<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.alpinelinux.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=MaxPeal</id>
	<title>Alpine Linux - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.alpinelinux.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=MaxPeal"/>
	<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/wiki/Special:Contributions/MaxPeal"/>
	<updated>2026-04-25T16:47:02Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.40.0</generator>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=Cvechecker&amp;diff=20170</id>
		<title>Cvechecker</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=Cvechecker&amp;diff=20170"/>
		<updated>2021-10-05T14:43:03Z</updated>

		<summary type="html">&lt;p&gt;MaxPeal: update config urls form https://rawgit.com/sjvermeu/cvechecker/master/docs/userguide.html&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Draft}}&lt;br /&gt;
&lt;br /&gt;
[https://github.com/sjvermeu/cvechecker/wiki cvechecker] is an useful tool which helps to compare packeges installed in your distribution with the Common Vulnerabilities Exposure. Is not a bullet-proof method and you will most likely have many false positives (vulnerability is fixed with a revision-release, but the tool isn’t able to detect the revision itself), yet it is still better than nothing. The idea is to automatize security check. But, clearly, this is not (and must not be) the only way to check security. With the proper reporting in place, you are immediately warned when a new CVE has been released that might match your system. You can then take the appropriate steps (acknowledge report, verify incident, fix package or mark as false positive).&lt;br /&gt;
Those are the steps:&lt;br /&gt;
* pull in the latest CVE entries as well as software/version detection rules (Adminsitrative task only)&lt;br /&gt;
* generate a list of files to scan&lt;br /&gt;
* gather installed software/version information&lt;br /&gt;
* output which CVE entries might affect your system&lt;br /&gt;
* generate a report informing you about the CVE entries&lt;br /&gt;
&lt;br /&gt;
== Installation ==&lt;br /&gt;
cvechecker is available in edge main repo. If you are running a stable version of alpine, you can add the package from edge in this way:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|apk install cvechecker}}&lt;br /&gt;
&lt;br /&gt;
== Configuration with sqlite ==&lt;br /&gt;
CVEChecker&#039;s installation scripts create an user and a group, both called &amp;quot;cvechecker&amp;quot;, in order to have a user with minimum privileges to run cvechecker.&lt;br /&gt;
In this folder cvechecker will creates the database (according with the cvechecker.conf, we use sqlite3. But also mysql is supported. This could be useful if you want to share only one DB with many routers/servers running Alpine)&lt;br /&gt;
&lt;br /&gt;
Before use cvechecker you should configure cvechecker to use sqlite, then populate the DB with cve entries.&lt;br /&gt;
According with our settings, /etc/cvechecker.conf would looks like:&lt;br /&gt;
&lt;br /&gt;
     # Generic settings&lt;br /&gt;
     # &lt;br /&gt;
     dbtype = &amp;quot;sqlite&amp;quot;; &lt;br /&gt;
     #dbtype=&amp;quot;mysql&amp;quot;;&lt;br /&gt;
     cvecache = &amp;quot;/var/cvechecker/cache&amp;quot;;&lt;br /&gt;
     datadir = &amp;quot;/usr/share/cvechecker&amp;quot;;&lt;br /&gt;
     stringcmd = &amp;quot;/usr/bin/strings -n 3 &#039;@file@&#039;&amp;quot;;&lt;br /&gt;
     version_url = &amp;quot;https://raw.github.com/sjvermeu/cvechecker/master/versions.dat&amp;quot;;&lt;br /&gt;
     #userkey = &amp;quot;servertag&amp;quot;;&lt;br /&gt;
     #&lt;br /&gt;
     # For Sqlite3&lt;br /&gt;
     #&lt;br /&gt;
     sqlite3: {&lt;br /&gt;
       localdb = &amp;quot;/var/cvechecker/local&amp;quot;;&lt;br /&gt;
       globaldb = &amp;quot;/var/cvechecker/global.db&amp;quot;;&lt;br /&gt;
     };&lt;br /&gt;
     # &lt;br /&gt;
     # For MySQL&lt;br /&gt;
     # &lt;br /&gt;
     mysql: {&lt;br /&gt;
       dbname = &amp;quot;cvechecker&amp;quot;;&lt;br /&gt;
       dbuser = &amp;quot;cvechecker&amp;quot;;&lt;br /&gt;
       dbpass = &amp;quot;cvecheckpass&amp;quot;;&lt;br /&gt;
       dbhost = &amp;quot;$IPADDRESS_OF_MYSQL_SERVER&amp;quot;;&lt;br /&gt;
