Information
Set nosuid on removable media to prevent setuid and setgid executable files that are on
that media from being executed as setuid and setgid.
*Rationale*
Setting this option on a file system prevents users from introducing privileged programs
onto the system and allowing non-root users to execute them.
Solution
Edit the /etc/fstab file and add nosuid to the fourth field (mounting options). Look for
entries that have mount points that contain words such as floppy or cdrom. See the
fstab(5) manual page for more information.