Forge Home

redhat_cve2016

Module to find dirty COW (cve-2016-5195) vulnerable kernels from facter

7,431 downloads

7,162 latest version

4.6 quality score

We run a couple of automated
scans to help you access a
module's quality. Each module is
given a score based on how well
the author has formatted their
code and documentation and
modules are also checked for
malware using VirusTotal.

Please note, the information below
is for guidance only and neither of
these methods should be considered
an endorsement by Puppet.

Support the Puppet Community by contributing to this module

You are welcome to contribute to this module by suggesting new features, currency updates, or fixes. Every contribution is valuable to help ensure that the module remains compatible with the latest Puppet versions and continues to meet community needs. Complete the following steps:

  1. Review the module’s contribution guidelines and any licenses. Ensure that your planned contribution aligns with the author’s standards and any legal requirements.
  2. Fork the repository on GitHub, make changes on a branch of your fork, and submit a pull request. The pull request must clearly document your proposed change.

For questions about updating the module, contact the module’s author.

Version information

  • 0.2.1 (latest)
  • 0.1.1
  • 0.1.0 (deleted)
released Dec 28th 2016
This version is compatible with:
  • ,

Start using this module

  • r10k or Code Manager
  • Bolt
  • Manual installation
  • Direct download

Add this module to your Puppetfile:

mod 'nndhanasekaran-redhat_cve2016', '0.2.1'
Learn more about managing modules with a Puppetfile

Add this module to your Bolt project:

bolt module add nndhanasekaran-redhat_cve2016
Learn more about using this module with an existing project

Manually install this module globally with Puppet module tool:

puppet module install nndhanasekaran-redhat_cve2016 --version 0.2.1

Direct download is not typically how you would use a Puppet module to manage your infrastructure, but you may want to download the module in order to inspect the code.

Download

Documentation

nndhanasekaran/redhat_cve2016 — version 0.2.1 Dec 28th 2016

redhat_cve2016

Table of Contents

  1. Overview
  2. Module Description - What the module does and why it is useful
  3. Setup - The basics of getting started with redhat_cve2016
  4. Usage - Configuration options and additional functionality
  5. Reference - An under-the-hood peek at what the module is doing and how
  6. Limitations - OS compatibility, etc.
  7. Development - Guide for contributing to the module

Overview

Module will run RedHat provided script to find the Vulnerable kernel (Dirty COW) and report in facter.

Module Description

This module will run RedHat provided script (rh-cve-2016-5195_3.sh) to find the Dirty COW vulnerable kernel and report in facter. This module will not patch the vulnerable kernel, it just report whether kernel vulnerable or not and report in facter. Facter can be verified using "facter -p kernelstatus"

Setup

Just install the module and assign to profiles/roles or directly on site.pp.

What redhat_cve2016 affects

  • redhat_cve2016 class will copy the script to /tmp
  • kernelstatus facter will execute the script and report the output in facter.
  • we can verify the facter in any supporting web interfaces or command (facter -p kernelstatus)

Setup Requirements.

It is simple module, not required any setup.

Beginning with redhat_cve2016

class { 'redhat_cve2016' : } 

Usage

No special variables. To get the status of kernels,

include redhat_cve2016

To remove this module,

Directly edit the redhat_cve2016.pp file in the module and make sure ensure is absent and remove the kernelstatus.rb file from the facter. This will remove the script and facter from your puppet nodes.

Reference

Limitations

RedHat/CentOS 5, 6 & 7

Development