     };&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now, you can initialize the DB with:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|cvechecker -i}}&lt;br /&gt;
&lt;br /&gt;
DB is ready.&lt;br /&gt;
Now, we should configure cvechecker to use mysql then populate the DB with cve entries.&lt;br /&gt;
&lt;br /&gt;
== Configuration with MySQL ==&lt;br /&gt;
&lt;br /&gt;
MySQL is another backend that cvechecker is able to use. Could be useful if you have several cvechecker installed in your network. In that way, you have only one &amp;quot;repository&amp;quot; of CVEs that needs to be updated.&lt;br /&gt;
&lt;br /&gt;
{{Cmd|apk add mysql mysql-client&lt;br /&gt;
/etc/init.d/mysql setup&lt;br /&gt;
/etc/init.d/mysql start &amp;amp;&amp;amp; rc-update add mysql default&lt;br /&gt;
/usr/bin/mysqladmin -u root password &#039;new-password&#039;}}&lt;br /&gt;
&lt;br /&gt;
create a db user for cvechecker:&lt;br /&gt;
{{Cmd|mysql -u root -p&lt;br /&gt;
mysql&amp;gt;CREATE DATABASE cvechecker;&lt;br /&gt;
mysql&amp;gt;CREATE USER &#039;cvechecker&#039;@&#039;%&#039; IDENTIFIED BY &#039;cvecheckpass&#039;;&lt;br /&gt;
mysql&amp;gt;GRANT ALL ON cvechecker.* TO &#039;cvechecker&#039;@&#039;localhost&#039;;&lt;br /&gt;
mysql&amp;gt;GRANT ALL ON cvechecker.* TO &#039;cvechecker&#039;@&#039;%&#039;;&lt;br /&gt;
mysql&amp;gt;FLUSH PRIVILEGES;}}&lt;br /&gt;
&lt;br /&gt;
I set % because the DB and the users should allow access from other hosts. You can restrict this to allow only your domain.&lt;br /&gt;
&lt;br /&gt;
You have two way to create tables into DB:&lt;br /&gt;
&lt;br /&gt;
=== Via .sql script ===&lt;br /&gt;
&lt;br /&gt;
Login as cvechecker into mysql:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|mysql -D cvechecker -u cvechecker -p &lt;br /&gt;
mysql&amp;gt;source /usr/share/cvechecker/mysql_cvechecker.sql;}}&lt;br /&gt;
&lt;br /&gt;
DB is ready.&lt;br /&gt;
Now, we should configure cvechecker to use mysql then populate the DB with cve entries.&lt;br /&gt;
&lt;br /&gt;
=== Via cvechecker ===&lt;br /&gt;
&lt;br /&gt;
After you configured the DB, you can create tables with:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|cvechecker -i}}&lt;br /&gt;
&lt;br /&gt;
But in order to make it works, you have to configure DB settings in cvechecker.conf.&lt;br /&gt;
According with our settings, /etc/cvechecker.conf would looks like:&lt;br /&gt;
&lt;br /&gt;
     # Generic settings&lt;br /&gt;
     # &lt;br /&gt;
     #dbtype = &amp;quot;sqlite&amp;quot;; &lt;br /&gt;
     dbtype=&amp;quot;mysql&amp;quot;;&lt;br /&gt;
     cvecache = &amp;quot;/var/cvechecker/cache&amp;quot;;&lt;br /&gt;
     datadir = &amp;quot;/usr/share/cvechecker&amp;quot;;&lt;br /&gt;
     stringcmd = &amp;quot;/usr/bin/strings -n 3 &#039;@file@&#039;&amp;quot;;&lt;br /&gt;
     version_url = &amp;quot;https://raw.github.com/sjvermeu/cvechecker/master/versions.dat&amp;quot;;&lt;br /&gt;
     #userkey = &amp;quot;servertag&amp;quot;;&lt;br /&gt;
     #&lt;br /&gt;
     # For Sqlite3&lt;br /&gt;
     #&lt;br /&gt;
     sqlite3: {&lt;br /&gt;
       localdb = &amp;quot;/var/cvechecker/local&amp;quot;;&lt;br /&gt;
       globaldb = &amp;quot;/var/cvechecker/global.db&amp;quot;;&lt;br /&gt;
     };&lt;br /&gt;
     # &lt;br /&gt;
     # For MySQL&lt;br /&gt;
     # &lt;br /&gt;
     mysql: {&lt;br /&gt;
       dbname = &amp;quot;cvechecker&amp;quot;;&lt;br /&gt;
       dbuser = &amp;quot;cvechecker&amp;quot;;&lt;br /&gt;
       dbpass = &amp;quot;cvecheckpass&amp;quot;;&lt;br /&gt;
       dbhost = &amp;quot;$IPADDRESS_OF_MYSQL_SERVER&amp;quot;;&lt;br /&gt;
     };&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE:&#039;&#039;&#039;&lt;br /&gt;
Running cvechecker -i (initialize database) it removes ALL entries in the DB.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Using CVEChecker ===&lt;br /&gt;
&lt;br /&gt;
After the db is created, you have to pull the necessary data from the Internet:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|pullcves pull}}&lt;br /&gt;
&lt;br /&gt;
According with the manual, &amp;quot;This will take a very long time, so please be patient (loading over half a million CVE entries in a database is a time consuming - but one-time - activity). &lt;br /&gt;
