Ensure /dev/shm is configured
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Description
The /dev/shm
is a traditional shared memory concept.
One program will create a memory portion, which other processes
(if permitted) can access. If /dev/shm
is not configured,
tmpfs will be mounted to /dev/shm by systemd.
Rationale
Any user can upload and execute files inside the /dev/shm
similar to
the /tmp
partition. Configuring /dev/shm
allows an administrator
to set the noexec option on the mount, making /dev/shm useless for an attacker to
install executable code. It would also prevent an attacker from establishing a
hardlink to a system setuid program and wait for it to be updated. Once the program
was updated, the hardlink would be broken and the attacker would have his own copy
of the program. If the program happened to have a security vulnerability, the attacker
could continue to exploit the known flaw.
Warning
This rule does not have a remedation.
It is expected that this will be managed by systemd and will be a tmpfs partition.