InformationThe nosuid mount option specifies that the /dev/shm (temporary filesystem stored in memory) will not execute setuid and setgid on executable programs as such, but rather execute them with the uid and gid of the user executing the program.
Setting this option on a file system prevents users from introducing privileged programs onto the system and allowing non-root users to execute them.
SolutionEdit the /etc/fstab file and add nosuid to the fourth field (mounting options). Look for entries that have mount points that contain /dev/shm. See the fstab(5) manual page for more information.
# mount -o remount,nosuid /dev/shm
OS Default: N/A