Future pulls will not take this much time as they will not redownload the CVE entries from all previous years (unless you ask it to).&amp;quot;&lt;br /&gt;
&lt;br /&gt;
(If you&#039;re behind a proxy, you should set it from env variable or with wget.rc)&lt;br /&gt;
&lt;br /&gt;
Could be useful to crontab this task, maybe every day. Become the cvecheker user and run &amp;quot;crontab -e&amp;quot;.&lt;br /&gt;
Insert the following to run pullcves every day at 5:00 AM&lt;br /&gt;
&lt;br /&gt;
 *       5       *       *       *       /usr/bin/pullcves pull&lt;br /&gt;
&lt;br /&gt;
Now, make a list of executables file as well as /proc/version and allows cvechecker to verify if there are kernel-related CVE entries for your Linux kernel and software installed.&lt;br /&gt;
&lt;br /&gt;
{{Cmd|find / -type f -perm -o+x &amp;gt; /tmp/cvecheck.tmp&lt;br /&gt;
cat /proc/version &amp;gt;&amp;gt; /tmp/cvecheck.tmp}}&lt;br /&gt;
&lt;br /&gt;
Now, in /tmp/cvecheck.tmp you&#039;ll have all the binaries of your system with their version.&lt;br /&gt;
Check if there are cve with the following:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|cvechecker -b /tmp/cvecheck.tmp}}&lt;br /&gt;
          &lt;br /&gt;
If you want, you can create a report with the entries (if they are found):&lt;br /&gt;
&lt;br /&gt;
{{Cmd|cvechecker -r}}&lt;br /&gt;
&lt;br /&gt;
Simple script that helps to do it automatically. Copy and past it, save it as run_cvecheck.sh and give it exec permissions.&lt;br /&gt;
&lt;br /&gt;
     #!/bin/sh&lt;br /&gt;
     tempfile=/tmp/cvecheck.tmp&lt;br /&gt;
     EMAILADMIN=&amp;lt;%EMAIL ADDRESS USED FOR THIS TASK%&amp;gt;&lt;br /&gt;
     find / -type f -perm -o+x &amp;gt; $tempfile&lt;br /&gt;
     cat /proc/version &amp;gt;&amp;gt; $tempfile&lt;br /&gt;
     cvechecker -b $tempfile &amp;gt; /dev/null 2&amp;gt;&amp;amp;1 	# Run cvechecker against the software list&lt;br /&gt;
     cvechecker -r &amp;gt; $tempfile &amp;gt; /dev/null 2&amp;gt;&amp;amp;1	# Create a report &lt;br /&gt;
     if [ -s &amp;quot;$tempfile&amp;quot; ] ; then			# If exists and non-zero, send it via email	&lt;br /&gt;
      mail $EMAILADMIN -s &amp;quot;CVE Checker&amp;quot; &amp;lt; $tempfile	&lt;br /&gt;
     fi ;&lt;br /&gt;
     rm $tempfile&lt;br /&gt;
&lt;br /&gt;
{{Note|If you want to send emails, you have to add mailx and configure an smtp server (like ssmtp). But this information goes beyond the purpose of this doc.}}&lt;br /&gt;
&lt;br /&gt;
In order to make the last rows sent via email, you should configure an smtp server. Widely used is ssmtp. &lt;br /&gt;
Could be a good idea run this script as cronjob.&lt;br /&gt;
&lt;br /&gt;
So, you can do the same you did with pullcves: become the cvecheker user and run &amp;quot;crontab -e&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
 *       6       *       *       *       /var/cvechecker/run_cvecheck.sh&lt;br /&gt;
&lt;br /&gt;
=== Create Report ===&lt;br /&gt;
&lt;br /&gt;
CVEChecker generate reports in a CSV format.  Could be nice generate an html from this CSV.&lt;br /&gt;
&lt;br /&gt;
This is a sample script that uses csv2xml and cvereport.xsl (two scripts that comes with cvechecker) that allows the generation of html file starting by csv.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
     #!/bin/sh&lt;br /&gt;
     tempfile=/tmp/cvecheck.tmp&lt;br /&gt;
     EMAILADMIN=root@localhost&lt;br /&gt;
     WEBDIR=/var/www/localhost/htdocs/cvechecker/&lt;br /&gt;
     CONFFILE=/etc/cvechecker.conf&lt;br /&gt;
     DATADIR=$(awk -F&#039;=&#039; &#039;/^datadir/ {print $2}&#039; ${CONFFILE} | awk -F&#039;&amp;quot;&#039; &#039;{print $2}&#039;);&lt;br /&gt;
     find / -type f -perm -o+x &amp;gt; $tempfile&lt;br /&gt;
     cat /proc/version &amp;gt;&amp;gt; $tempfile&lt;br /&gt;
     cvechecker -b $tempfile &amp;gt; /dev/null 2&amp;gt;&amp;amp;1        # Run cvechecker against the software list&lt;br /&gt;
     if [ -s &amp;quot;$tempfile&amp;quot; ] ; then                    # If exists and non-zero, send it via email     &lt;br /&gt;
         mail $EMAILADMIN -s &amp;quot;CVE Checker&amp;quot; &amp;lt; $tempfile&lt;br /&gt;
     fi ;&lt;br /&gt;
     # Create Report. &lt;br /&gt;
     # FYI: acknowledgements.xml is an hard-coded file name.&lt;br /&gt;
     cvechecker -rC &amp;gt; $WEBDIR/report.csv&lt;br /&gt;
