[Bug 1040179] [NEW] /tmp should be mounted with nodev, nosuid, and noexec
Fred
1040179 at bugs.launchpad.net
Wed Aug 22 16:53:37 UTC 2012
*** This bug is a security vulnerability ***
Public security bug reported:
The default configuration is insecure because /tmp/ and /var/tmp/ is
world-writable and can have files executed.
Temporary storage directories such as /tmp and /dev/shm potentially provide storage space for malicious exe-
cutables. Although mount options options cannot prevent interpreted code stored there from getting executed
by a program in another partition, using certain mount options can be disruptive to malicious code.
CCE 14412-1, 14940-1, 14927-8
** Affects: debian-installer (Ubuntu)
Importance: Undecided
Status: New
** Visibility changed to: Public
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to debian-installer in Ubuntu.
https://bugs.launchpad.net/bugs/1040179
Title:
/tmp should be mounted with nodev, nosuid, and noexec
Status in “debian-installer” package in Ubuntu:
New
Bug description:
The default configuration is insecure because /tmp/ and /var/tmp/ is
world-writable and can have files executed.
Temporary storage directories such as /tmp and /dev/shm potentially provide storage space for malicious exe-
cutables. Although mount options options cannot prevent interpreted code stored there from getting executed
by a program in another partition, using certain mount options can be disruptive to malicious code.
CCE 14412-1, 14940-1, 14927-8
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/debian-installer/+bug/1040179/+subscriptions
More information about the foundations-bugs
mailing list