[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

243238

 
 

909

 
 

192833

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-90667-7

Platform: rhel7,centos7Date: (C)2017-06-29   (M)2022-10-10



Add nodev Option to /dev/shm The 'nodev' mount option can be used to prevent creation of device files in '/dev/shm'. Legitimate character and block devices should not exist within temporary directories like '/dev/shm'.


Parameter:


Technical Mechanism:

Add the 'nodev' option to the fourth column of '/etc/fstab' for the line which controls mounting of '/dev/shm'. Rationale: The only legitimate location for device files is the '/dev' directory located on the root partition. The only exception to this is chroot jails. Fix: No Remediation Info

CCSS Severity:CCSS Metrics:
CCSS Score : Attack Vector:
Exploit Score: Attack Complexity:
Impact Score: Privileges Required:
Severity: User Interaction:
Vector: Scope:
 Confidentiality:
 Integrity:
 Availability:
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:30358
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:31081


OVAL    2
oval:org.secpod.oval:def:30358
oval:org.secpod.oval:def:31081

© SecPod Technologies