3rd Update:
Per Hello71:
# mount | grep /tmp
# mount | grep -w '/'
/dev/mapper/vg_svr-tap-lv_root on / type ext4 (rw)
Answers to Gilles' questions:
Is this something you read about in a book, or did you reach this situation on a real machine?
Noticed this while performing a lab in a book on a real machine.
Is SELinux in use?
# sestatus
SELinux status: enabled
SELinuxfs mount: /selinux
Current mode: enforcing
Mode from config file: enforcing
Policy version: 24
Policy from config file: targeted
Some Linux-on-Linux virtualisation?
Yes. KVM/QEMU guest.
I second Hello71's request, except please grep /tmp /proc/mounts
Nothing matches.
Also env | grep '^LD_' please.
Nothing matches.
Oh, and can we rule out active attacks
Yes we can. I'm the only one that has access to this guest.