Version information
released Nov 28th 2018
This version is compatible with:
- Puppet Enterprise 2018.1.x, 2017.3.x, 2017.2.x, 2017.1.x, 2016.5.x, 2016.4.x
- Puppet >= 4.7.0 < 6.0.0
- , ,
Start using this module
Add this module to your Puppetfile:
mod 'simp-dirtycow', '1.0.4'
Learn more about managing modules with a PuppetfileDocumentation
simp/dirtycow — version 1.0.4 Nov 28th 2018
- Overview
- Usage - The basics of getting started with simp-dirtycow
- Development - Guide for contributing to the module
Overview
In October 2016, a privilege escalation vulnerability was discovered in the Linux kernel. It has been given the name "Dirty Cow" and assigned a Common Vulnerability and Exposures (CVE) number CVE-2016-5195.
This module checks your running kernel to determine if it is vulnerable to Dirty Cow. A puppet notice is logged if it is vulnerable.
Usage
Add the following to Hiera:
yaml
---
include 'dirtycow'
Development
Please see the SIMP Contribution Guidelines.
General developer documentation can be found on Confluence. Visit the project homepage on GitHub, chat with us on our HipChat, and look at our issues on JIRA.
- Tue Mar 20 2018 Trevor Vaughan tvaughan@onyxpoint.com - 1.0.4-0
- Added support for OEL and Puppet 5
- Thu Jul 06 2017 Liz Nemsick lnemsick.simp@gmail.com - 1.0.3-0
- Confine puppet version in metadata.json
- Fri Mar 17 2017 Ralph Wright rwright@onyxpoint.com - 1.0.2-0
- Updated Gemfiles, travis yaml
- Mon Oct 31 2016 Ralph Wright rwright@onyxpoint.com - 1.0.0-0
- Initial Dirty Cow Module
- Notify if the running kernel is vulnerable to Dirty Cow
Dependencies
- puppetlabs/stdlib (>= 4.9.0 < 5.0.0)
- simp/simplib (>= 3.1.0 < 4.0.0)