Bug 1331786 - typo errors in various plugins
Summary: typo errors in various plugins
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: setroubleshoot-plugins
Version: 6.7
Hardware: All
OS: Linux
low
low
Target Milestone: rc
: ---
Assignee: Petr Lautrbach
QA Contact: Dalibor Pospíšil
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-04-29 13:42 UTC by Milos Malik
Modified: 2016-11-07 15:09 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of: 1331780
Environment:
Last Closed: 2016-11-07 15:09:08 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description Milos Malik 2016-04-29 13:42:34 UTC
+++ This bug was initially created as a clone of Bug #1331780 +++

Description of problem - incorrect English words or collocations:
compromized -> compromised
signal a intrusion -> signal an intrusion
be a mislabeled -> be mislabeled
tries modify -> tries to modify

Version-Release number of selected component (if applicable):
setroubleshoot-plugins-3.0.40-2.el6.noarch
setroubleshoot-server-3.0.47-9.1.el6.i686

How reproducible:
always

Steps to Reproduce:
# cd /usr/share/setroubleshoot/plugins/
# grep -R "compromized" *.py
allow_execmod.py:    application is compromized or not.  This could be a serious issue. Your 
allow_execmod.py:setroubleshoot examined '$FIX_TARGET_PATH' to make sure it was built correctly, but can not determine if this application has been compromized.  This alert could be a serious issue and your system could be compromised.
# grep -R "a intrusion" *.py
connect_ports.py:    to connect to $PORT_NUMBER, this could signal a intrusion attempt.
httpd_can_sendmail.py:    signal a intrusion attempt.
rsync_data.py:    it could indicate either a bug or it could signal a intrusion attempt.
samba_share.py:    it could indicate either a bug or it could signal a intrusion attempt.
swapfile.py:    signal a intrusion attempt.
# grep -R "be a mislabeled" *.py
openvpn.py:    be a mislabeled. openvpn is allowed to read content in home directory if it 
restorecon.py:    be a mislabeled.  $TARGET_PATH default SELinux type is
sshd_root.py:    be a mislabeled. sshd is allowed to read content in /root/.ssh directory if it 
# grep -R "tries modify" *.py
mmap_zero.py:    for them.  If a compromised application tries modify the kernel this AVC 
#

Expected results:
* typo errors are gone

Comment 2 Petr Lautrbach 2016-11-07 15:09:08 UTC
Red Hat Enterprise Linux version 6X is in the Production 2 phase of its lifetime and this bug doesn't meet the criteria for it, i.e. only high severity issues will be fixed. Please see https://access.redhat.com/support/policy/updates/errata/ for further information.


Note You need to log in before you can comment on or make changes to this bug.