{
 "cells": [
  {
   "cell_type": "code",
   "execution_count": 2,
   "metadata": {},
   "outputs": [],
   "source": [
    "import sys\n",
    "sys.path.append('../')\n",
    "import service.GiteeService as GiteeService\n",
    "import dao.AnalysisDao as AnalysisDao\n",
    "import dao.IssueDao as IssueDao\n",
    "import sqlite3\n",
    "from service.GiteeService import Issue as Issue\n",
    "#reload\n",
    "import importlib\n",
    "importlib.reload(GiteeService)\n",
    "importlib.reload(AnalysisDao)\n",
    "importlib.reload(IssueDao)\n",
    "db_path = '../dao/cve_process.db'"
   ]
  },
  {
   "cell_type": "code",
   "execution_count": 3,
   "metadata": {},
   "outputs": [
    {
     "name": "stdout",
     "output_type": "stream",
     "text": [
      "已在数据库中 : issue: #IAQTS3 [安全问题]: [master]【linux kernel 5.10.210】【必现-3/3】linux kernel组件存在CVE漏洞CVE-2024-42122\n",
      "\n",
      "已在数据库中 : issue: #IAQTQD [安全问题]: [master]【linux kernel 5.10.210】【必现-3/3】linux kernel组件存在CVE漏洞CVE-2024-42121\n",
      "\n",
      "已在数据库中 : issue: #IA665I 【Openharmony_4.1_release】【RK3568】【必现】【Kernel_linux_5.10】打开编译选项CONFIG_BLK_CGROUP后编译失败\n",
      "\n",
      "已在数据库中 : issue: #IAR0BT [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【安全】【漏洞编码】:  CVE-2024-41097 \n",
      "\n",
      "已在数据库中 : issue: #IAR0B8 [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【安全】【漏洞编码】: CVE-2024-42086 \n",
      "\n",
      "已在数据库中 : issue: #IAR08A [安全问题]:【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】 【漏洞编号】CVE-2024-42104 \n",
      "\n",
      "已在数据库中 : issue: #IAR06X [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【安全】漏洞CVE-2024-42087\n",
      "\n",
      "已在数据库中 : issue: #IAQXAB [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中CVE-2024-27051\n",
      "\n",
      "已在数据库中 : issue: #IAQX8B [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中CVE-2024-27074\n",
      "\n",
      "已在数据库中 : issue: #IAQX7F [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中CVE-2024-27412\n",
      "\n",
      "已在数据库中 : issue: #IAQX6X [安全问题]: 【安全】【CVE-2024-42295】【OpenHarmony:kernel_linux_5.10 】\n",
      "\n",
      "已在数据库中 : issue: #IAQX6U [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中CVE-2024-42311\n",
      "\n",
      "已在数据库中 : issue: #IAQX4G [安全问题]: 【安全】【CVE-2024-27001】【OpenHarmony:kernel_linux_5.10 】\n",
      "\n",
      "已在数据库中 : issue: #IAQX3D [安全问题]: 【安全】【CVE-2024-27008】【OpenHarmony:kernel_linux_5.10 】\n",
      "\n",
      "已在数据库中 : issue: #IAQX28 [安全问题]: 【安全】【CVE-2024-27024】【OpenHarmony:kernel_linux_5.10 】\n",
      "\n",
      "已在数据库中 : issue: #IAQX1S [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中CVE-2024-42310\n",
      "\n",
      "已在数据库中 : issue: #IAQX1T [安全问题]: 【安全】【CVE-2024-27028】【OpenHarmony:kernel_linux_5.10 】\n",
      "\n",
      "已在数据库中 : issue: #IAQX14 [安全问题]: 【安全】【CVE-2024-42301】【OpenHarmony:kernel_linux_5.10 】\n",
      "\n",
      "已在数据库中 : issue: #IAQVYZ [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-39487\n",
      "\n",
      "已在数据库中 : issue: #IAQVXR [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-26851\n",
      "\n",
      "已在数据库中 : issue: #IAQVW5 [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-39484\n",
      "\n",
      "已在数据库中 : issue: #IAQVUF [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-39482\n",
      "\n",
      "已在数据库中 : issue: #IAQVQF [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-39476\n",
      "\n",
      "已在数据库中 : issue: #IAQVPE [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-39471\n",
      "\n",
      "已在数据库中 : issue: #IAQVND [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-26955\n",
      "\n",
      "已在数据库中 : issue: #IAQVLF [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-39301\n",
      "\n",
      "已在数据库中 : issue: #IAQVJA [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-39292\n",
      "\n",
      "已在数据库中 : issue: #IAQVIA [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-38662\n",
      "\n",
      "已在数据库中 : issue: #IAQVFL [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-38661\n",
      "\n",
      "已在数据库中 : issue: #IAQVEW [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-26857\n",
      "\n",
      "已在数据库中 : issue: #IAQVE8 [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-38659\n",
      "\n",
      "已在数据库中 : issue: #IAQVBA [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-38635\n",
      "\n",
      "已在数据库中 : issue: #IAQVA1 [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-38634\n",
      "\n",
      "已在数据库中 : issue: #IAQV78 [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-26951\n",
      "\n",
      "已在数据库中 : issue: #IAQV6R [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-38627\n",
      "\n",
      "已在数据库中 : issue: #IAQV02 [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】CVE-2024-26863【kernel_linux_5.10】【威胁等级】: 中 \n",
