Securing /tmp and shm partitions

Securing /tmp and /dev/shm is a nice practice.  Lots of programs and scripts have access in there. So you don’t want code, malicious or not to run in there, trying to get root permissions or snoop on you.

Temporary storage directories such as /tmp, /var/tmp and /dev/shm provide storage space for malicious executables.
Crackers and hackers store executables in /tmp. Malicious users can use temporary storage directories to execute unwanted program and crack your server.

First because I forget, let’s bind /var/tmp to /tmp in /etc/fstab

Now we deal with /tmp only.

Update 28/03/2015: That practice was for many unstable and criticized also by many. Unfortunately for them, I was vindicated when even OpenBSD in the upcoming version does the same for the very same reasons. Security.

Security improvements:

  • /var/tmp is now a symbolic link to /tmp, as a first step towards reducing the “fill it up” attack surface against the /var partition.


If it’s a separate partition we only need a

If it’s not, we will create an image for it. The example is for 4GB, tune it as you like.

Modify /tmp line as follows:

You should to the same for shm:


Edit your /etc/fstab:
# nano /etc/fstab

“none /dev/shm tmpfs defaults,rw 0 0” to
“none /dev/shm tmpfs defaults,nosuid,noexec,rw 0 0”

Remount /dev/shm:
# mount -o remount /dev/shm
It should be fine now.

0 (0)
Article Rating (No Votes)
Rate this article
There are no attachments for this article.
There are no comments for this article. Be the first to post a comment.
Full Name
Email Address
Security Code Security Code
Related Articles RSS Feed
Secure NTP with NTS
Viewed 115 times since Sun, Dec 6, 2020
RHCS6: Luci - the cluster management console
Viewed 1179 times since Sun, Jun 3, 2018
LVM: Move allocated PE between Physical Volumes
Viewed 1305 times since Sat, Jun 2, 2018
RHEL: Getting/Setting hardware clock’s time
Viewed 1220 times since Sat, Jun 2, 2018
Using Official Redhat DVD as repository
Viewed 1010 times since Mon, Oct 29, 2018
How to disable SSH cipher/ MAC algorithms for Linux and Unix
Viewed 2918 times since Fri, Aug 21, 2020
Exclude multiple files and directories with rsync
Viewed 678 times since Wed, Oct 31, 2018
RHEL: Bonding network interfaces
Viewed 1315 times since Sat, Jun 2, 2018
“Too many authentication failures” with SSH
Viewed 2617 times since Mon, May 21, 2018
SSH ProxyCommand example: Going through one host to reach another server
Viewed 3193 times since Tue, Aug 6, 2019