Bug 1292318
Summary: | SELinux is preventing /usr/sbin/ip from mounton access on the directory /. | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Britt Houser <bhouser> | ||||
Component: | selinux-policy | Assignee: | Lukas Vrabec <lvrabec> | ||||
Status: | CLOSED ERRATA | QA Contact: | Milos Malik <mmalik> | ||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | 7.1 | CC: | bhouser, chricker, lvrabec, mgrepl, mmalik, plautrba, pvrabec, ssekidde | ||||
Target Milestone: | rc | ||||||
Target Release: | --- | ||||||
Hardware: | x86_64 | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | selinux-policy-3.13.1-80.el7 | Doc Type: | Bug Fix | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2016-11-04 02:26:23 UTC | Type: | Bug | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | |||||||
Bug Blocks: | 1301700 | ||||||
Attachments: |
|
Description
Britt Houser
2015-12-17 02:53:11 UTC
Created attachment 1106714 [details]
Output of sealert
Just for t-shooting, I also upgraded to rhel7.2 packaging, but still see the violation: # rpm -qa | grep selinux libselinux-python-2.2.2-6.el7.x86_64 libselinux-2.2.2-6.el7.x86_64 libselinux-utils-2.2.2-6.el7.x86_64 selinux-policy-3.13.1-60.el7.noarch docker-selinux-1.8.2-10.el7.x86_64 selinux-policy-targeted-3.13.1-60.el7.noarch Where is "ip netns exec $pid ip link set dev mgmt-in name mgmt" placed? Thank you. The "ip netns exec $pid ip link set dev mgmt-in name mgmt" command is executed outside of the container namespace. Is that what you're asking? Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2016-2283.html |