     awk -F, -f ${DATADIR}/csv2xml.awk $WEBDIR/report.csv &amp;gt; ${DATADIR}/acknowledgements.xml&lt;br /&gt;
     xsltproc ${DATADIR}/cvereport.xsl $DATADIR/acknowledgements.xml &amp;gt; ${WEBDIR}/report.html&lt;br /&gt;
     printf &amp;quot;done\n&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note&#039;&#039;&#039;: &lt;br /&gt;
the html generated is pretty ugly, because cvereport.xsl has hard-coded the css file which is stored in /usr/share/cvechecker dir. Filename is report.css&lt;br /&gt;
You can copy the report.css file into $WEBDIR in order to have a nicer html file.&lt;br /&gt;
&lt;br /&gt;
[[Category:Monitoring]]&lt;br /&gt;
[[Category:Security]]&lt;/div&gt;</summary>
		<author><name>MaxPeal</name></author>
	</entry>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=Cvechecker&amp;diff=20169</id>
		<title>Cvechecker</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=Cvechecker&amp;diff=20169"/>
		<updated>2021-10-05T14:37:27Z</updated>

		<summary type="html">&lt;p&gt;MaxPeal: http://cvechecker.sourceforge.net is moved to https://github.com/sjvermeu/cvechecker/wiki&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Draft}}&lt;br /&gt;
&lt;br /&gt;
[https://github.com/sjvermeu/cvechecker/wiki cvechecker] is an useful tool which helps to compare packeges installed in your distribution with the Common Vulnerabilities Exposure. Is not a bullet-proof method and you will most likely have many false positives (vulnerability is fixed with a revision-release, but the tool isn’t able to detect the revision itself), yet it is still better than nothing. The idea is to automatize security check. But, clearly, this is not (and must not be) the only way to check security. With the proper reporting in place, you are immediately warned when a new CVE has been released that might match your system. You can then take the appropriate steps (acknowledge report, verify incident, fix package or mark as false positive).&lt;br /&gt;
Those are the steps:&lt;br /&gt;
* pull in the latest CVE entries as well as software/version detection rules (Adminsitrative task only)&lt;br /&gt;
* generate a list of files to scan&lt;br /&gt;
* gather installed software/version information&lt;br /&gt;
* output which CVE entries might affect your system&lt;br /&gt;
* generate a report informing you about the CVE entries&lt;br /&gt;
&lt;br /&gt;
== Installation ==&lt;br /&gt;
cvechecker is available in edge main repo. If you are running a stable version of alpine, you can add the package from edge in this way:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|apk install cvechecker}}&lt;br /&gt;
&lt;br /&gt;
== Configuration with sqlite ==&lt;br /&gt;
CVEChecker&#039;s installation scripts create an user and a group, both called &amp;quot;cvechecker&amp;quot;, in order to have a user with minimum privileges to run cvechecker.&lt;br /&gt;
In this folder cvechecker will creates the database (according with the cvechecker.conf, we use sqlite3. But also mysql is supported. This could be useful if you want to share only one DB with many routers/servers running Alpine)&lt;br /&gt;
&lt;br /&gt;
Before use cvechecker you should configure cvechecker to use sqlite, then populate the DB with cve entries.&lt;br /&gt;
According with our settings, /etc/cvechecker.conf would looks like:&lt;br /&gt;
&lt;br /&gt;
     # Generic settings&lt;br /&gt;
     # &lt;br /&gt;
     dbtype = &amp;quot;sqlite&amp;quot;; &lt;br /&gt;
     #dbtype=&amp;quot;mysql&amp;quot;;&lt;br /&gt;
     cvecache = &amp;quot;/var/cvechecker/cache&amp;quot;;&lt;br /&gt;
     datadir = &amp;quot;/usr/share/cvechecker&amp;quot;;&lt;br /&gt;
     stringcmd = &amp;quot;/usr/bin/strings -n 3 &#039;@file@&#039;&amp;quot;;&lt;br /&gt;
     version_url = &amp;quot;http://cvechecker.svn.sourceforge.net/viewvc/cvechecker/versions.dat&amp;quot;;&lt;br /&gt;
     #userkey = &amp;quot;servertag&amp;quot;;&lt;br /&gt;
     #&lt;br /&gt;
     # For Sqlite3&lt;br /&gt;
     #&lt;br /&gt;
     sqlite3: {&lt;br /&gt;
       localdb = &amp;quot;/var/cvechecker/local&amp;quot;;&lt;br /&gt;
       globaldb = &amp;quot;/var/cvechecker/global.db&amp;quot;;&lt;br /&gt;
     };&lt;br /&gt;
     # &lt;br /&gt;
     # For MySQL&lt;br /&gt;
     # &lt;br /&gt;
     mysql: {&lt;br /&gt;
       dbname = &amp;quot;cvechecker&amp;quot;;&lt;br /&gt;
