Description of problem: Version-Release number of selected component (if applicable): rkt-1.25.0-3.gitd2d35e0.fc27.x86_64 selinux-policy-3.13.1-283.16.fc27.noarch selinux-policy-targeted-3.13.1-283.16.fc27.noarch How reproducible: * always Steps to Reproduce: 1. get a Fedora27 machine (targeted policy is active) 2. start the rkt-metadata service 3. search for SELinux denials Actual results (enforcing mode): ---- type=AVC msg=audit(01/15/2018 11:00:25.956:436) : avc: denied { name_bind } for pid=21731 comm=rkt src=18112 scontext=system_u:system_r:rkt_t:s0 tcontext=system_u:object_r:rkt_port_t:s0 tclass=tcp_socket permissive=0 ---- Expected results: * no SELinux denials Additional info:
The same SELinux denial appears in permissive mode, nothing else.
selinux-policy-3.13.1-283.24.fc27 has been submitted as an update to Fedora 27. https://bodhi.fedoraproject.org/updates/FEDORA-2018-a144eca5a8
selinux-policy-3.13.1-283.24.fc27 has been pushed to the Fedora 27 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2018-a144eca5a8
selinux-policy-3.13.1-283.24.fc27 has been pushed to the Fedora 27 stable repository. If problems still persist, please make note of it in this bug report.