1.1.2 Ensure /tmp is configured

Information

The /tmp directory is a world-writable directory used for temporary storage by all users and some applications.

Notes:

If an entry for /tmp exists in /etc/fstab it will take precedence over entries in the tmp.mount file.

tmpfs can be resized using the size={size} parameter in /etc/fstab or on the Options line in the tmp.mount file. If we don't specify the size, it will be half the RAM.

Resize tmpfs examples:

/etc/fstab

tmpfs /tmp tmpfs rw,noexec,nodev,nosuid,size=2G 0 0

tmp.mount

[Mount]

What=tmpfs

Where=/tmp

Type=tmpfs

Options=mode=1777,strictatime,size=2G,noexec,nodev,nosuid




Rationale:

Making /tmp its own file system allows an administrator to set the noexec option on the mount, making /tmp useless for an attacker to install executable code. It would also prevent an attacker from establishing a hardlink to a system setuid program and wait for it to be updated. Once the program was updated, the hardlink would be broken and the attacker would have his own copy of the program. If the program happened to have a security vulnerability, the attacker could continue to exploit the known flaw.

This can be accomplished by either mounting tmpfs to /tmp, or creating a separate partition for /tmp.

Impact:

Since the /tmp directory is intended to be world-writable, there is a risk of resource exhaustion if it is not bound to a separate partition.

Running out of /tmp space is a problem regardless of what kind of filesystem lies under it, but in a default installation a disk-based /tmp will essentially have the whole disk available, as it only creates a single / partition. On the other hand, a RAM-based /tmp as with tmpfs will almost certainly be much smaller, which can lead to applications filling up the filesystem much more easily.

Solution

Create or update an entry for /tmp in either /etc/fstab OR in a systemd tmp.mount file:
If /etc/fstab is used:

Configure /etc/fstab as appropriate.

Example:
tmpfs/tmptmpfs defaults,rw,nosuid,nodev,noexec,relatime 0 0

Run the following command to remount /tmp

# mount -o remount,noexec,nodev,nosuid /tmp

OR
If systemd tmp.mount file is used:

Run the following command to create the file /etc/systemd/system/tmp.mount if it doesn't exist:

# [ ! -f /etc/systemd/system/tmp.mount ] && cp -v /usr/lib/systemd/system/tmp.mount /etc/systemd/system/

Edit the file /etc/systemd/system/tmp.mount:

[Mount]
What=tmpfs
Where=/tmp
Type=tmpfs
Options=mode=1777,strictatime,noexec,nodev,nosuid

Run the following command to reload the systemd daemon:

# systemctl daemon-reload

Run the following command to unmask tmp.mount:

# systemctl unmask tmp.mpunt

Run the following command to enable and start tmp.mount:

# systemctl enable --now tmp.mount

See Also

https://workbench.cisecurity.org/files/2925

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(10), 800-53|SC-7(12), CSCv7|9.4, CSCv7|13

Plugin: Unix

Control ID: a866e88c6eaf276d3b356bad601ff41a77e645508b5cfae00575084ca15ce8a4