| Summary: | guest_t can run sudo | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | Stefan Kremen <skremen> | |
| Component: | openssh | Assignee: | Jakub Jelen <jjelen> | |
| Status: | CLOSED NOTABUG | QA Contact: | Stefan Dordevic <sdordevi> | |
| Severity: | high | Docs Contact: | ||
| Priority: | high | |||
| Version: | 6.8 | CC: | jjelen, ksrot, lvrabec, mgrepl, mmalik, nmavrogi, plautrba, pvrabec, qe-baseos-security, skremen, szidek | |
| Target Milestone: | rc | |||
| Target Release: | --- | |||
| Hardware: | All | |||
| OS: | Linux | |||
| Whiteboard: | ||||
| Fixed In Version: | Doc Type: | If docs needed, set a value | ||
| Doc Text: | Story Points: | --- | ||
| Clone Of: | 1357859 | |||
| : | 1378463 (view as bug list) | Environment: | ||
| Last Closed: | 2016-11-02 12:00:55 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Bug Depends On: | 1356245, 1357857, 1357859, 1357860 | |||
| Bug Blocks: | 1378463 | |||
|
Comment 7
Jakub Jelen
2016-09-29 08:34:33 UTC
Jakub is right. We should fix this in RHEL-6. Based on our meeting with Lukas yesterday, we decided to fix this bug only in selinux-policy and therefore this is not bug in OpenSSH. The openssh in RHEL6 is using special selinux user chroot_user_t which has the permissions to chroot, setuid and setgit permissions. On the other hand the guest_t users do not need the setuid and setgit permissions, therefore they will be removed based on the selinux-policy bug. |