- Usage - The basics of getting started with simp-dirtycow
- Development - Guide for contributing to the module
In October 2016, a privilege escalation vulnerability was discovered in the Linux kernel. It has been given the name "Dirty Cow" and assigned a Common Vulnerability and Exposures (CVE) number CVE-2016-5195.
This module checks your running kernel to determine if it is vulnerable to Dirty Cow. A puppet notice is logged if it is vulnerable.
Add the following to Hiera:
yaml --- include 'dirtycow'
Please see the SIMP Contribution Guidelines.
- Tue Mar 20 2018 Trevor Vaughan firstname.lastname@example.org - 1.0.4-0
- Added support for OEL and Puppet 5
- Thu Jul 06 2017 Liz Nemsick email@example.com - 1.0.3-0
- Confine puppet version in metadata.json
- Fri Mar 17 2017 Ralph Wright firstname.lastname@example.org - 1.0.2-0
- Updated Gemfiles, travis yaml
- Mon Oct 31 2016 Ralph Wright email@example.com - 1.0.0-0
- Initial Dirty Cow Module
- Notify if the running kernel is vulnerable to Dirty Cow