- Overview
- Usage - The basics of getting started with simp-dirtycow
- Development - Guide for contributing to the module
In October 2016, a privilege escalation vulnerability was discovered in the Linux kernel. It has been given the name "Dirty Cow" and assigned a Common Vulnerability and Exposures (CVE) number CVE-2016-5195.
This module checks your running kernel to determine if it is vulnerable to Dirty Cow. A puppet notice is logged if it is vulnerable.
Add the following to Hiera:
yaml
---
include 'dirtycow'
Please see the SIMP Contribution Guidelines.
General developer documentation can be found on Confluence. Visit the project homepage on GitHub, chat with us on our HipChat, and look at our issues on JIRA.