       dbuser = &amp;quot;cvechecker&amp;quot;;&lt;br /&gt;
       dbpass = &amp;quot;cvecheckpass&amp;quot;;&lt;br /&gt;
       dbhost = &amp;quot;$IPADDRESS_OF_MYSQL_SERVER&amp;quot;;&lt;br /&gt;
     };&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now, you can initialize the DB with:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|cvechecker -i}}&lt;br /&gt;
&lt;br /&gt;
DB is ready.&lt;br /&gt;
Now, we should configure cvechecker to use mysql then populate the DB with cve entries.&lt;br /&gt;
&lt;br /&gt;
== Configuration with MySQL ==&lt;br /&gt;
&lt;br /&gt;
MySQL is another backend that cvechecker is able to use. Could be useful if you have several cvechecker installed in your network. In that way, you have only one &amp;quot;repository&amp;quot; of CVEs that needs to be updated.&lt;br /&gt;
&lt;br /&gt;
{{Cmd|apk add mysql mysql-client&lt;br /&gt;
/etc/init.d/mysql setup&lt;br /&gt;
/etc/init.d/mysql start &amp;amp;&amp;amp; rc-update add mysql default&lt;br /&gt;
/usr/bin/mysqladmin -u root password &#039;new-password&#039;}}&lt;br /&gt;
&lt;br /&gt;
create a db user for cvechecker:&lt;br /&gt;
{{Cmd|mysql -u root -p&lt;br /&gt;
mysql&amp;gt;CREATE DATABASE cvechecker;&lt;br /&gt;
mysql&amp;gt;CREATE USER &#039;cvechecker&#039;@&#039;%&#039; IDENTIFIED BY &#039;cvecheckpass&#039;;&lt;br /&gt;
mysql&amp;gt;GRANT ALL ON cvechecker.* TO &#039;cvechecker&#039;@&#039;localhost&#039;;&lt;br /&gt;
mysql&amp;gt;GRANT ALL ON cvechecker.* TO &#039;cvechecker&#039;@&#039;%&#039;;&lt;br /&gt;
mysql&amp;gt;FLUSH PRIVILEGES;}}&lt;br /&gt;
&lt;br /&gt;
I set % because the DB and the users should allow access from other hosts. You can restrict this to allow only your domain.&lt;br /&gt;
&lt;br /&gt;
You have two way to create tables into DB:&lt;br /&gt;
&lt;br /&gt;
=== Via .sql script ===&lt;br /&gt;
&lt;br /&gt;
Login as cvechecker into mysql:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|mysql -D cvechecker -u cvechecker -p &lt;br /&gt;
mysql&amp;gt;source /usr/share/cvechecker/mysql_cvechecker.sql;}}&lt;br /&gt;
&lt;br /&gt;
DB is ready.&lt;br /&gt;
Now, we should configure cvechecker to use mysql then populate the DB with cve entries.&lt;br /&gt;
&lt;br /&gt;
=== Via cvechecker ===&lt;br /&gt;
&lt;br /&gt;
After you configured the DB, you can create tables with:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|cvechecker -i}}&lt;br /&gt;
&lt;br /&gt;
But in order to make it works, you have to configure DB settings in cvechecker.conf.&lt;br /&gt;
According with our settings, /etc/cvechecker.conf would looks like:&lt;br /&gt;
&lt;br /&gt;
     # Generic settings&lt;br /&gt;
     # &lt;br /&gt;
     #dbtype = &amp;quot;sqlite&amp;quot;; &lt;br /&gt;
     dbtype=&amp;quot;mysql&amp;quot;;&lt;br /&gt;
     cvecache = &amp;quot;/var/cvechecker/cache&amp;quot;;&lt;br /&gt;
     datadir = &amp;quot;/usr/share/cvechecker&amp;quot;;&lt;br /&gt;
     stringcmd = &amp;quot;/usr/bin/strings -n 3 &#039;@file@&#039;&amp;quot;;&lt;br /&gt;
     version_url = &amp;quot;http://cvechecker.svn.sourceforge.net/viewvc/cvechecker/versions.dat&amp;quot;;&lt;br /&gt;
     #userkey = &amp;quot;servertag&amp;quot;;&lt;br /&gt;
     #&lt;br /&gt;
     # For Sqlite3&lt;br /&gt;
     #&lt;br /&gt;
     sqlite3: {&lt;br /&gt;
       localdb = &amp;quot;/var/cvechecker/local&amp;quot;;&lt;br /&gt;
       globaldb = &amp;quot;/var/cvechecker/global.db&amp;quot;;&lt;br /&gt;
     };&lt;br /&gt;
     # &lt;br /&gt;
     # For MySQL&lt;br /&gt;
     # &lt;br /&gt;
     mysql: {&lt;br /&gt;
       dbname = &amp;quot;cvechecker&amp;quot;;&lt;br /&gt;
       dbuser = &amp;quot;cvechecker&amp;quot;;&lt;br /&gt;
       dbpass = &amp;quot;cvecheckpass&amp;quot;;&lt;br /&gt;
       dbhost = &amp;quot;$IPADDRESS_OF_MYSQL_SERVER&amp;quot;;&lt;br /&gt;
     };&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE:&#039;&#039;&#039;&lt;br /&gt;
Running cvechecker -i (initialize database) it removes ALL entries in the DB.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Using CVEChecker ===&lt;br /&gt;
&lt;br /&gt;
After the db is created, you have to pull the necessary data from the Internet:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|pullcves pull}}&lt;br /&gt;
&lt;br /&gt;
