- Overview
- Module Description - What the module does and why it is useful
- Setup - The basics of getting started with redhat_cve2016
- Usage - Configuration options and additional functionality
- Reference - An under-the-hood peek at what the module is doing and how
- Limitations - OS compatibility, etc.
- Development - Guide for contributing to the module
Module will run RedHat provided script to find the Vulnerable kernel (Dirty COW) and report in facter.
This module will run RedHat provided script (rh-cve-2016-5195_3.sh) to find the Dirty COW vulnerable kernel and report in facter. This module will not patch the vulnerable kernel, it just report whether kernel vulnerable or not and report in facter. Facter can be verified using "facter -p kernelstatus"
Just install the module and assign to profiles/roles or directly on site.pp.
- redhat_cve2016 class will copy the script to /tmp
- kernelstatus facter will execute the script and report the output in facter.
- we can verify the facter in any supporting web interfaces or command (facter -p kernelstatus)
It is simple module, not required any setup.
class { 'redhat_cve2016' : }
No special variables. To get the status of kernels,
include redhat_cve2016
To remove this module,
Directly edit the redhat_cve2016.pp file in the module and make sure ensure is absent and remove the kernelstatus.rb file from the facter. This will remove the script and facter from your puppet nodes.
RedHat/CentOS 5, 6 & 7