[Bug 1040179] [NEW] /tmp should be mounted with nodev, nosuid, and noexec

Fred 1040179 at bugs.launchpad.net
Wed Aug 22 16:53:37 UTC 2012


*** This bug is a security vulnerability ***

Public security bug reported:

The default configuration is insecure because /tmp/ and /var/tmp/ is
world-writable and can have files executed.

Temporary storage directories such as /tmp and /dev/shm potentially provide storage space for malicious exe-
cutables. Although mount options options cannot prevent interpreted code stored there from getting executed
by a program in another partition, using certain mount options can be disruptive to malicious code.

CCE 14412-1, 14940-1, 14927-8

** Affects: debian-installer (Ubuntu)
     Importance: Undecided
         Status: New

** Visibility changed to: Public

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to debian-installer in Ubuntu.
https://bugs.launchpad.net/bugs/1040179

Title:
  /tmp should be mounted with nodev, nosuid, and noexec

Status in “debian-installer” package in Ubuntu:
  New

Bug description:
  The default configuration is insecure because /tmp/ and /var/tmp/ is
  world-writable and can have files executed.

  Temporary storage directories such as /tmp and /dev/shm potentially provide storage space for malicious exe-
  cutables. Although mount options options cannot prevent interpreted code stored there from getting executed
  by a program in another partition, using certain mount options can be disruptive to malicious code.

  CCE 14412-1, 14940-1, 14927-8

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/debian-installer/+bug/1040179/+subscriptions




More information about the foundations-bugs mailing list