusion attempt. samba_share.py: it could indicate either a bug or it could signal a intrusion attempt. sandbox_connect.py: to connect to $PORT_NUMBER, this could signal a intrusion attempt. swapfile.py: signal a intrusion attempt. # grep -R "be a mislabeled" *.py openvpn.py: be a mislabeled. openvpn is allowed to read content in home directory if it restorecon.py: be a mislabeled. $TARGET_PATH default SELinux type is restorecon_source.py: be a mislabeled. $SOURCE_PATH default SELinux type is sshd_root.py: be a mislabeled. sshd is allowed to read content in /root/.ssh directory if it # grep -R "tries modify" *.py mmap_zero.py: for them. If a compromised application tries modify the kernel this AVC # Expected results: * typo errors are gone
https://github.com/fedora-selinux/setroubleshoot/pull/45 https://github.com/fedora-selinux/setroubleshoot/pull/44
# rpm -qa setr\* setroubleshoot-plugins-3.0.65-1.el7.noarch setroubleshoot-server-3.2.27.2-3.el7.x86_64 # Following patterns were not corrected: # grep -R "signal a intrusion" /usr/share/setroubleshoot/plugins/* /usr/share/setroubleshoot/plugins/connect_ports.py: to connect to $PORT_NUMBER, this could signal a intrusion attempt. Binary file /usr/share/setroubleshoot/plugins/connect_ports.pyc matches Binary file /usr/share/setroubleshoot/plugins/connect_ports.pyo matches /usr/share/setroubleshoot/plugins/httpd_can_sendmail.py: signal a intrusion attempt. Binary file /usr/share/setroubleshoot/plugins/httpd_can_sendmail.pyc matches Binary file /usr/share/setroubleshoot/plugins/httpd_can_sendmail.pyo matches /usr/share/setroubleshoot/plugins/rsync_data.py: it could indicate either a bug or it could signal a intrusion attempt. Binary file /usr/share/setroubleshoot/plugins/rsync_data.pyc matches Binary file /usr/share/setroubleshoot/plugins/rsync_data.pyo matches /usr/share/setroubleshoot/plugins/samba_share.py: it could indicate either a bug or it could signal a intrusion attempt. Binary file /usr/share/setroubleshoot/plugins/samba_share.pyc matches Binary file /usr/share/setroubleshoot/plugins/samba_share.pyo matches /usr/share/setroubleshoot/plugins/sandbox_connect.py: to connect to $PORT_NUMBER, this could signal a intrusion attempt. Binary file /usr/share/setroubleshoot/plugins/sandbox_connect.pyc matches Binary file /usr/share/setroubleshoot/plugins/sandbox_connect.pyo matches /usr/share/setroubleshoot/plugins/swapfile.py: signal a intrusion attempt. Binary file /usr/share/setroubleshoot/plugins/swapfile.pyc matches Binary file /usr/share/setroubleshoot/plugins/swapfile.pyo matches # # grep -R "tries modify" /usr/share/setroubleshoot/plugins/* /usr/share/setroubleshoot/plugins/mmap_zero.py: for them. If a compromised application tries modify the kernel this AVC Binary file /usr/share/setroubleshoot/plugins/mmap_zero.pyc matches Binary file /usr/share/setroubleshoot/plugins/mmap_zero.pyo matches # # grep -R "be a mislabeled" /usr/share/setroubleshoot/plugins/* /usr/share/setroubleshoot/plugins/openvpn.py: be a mislabeled. openvpn is allowed to read content in home directory if it Binary file /usr/share/setroubleshoot/plugins/openvpn.pyc matches Binary file /usr/share/setroubleshoot/plugins/openvpn.pyo matches /usr/share/setroubleshoot/plugins/restorecon.py: be a mislabeled. $TARGET_PATH default SELinux type is Binary file /usr/share/setroubleshoot/plugins/restorecon.pyc matches Binary file /usr/share/setroubleshoot/plugins/restorecon.pyo matches /usr/share/setroubleshoot/plugins/restorecon_source.py: be a mislabeled. $SOURCE_PATH default SELinux type is Binary file /usr/share/setroubleshoot/plugins/restorecon_source.pyc matches Binary file /usr/share/setroubleshoot/plugins/restorecon_source.pyo matches /usr/share/setroubleshoot/plugins/sshd_root.py: be a mislabeled. sshd is allowed to read content in /root/.ssh directory if it Binary file /usr/share/setroubleshoot/plugins/sshd_root.pyc matches Binary file /usr/share/setroubleshoot/plugins/sshd_root.pyo matches #
Assigning to ljanda as requested in comment 12.
I believe this ticket can be closed as solved. I checked the concerned strings in Zanata. And after you have changes the English versions, it had no effect on translations. Which is good. I was able to find all concerned strings and all of them are correctly translated.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2018:0995