Mitigates CVE-2016-5195 aka DirtyCOW# Ansible Role: CVE
[](https://galaxy.ansible.com/pgporada/cve/)
[](LICENSE)
This role mitigates/patches the defined CVEs.
- - - -
# Role Variables
Dirty COW vuln. http://dirtycow.ninja. Defaults to false. This mitigation will need to be run everytime the server it has been applied on restarts.
cve_2016_5195: false
- - - -
# Example Playbook
```
---
- hosts: localhost
connection: local
become: true
become_method: sudo
vars:
cve_2016_5195: true
roles:
- ../ansible-role-cve
```
- - - -
# How to hack away at this role
Before submitting a PR, please create a test and run it through test-kitchen.
```
git clone git@github.com:pgporada/ansible-role-cve.git
bundle install
bundle exec kitchen create
bundle exec kitchen converge
bundle exec kitchen verify
bundle exec kitchen destroy
```
- - - -
# Author Information
Phil Porada
- - - -
# License
MIT
(c) 2016 GreenLancer.com
[4.0K] /data/pocs/99226c72edd53ae9278f708472a6001d63bc8c87
├── [2.2K] bumpver.sh
├── [ 859] CHANGES
├── [4.0K] defaults
│ └── [ 25] main.yml
├── [4.0K] files
│ └── [4.0K] CVE-2016-5195
│ └── [ 275] CVE-2016-5195.stap
├── [ 112] Gemfile
├── [1.1K] LICENSE
├── [4.0K] meta
│ └── [ 352] main.yml
├── [ 141] playbook.yml
├── [1.0K] README.md
├── [4.0K] tasks
│ ├── [1.5K] CVE-2016-5195.yml
│ └── [ 260] main.yml
├── [4.0K] test
│ └── [4.0K] integration
│ └── [4.0K] default
│ ├── [4.0K] bats
│ │ └── [ 280] 99_idempotence.bats
│ └── [ 92] default.yml
└── [ 6] VERSION
9 directories, 14 files