1.91 RHEL-09-231120

Information

RHEL 9 must mount /dev/shm with the nosuid option.

GROUP ID: V-257865
RULE ID: SV-257865r1044946

The "nosuid" mount option causes the system to not execute "setuid" and "setgid" files with owner privileges. This option must be used for mounting any file system not containing approved "setuid" and "setguid" files. Executing files from untrusted file systems increases the opportunity for nonprivileged users to attain unauthorized administrative access.

Solution

Modify "/etc/fstab" to use the "nosuid" option on the "/dev/shm" file system.

See Also

https://workbench.cisecurity.org/benchmarks/22008

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7(2), CAT|II, CCI|CCI-001764, Rule-ID|SV-257865r1044946_rule, STIG-ID|RHEL-09-231120, Vuln-ID|V-257865

Plugin: Unix

Control ID: 6e02de1a85097c757d9a4e1aaa67407c43dcfa97b6a81fde545b808e621d53c0