redhat_cve2016
Version information
This version is compatible with:
- ,
Start using this module
Add this module to your Puppetfile:
mod 'nndhanasekaran-redhat_cve2016', '0.2.1'
Learn more about managing modules with a PuppetfileDocumentation
redhat_cve2016
Table of Contents
- Overview
- Module Description - What the module does and why it is useful
- Setup - The basics of getting started with redhat_cve2016
- Usage - Configuration options and additional functionality
- Reference - An under-the-hood peek at what the module is doing and how
- Limitations - OS compatibility, etc.
- Development - Guide for contributing to the module
Overview
Module will run RedHat provided script to find the Vulnerable kernel (Dirty COW) and report in facter.
Module Description
This module will run RedHat provided script (rh-cve-2016-5195_3.sh) to find the Dirty COW vulnerable kernel and report in facter. This module will not patch the vulnerable kernel, it just report whether kernel vulnerable or not and report in facter. Facter can be verified using "facter -p kernelstatus"
Setup
Just install the module and assign to profiles/roles or directly on site.pp.
What redhat_cve2016 affects
- redhat_cve2016 class will copy the script to /tmp
- kernelstatus facter will execute the script and report the output in facter.
- we can verify the facter in any supporting web interfaces or command (facter -p kernelstatus)
Setup Requirements.
It is simple module, not required any setup.
Beginning with redhat_cve2016
class { 'redhat_cve2016' : }
Usage
No special variables. To get the status of kernels,
include redhat_cve2016
To remove this module,
Directly edit the redhat_cve2016.pp file in the module and make sure ensure is absent and remove the kernelstatus.rb file from the facter. This will remove the script and facter from your puppet nodes.
Reference
Limitations
RedHat/CentOS 5, 6 & 7