The SELinux guest_t user mapping does not prevent the user from running sudo with the SELinux boolean selinuxuser_use_ssh_chroot set to on!
Issue
- when setting the 'selinuxuser_use_ssh_chroot' boolean to 'on' implies, when the user does have a shell, it can become root with sudo.
Environment
- Red Hat Enterprise Linux (RHEL) 7
- selinux-policy
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.