According with the manual, &amp;quot;This will take a very long time, so please be patient (loading over half a million CVE entries in a database is a time consuming - but one-time - activity). &lt;br /&gt;
Future pulls will not take this much time as they will not redownload the CVE entries from all previous years (unless you ask it to).&amp;quot;&lt;br /&gt;
&lt;br /&gt;
(If you&#039;re behind a proxy, you should set it from env variable or with wget.rc)&lt;br /&gt;
&lt;br /&gt;
Could be useful to crontab this task, maybe every day. Become the cvecheker user and run &amp;quot;crontab -e&amp;quot;.&lt;br /&gt;
Insert the following to run pullcves every day at 5:00 AM&lt;br /&gt;
&lt;br /&gt;
 *       5       *       *       *       /usr/bin/pullcves pull&lt;br /&gt;
&lt;br /&gt;
Now, make a list of executables file as well as /proc/version and allows cvechecker to verify if there are kernel-related CVE entries for your Linux kernel and software installed.&lt;br /&gt;
&lt;br /&gt;
{{Cmd|find / -type f -perm -o+x &amp;gt; /tmp/cvecheck.tmp&lt;br /&gt;
cat /proc/version &amp;gt;&amp;gt; /tmp/cvecheck.tmp}}&lt;br /&gt;
&lt;br /&gt;
Now, in /tmp/cvecheck.tmp you&#039;ll have all the binaries of your system with their version.&lt;br /&gt;
Check if there are cve with the following:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|cvechecker -b /tmp/cvecheck.tmp}}&lt;br /&gt;
          &lt;br /&gt;
If you want, you can create a report with the entries (if they are found):&lt;br /&gt;
&lt;br /&gt;
{{Cmd|cvechecker -r}}&lt;br /&gt;
&lt;br /&gt;
Simple script that helps to do it automatically. Copy and past it, save it as run_cvecheck.sh and give it exec permissions.&lt;br /&gt;
&lt;br /&gt;
     #!/bin/sh&lt;br /&gt;
     tempfile=/tmp/cvecheck.tmp&lt;br /&gt;
     EMAILADMIN=&amp;lt;%EMAIL ADDRESS USED FOR THIS TASK%&amp;gt;&lt;br /&gt;
     find / -type f -perm -o+x &amp;gt; $tempfile&lt;br /&gt;
     cat /proc/version &amp;gt;&amp;gt; $tempfile&lt;br /&gt;
     cvechecker -b $tempfile &amp;gt; /dev/null 2&amp;gt;&amp;amp;1 	# Run cvechecker against the software list&lt;br /&gt;
     cvechecker -r &amp;gt; $tempfile &amp;gt; /dev/null 2&amp;gt;&amp;amp;1	# Create a report &lt;br /&gt;
     if [ -s &amp;quot;$tempfile&amp;quot; ] ; then			# If exists and non-zero, send it via email	&lt;br /&gt;
      mail $EMAILADMIN -s &amp;quot;CVE Checker&amp;quot; &amp;lt; $tempfile	&lt;br /&gt;
     fi ;&lt;br /&gt;
     rm $tempfile&lt;br /&gt;
&lt;br /&gt;
{{Note|If you want to send emails, you have to add mailx and configure an smtp server (like ssmtp). But this information goes beyond the purpose of this doc.}}&lt;br /&gt;
&lt;br /&gt;
In order to make the last rows sent via email, you should configure an smtp server. Widely used is ssmtp. &lt;br /&gt;
Could be a good idea run this script as cronjob.&lt;br /&gt;
&lt;br /&gt;
So, you can do the same you did with pullcves: become the cvecheker user and run &amp;quot;crontab -e&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
 *       6       *       *       *       /var/cvechecker/run_cvecheck.sh&lt;br /&gt;
&lt;br /&gt;
=== Create Report ===&lt;br /&gt;
&lt;br /&gt;
CVEChecker generate reports in a CSV format.  Could be nice generate an html from this CSV.&lt;br /&gt;
&lt;br /&gt;
This is a sample script that uses csv2xml and cvereport.xsl (two scripts that comes with cvechecker) that allows the generation of html file starting by csv.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
     #!/bin/sh&lt;br /&gt;
     tempfile=/tmp/cvecheck.tmp&lt;br /&gt;
     EMAILADMIN=root@localhost&lt;br /&gt;
     WEBDIR=/var/www/localhost/htdocs/cvechecker/&lt;br /&gt;
     CONFFILE=/etc/cvechecker.conf&lt;br /&gt;
     DATADIR=$(awk -F&#039;=&#039; &#039;/^datadir/ {print $2}&#039; ${CONFFILE} | awk -F&#039;&amp;quot;&#039; &#039;{print $2}&#039;);&lt;br /&gt;
     find / -type f -perm -o+x &amp;gt; $tempfile&lt;br /&gt;
     cat /proc/version &amp;gt;&amp;gt; $tempfile&lt;br /&gt;
     cvechecker -b $tempfile &amp;gt; /dev/null 2&amp;gt;&amp;amp;1        # Run cvechecker against the software list&lt;br /&gt;
     if [ -s &amp;quot;$tempfile&amp;quot; ] ; then                    # If exists and non-zero, send it via email     &lt;br /&gt;
         mail $EMAILADMIN -s &amp;quot;CVE Checker&amp;quot; &amp;lt; $tempfile&lt;br /&gt;
