Forge Home

dirtycow

SIMP module checking Dirty Cow Vulnerability

7,564 downloads

4,587 latest version

5.0 quality score

Version information

  • 1.0.5 (deleted)
  • 1.0.4 (latest)
  • 1.0.3
  • 1.0.2
released Nov 28th 2018
This version is compatible with:
  • Puppet Enterprise 2018.1.x, 2017.3.x, 2017.2.x, 2017.1.x, 2016.5.x, 2016.4.x
  • Puppet >= 4.7.0 < 6.0.0
  • , ,

Start using this module

  • r10k or Code Manager
  • Bolt
  • Manual installation
  • Direct download

Add this module to your Puppetfile:

mod 'simp-dirtycow', '1.0.4'
Learn more about managing modules with a Puppetfile

Add this module to your Bolt project:

bolt module add simp-dirtycow
Learn more about using this module with an existing project

Manually install this module globally with Puppet module tool:

puppet module install simp-dirtycow --version 1.0.4

Direct download is not typically how you would use a Puppet module to manage your infrastructure, but you may want to download the module in order to inspect the code.

Download
Tags: simp, dirtycow

Documentation

simp/dirtycow — version 1.0.4 Nov 28th 2018

License CII Best Practices Puppet Forge Puppet Forge Downloads Build Status

  1. Overview
  2. Usage - The basics of getting started with simp-dirtycow
  3. Development - Guide for contributing to the module

Overview

In October 2016, a privilege escalation vulnerability was discovered in the Linux kernel. It has been given the name "Dirty Cow" and assigned a Common Vulnerability and Exposures (CVE) number CVE-2016-5195.

This module checks your running kernel to determine if it is vulnerable to Dirty Cow. A puppet notice is logged if it is vulnerable.

Usage

Add the following to Hiera:

yaml
---
include 'dirtycow'

Development

Please see the SIMP Contribution Guidelines.

General developer documentation can be found on Confluence. Visit the project homepage on GitHub, chat with us on our HipChat, and look at our issues on JIRA.