Check: RHEL-06-000528
Red Hat Enterprise Linux 6 STIG:
RHEL-06-000528
(in versions v2 r2 through v1 r14)
Title
The noexec option must be added to the /tmp partition. (Cat II impact)
Discussion
Allowing users to execute binaries from world-writable directories such as "/tmp" should never be necessary in normal operation and can expose the system to potential compromise.
Check Content
To verify that binaries cannot be directly executed from the /tmp directory, run the following command: $ grep '\s/tmp' /etc/fstab The resulting output will show whether the /tmp partition has the "noexec" flag set. If the /tmp partition does not have the noexec flag set, this is a finding.
Fix Text
The "noexec" mount option can be used to prevent binaries from being executed out of "/tmp". Add the "noexec" option to the fourth column of "/etc/fstab" for the line which controls mounting of "/tmp".
Additional Identifiers
Rule ID: SV-218106r603264_rule
Vulnerability ID: V-218106
Group Title: SRG-OS-000095
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000381 |
Configure the system to provide only organization-defined mission essential capabilities. |
Controls
Number | Title |
---|---|
CM-7 |
Least Functionality |