     fi ;&lt;br /&gt;
     # Create Report. &lt;br /&gt;
     # FYI: acknowledgements.xml is an hard-coded file name.&lt;br /&gt;
     cvechecker -rC &amp;gt; $WEBDIR/report.csv&lt;br /&gt;
     awk -F, -f ${DATADIR}/csv2xml.awk $WEBDIR/report.csv &amp;gt; ${DATADIR}/acknowledgements.xml&lt;br /&gt;
     xsltproc ${DATADIR}/cvereport.xsl $DATADIR/acknowledgements.xml &amp;gt; ${WEBDIR}/report.html&lt;br /&gt;
     printf &amp;quot;done\n&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note&#039;&#039;&#039;: &lt;br /&gt;
the html generated is pretty ugly, because cvereport.xsl has hard-coded the css file which is stored in /usr/share/cvechecker dir. Filename is report.css&lt;br /&gt;
You can copy the report.css file into $WEBDIR in order to have a nicer html file.&lt;br /&gt;
&lt;br /&gt;
[[Category:Monitoring]]&lt;br /&gt;
[[Category:Security]]&lt;/div&gt;</summary>
		<author><name>MaxPeal</name></author>
	</entry>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=EyeOS&amp;diff=20168</id>
		<title>EyeOS</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=EyeOS&amp;diff=20168"/>
		<updated>2021-10-05T14:33:13Z</updated>

		<summary type="html">&lt;p&gt;MaxPeal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Obsolete|eyeOS is deprecated, the Project and source files https://sourceforge.net/projects/eyeos/ are dead and gone!}} &lt;br /&gt;
&lt;br /&gt;
eyeOS is an open source web desktop following the cloud computing concept that leverages collaboration and communication among users. It is mainly written in PHP, XML, and JavaScript. It acts as a platform for web applications written using the eyeOS Toolkit. It includes a Desktop environment with 67 applications and system utilities&lt;br /&gt;
&lt;br /&gt;
= Set up eyeOS on Alpine Linux =&lt;br /&gt;
&lt;br /&gt;
This document will be a quick c/p guide to setup eyeOS on Alpine linux. What we will setup is the following:&lt;br /&gt;
&lt;br /&gt;
* Lighttpd with PHP &lt;br /&gt;
* eyeOS&lt;br /&gt;
&lt;br /&gt;
= Install lighttpd, and PHP =&lt;br /&gt;
&lt;br /&gt;
{{:Setting Up Lighttpd With FastCGI}}&lt;br /&gt;
&lt;br /&gt;
= Installing and configuring eyeOS =&lt;br /&gt;
Make webapps folder&lt;br /&gt;
&lt;br /&gt;
{{Cmd|mkdir /usr/share/webapps/ -p}}&lt;br /&gt;
&lt;br /&gt;
Download previous version:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|cd /usr/share/webapps/&lt;br /&gt;
 wget http://sourceforge.net/projects/eyeos/files/eyeos/1.9.0.1/eyeOS_1.9.0.1.zip/download}}&lt;br /&gt;
&lt;br /&gt;
Unpack and delete zip file&lt;br /&gt;
&lt;br /&gt;
{{Cmd|unzip download&lt;br /&gt;
 rm download}}&lt;br /&gt;
&lt;br /&gt;
Also you can download latest version:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|cd /usr/share/webapps/&lt;br /&gt;
 wget http://sourceforge.net/projects/eyeos/files/eyeos2/eyeos-2.5.tar.gz/download}}&lt;br /&gt;
&lt;br /&gt;
Unpack and delete tar.gz file&lt;br /&gt;
&lt;br /&gt;
{{Cmd|cd /usr/share/webapps/&lt;br /&gt;
 tar -xvzf download}}&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&#039;&#039;&#039;Project and source files&#039;&#039;&#039; https://sourceforge.net/projects/eyeos/ &#039;&#039;&#039;are dead and gone!&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Change Folder Persmissions&lt;br /&gt;
&lt;br /&gt;
{{Cmd|chmod -R 777 /usr/share/webapps/eyeOS/}}&lt;br /&gt;
&lt;br /&gt;
Make symlinks to eyeOS&lt;br /&gt;
&lt;br /&gt;
{{Cmd|ln -s /usr/share/webapps/eyeOS/ /var/www/localhost/htdocs/eyeos}}&lt;br /&gt;
&lt;br /&gt;
Unpack main package&lt;br /&gt;
&lt;br /&gt;
{{Cmd|cd /usr/share/webapps/eyeOS/&lt;br /&gt;
  mv /usr/share/webapps/eyeOS/package.eyepackage /usr/share/webapps/eyeOS/package.tar.gz&lt;br /&gt;
  tar zxvf  /usr/share/webapps/eyeOS/package.tar.gz}}&lt;br /&gt;
&lt;br /&gt;
== Starting ==&lt;br /&gt;
 &lt;br /&gt;
Starting http service and adding to boot&lt;br /&gt;
&lt;br /&gt;
{{Cmd|/etc/init.d/lighttpd start &amp;amp;&amp;amp; rc-update add lighttpd default}}&lt;br /&gt;
&lt;br /&gt;
== Config your eyeos ==&lt;br /&gt;
Browse to: http://WEBSERVER_IP_ADDRESS/eyeos&lt;br /&gt;
&lt;br /&gt;
  Please fill out the following form to install eyeOS:&lt;br /&gt;
&lt;br /&gt;
  Root Password&lt;br /&gt;
  Retype Password&lt;br /&gt;
