Information
The noexec mount option specifies that the filesystem cannot contain executable binaries.
Since the /var/tmp filesystem is only intended for temporary file storage, set this option to ensure that users cannot run executable binaries from /var/tmp.
Solution
- IF - a separate partition exists for /var/tmp.
Edit the /etc/fstab file and add noexec to the fourth field (mounting options) for the /var/tmp partition.
Example:
<device> /var/tmp <fstype> defaults,rw,nosuid,nodev,noexec,relatime 0 0
Run the following command to remount /var/tmp with the configured options:
# mount -o remount /var/tmp
Item Details
Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION
References: 800-53|AC-3, 800-53|AC-5, 800-53|AC-6, 800-53|CM-7(2), 800-53|MP-2, CAT|II, CSCv7|14.6, Rule-ID|SV-230522r854063_rule, Vuln-ID|V-230522
Control ID: 30732c4a4a9adc0ef890aef19e9435fbf37114a05d304bf92ef5953f568b9393