Module to find dirty COW (cve-2016-5195) vulnerable kernels from facter




6,222 latest version

4.6 quality score

Version information

  • 0.2.1 (latest)
  • 0.1.1
  • 0.1.0
released Dec 28th 2016
This version is compatible with:
  • RedHat

Start using this module


nndhanasekaran/redhat_cve2016 — version 0.2.1 Dec 28th 2016


Table of Contents

  1. Overview
  2. Module Description - What the module does and why it is useful
  3. Setup - The basics of getting started with redhat_cve2016
  4. Usage - Configuration options and additional functionality
  5. Reference - An under-the-hood peek at what the module is doing and how
  6. Limitations - OS compatibility, etc.
  7. Development - Guide for contributing to the module


Module will run RedHat provided script to find the Vulnerable kernel (Dirty COW) and report in facter.

Module Description

This module will run RedHat provided script ( to find the Dirty COW vulnerable kernel and report in facter. This module will not patch the vulnerable kernel, it just report whether kernel vulnerable or not and report in facter. Facter can be verified using "facter -p kernelstatus"


Just install the module and assign to profiles/roles or directly on site.pp.

What redhat_cve2016 affects

  • redhat_cve2016 class will copy the script to /tmp
  • kernelstatus facter will execute the script and report the output in facter.
  • we can verify the facter in any supporting web interfaces or command (facter -p kernelstatus)

Setup Requirements.

It is simple module, not required any setup.

Beginning with redhat_cve2016

class { 'redhat_cve2016' : } 


No special variables. To get the status of kernels,

include redhat_cve2016

To remove this module,

Directly edit the redhat_cve2016.pp file in the module and make sure ensure is absent and remove the kernelstatus.rb file from the facter. This will remove the script and facter from your puppet nodes.



RedHat/CentOS 5, 6 & 7