  System Name&lt;br /&gt;
  Allow users to create accounts&lt;br /&gt;
&lt;br /&gt;
When you finish, press &amp;quot;Install eyeOS!&amp;quot; button, and thats all. :)&lt;br /&gt;
You have eyeOS cloud computing system working. To access it, go to http://WEBSERVER_IP_ADDRESS/eyeOS and enjoy!&lt;br /&gt;
&lt;br /&gt;
[[Category:Desktop]]&lt;br /&gt;
[[Category:PHP]]&lt;/div&gt;</summary>
		<author><name>MaxPeal</name></author>
	</entry>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=EyeOS&amp;diff=20167</id>
		<title>EyeOS</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=EyeOS&amp;diff=20167"/>
		<updated>2021-10-05T14:27:25Z</updated>

		<summary type="html">&lt;p&gt;MaxPeal: add the note: Project and source files are dead and gone!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&#039;&#039;&#039;Project and source files&#039;&#039;&#039; https://sourceforge.net/projects/eyeos/ &#039;&#039;&#039;are dead and gone!&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
eyeOS is an open source web desktop following the cloud computing concept that leverages collaboration and communication among users. It is mainly written in PHP, XML, and JavaScript. It acts as a platform for web applications written using the eyeOS Toolkit. It includes a Desktop environment with 67 applications and system utilities&lt;br /&gt;
&lt;br /&gt;
= Set up eyeOS on Alpine Linux =&lt;br /&gt;
&lt;br /&gt;
This document will be a quick c/p guide to setup eyeOS on Alpine linux. What we will setup is the following:&lt;br /&gt;
&lt;br /&gt;
* Lighttpd with PHP &lt;br /&gt;
* eyeOS&lt;br /&gt;
&lt;br /&gt;
= Install lighttpd, and PHP =&lt;br /&gt;
&lt;br /&gt;
{{:Setting Up Lighttpd With FastCGI}}&lt;br /&gt;
&lt;br /&gt;
= Installing and configuring eyeOS =&lt;br /&gt;
Make webapps folder&lt;br /&gt;
&lt;br /&gt;
{{Cmd|mkdir /usr/share/webapps/ -p}}&lt;br /&gt;
&lt;br /&gt;
Download previous version:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|cd /usr/share/webapps/&lt;br /&gt;
 wget http://sourceforge.net/projects/eyeos/files/eyeos/1.9.0.1/eyeOS_1.9.0.1.zip/download}}&lt;br /&gt;
&lt;br /&gt;
Unpack and delete zip file&lt;br /&gt;
&lt;br /&gt;
{{Cmd|unzip download&lt;br /&gt;
 rm download}}&lt;br /&gt;
&lt;br /&gt;
Also you can download latest version:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|cd /usr/share/webapps/&lt;br /&gt;
 wget http://sourceforge.net/projects/eyeos/files/eyeos2/eyeos-2.5.tar.gz/download}}&lt;br /&gt;
&lt;br /&gt;
Unpack and delete tar.gz file&lt;br /&gt;
&lt;br /&gt;
{{Cmd|cd /usr/share/webapps/&lt;br /&gt;
 tar -xvzf download}}&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&#039;&#039;&#039;Project and source files&#039;&#039;&#039; https://sourceforge.net/projects/eyeos/ &#039;&#039;&#039;are dead and gone!&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Change Folder Persmissions&lt;br /&gt;
&lt;br /&gt;
{{Cmd|chmod -R 777 /usr/share/webapps/eyeOS/}}&lt;br /&gt;
&lt;br /&gt;
Make symlinks to eyeOS&lt;br /&gt;
&lt;br /&gt;
{{Cmd|ln -s /usr/share/webapps/eyeOS/ /var/www/localhost/htdocs/eyeos}}&lt;br /&gt;
&lt;br /&gt;
Unpack main package&lt;br /&gt;
&lt;br /&gt;
{{Cmd|cd /usr/share/webapps/eyeOS/&lt;br /&gt;
  mv /usr/share/webapps/eyeOS/package.eyepackage /usr/share/webapps/eyeOS/package.tar.gz&lt;br /&gt;
  tar zxvf  /usr/share/webapps/eyeOS/package.tar.gz}}&lt;br /&gt;
&lt;br /&gt;
== Starting ==&lt;br /&gt;
 &lt;br /&gt;
Starting http service and adding to boot&lt;br /&gt;
&lt;br /&gt;
{{Cmd|/etc/init.d/lighttpd start &amp;amp;&amp;amp; rc-update add lighttpd default}}&lt;br /&gt;
&lt;br /&gt;
== Config your eyeos ==&lt;br /&gt;
Browse to: http://WEBSERVER_IP_ADDRESS/eyeos&lt;br /&gt;
&lt;br /&gt;
  Please fill out the following form to install eyeOS:&lt;br /&gt;
&lt;br /&gt;
  Root Password&lt;br /&gt;
  Retype Password&lt;br /&gt;
  System Name&lt;br /&gt;
  Allow users to create accounts&lt;br /&gt;
&lt;br /&gt;
When you finish, press &amp;quot;Install eyeOS!&amp;quot; button, and thats all. :)&lt;br /&gt;
You have eyeOS cloud computing system working. To access it, go to http://WEBSERVER_IP_ADDRESS/eyeOS and enjoy!&lt;br /&gt;
&lt;br /&gt;
[[Category:Desktop]]&lt;br /&gt;
[[Category:PHP]]&lt;/div&gt;</summary>
		<author><name>MaxPeal</name></author>
	</entry>
</feed>