      "\n",
      "已在数据库中 : issue: #IAQUYA [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】CVE-2024-26950【kernel_linux_5.10】【威胁等级】: 中\n",
      "\n",
      "已在数据库中 : issue: #IAQTSW [安全问题]:[master] 【linux kernel 5.10.210】【必现-3/3】linux kernel组件存在CVE漏洞CVE-2024-42147\n",
      "\n",
      "已在数据库中 : issue: #IAQX11 [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-42313\n",
      "\n",
      "已在数据库中 : issue: #IAQWZF [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中CVE-2024-43829\n",
      "\n",
      "已在数据库中 : issue: #IAQWZE [安全问题]: 【安全】【CVE-2024-42301】【OpenHarmony:kernel_linux_5.10 】\n",
      "\n",
      "已在数据库中 : issue: #IAQWY7 [安全问题]: 【安全】【CVE-2024-27044】【OpenHarmony:kernel_linux_5.10 】\n",
      "\n",
      "已在数据库中 : issue: #IAQWY1 [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-43849\n",
      "\n",
      "已在数据库中 : issue: #IAQWWV [安全问题]: 【安全】【CVE-2024-27045】【OpenHarmony:kernel_linux_5.10 】\n",
      "\n",
      "已在数据库中 : issue: #IAQWWA [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中CVE-2024-42121\n",
      "\n",
      "已在数据库中 : issue: #IAQWW3 [安全问题]: 【安全】【CVE-2024-42304】【OpenHarmony:kernel_linux_5.10 】\n",
      "\n",
      "已在数据库中 : issue: #IAQWSZ [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-27047\n",
      "\n",
      "已在数据库中 : issue: #IAQWRG [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-42306\n",
      "\n",
      "已在数据库中 : issue: #IAQWQL [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-27396\n",
      "\n",
      "已在数据库中 : issue: #IAQWPK [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中CVE-2024-42312\n",
      "\n",
      "已在数据库中 : issue: #IAQWO0 [安全问题]: [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-43841\n",
      "\n",
      "已在数据库中 : issue: #IAQWMB [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-43846\n",
      "\n",
      "已在数据库中 : issue: #IAQWKJ [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-43858\n",
      "\n",
      "已在数据库中 : issue: #IAQWJN [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 未知 CVE-2024-26835\n",
      "\n",
      "已在数据库中 : issue: #IAQWEY [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中   netfilter: nf_tables_ipv6: consider network offset in netdev/egress v…\n",
      "\n",
      "已在数据库中 : issue: #IAQW3P [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-26814\n",
      "\n",
      "已在数据库中 : issue: #IAQW2R [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-39489\n",
      "\n",
      "已在数据库中 : issue: #IAQVZQ [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-26956\n",
      "\n"
     ]
    }
   ],
   "source": [
    "def pullIssuesFromGitee(page_lens):\n",
    "    # 从GItee中拉取最新的数据，并添加到数据库中去\n",
    "    issue_list = []\n",
    "    gitee_urls = []\n",
    "    for i in range(1, page_lens + 1):\n",
    "        gitee_urls.append('https://gitee.com/openharmony/kernel_linux_5.10/issues?page=' + str(i) + '&state=open')\n",
    "    GiteeService.fillInIssueList(gitee_urls, issue_list)\n",
    "    # 将issue_list中的数据添加到数据库中\n",
    "    with sqlite3.connect(db_path) as conn:\n",
    "        for issue in issue_list:\n",
    "            # 如果不存在数据库中，就添加\n",
    "            if IssueDao.is_exist_issue(conn, issue.no):\n",
    "                print(\"已在数据库中 : issue: {} {}\\n\".format(issue.no, issue.title))\n",
    "                continue\n",
    "            print(\"不在数据库中 : issue: {} {}\\n\".format(issue.no, issue.title))\n",
    "            IssueDao.add_issue(conn, issue)\n",
    "pullIssuesFromGitee(5)"
   ]
  },
  {
   "cell_type": "code",
   "execution_count": null,
   "metadata": {},
   "outputs": [],
   "source": []
  },
  {
   "cell_type": "code",
   "execution_count": 4,
   "metadata": {},
   "outputs": [],
   "source": [
    "# 从数据库中返回的tuple组装为issue_list\n",
    "def create_issue_list(all):\n",
    "    issue_list = []\n",
    "    all = IssueDao.get_issues(conn)\n",
    "    for item in all:\n",
    "        issue_list.append(Issue.create(item[0], item[1], item[2], item[3], item[4], item[5]))\n",
    "    return issue_list\n",
    "# 过滤数据库中的数据，使用规则过滤 删除不需要的数据\n",
    "def removeUnRelatedIssueInDB(filter=GiteeService.filterUnRelatedIssue): \n",
    "    with sqlite3.connect('../dao/cve_process.db') as conn:\n",
    "        issue_list = create_issue_list(IssueDao.get_issues(conn))\n",
    "        for issue in issue_list:\n",
    "            if filter(issue):\n",
    "                print(\"删除 issue: {} {}\\n\".format(issue.no, issue.title))\n",
    "                IssueDao.delete_issue(conn, issue.no)"
   ]
  },
  {
   "cell_type": "code",
   "execution_count": 8,
   "metadata": {},
   "outputs": [
    {
     "name": "stdout",
     "output_type": "stream",
     "text": [
      "issue: #IAQVTD 待办的->已完成\n",
      "\n",
      "issue: #IAQSDX 待办的->已拒绝\n",
      "\n",
      "issue: #IAQSDK 待办的->已完成\n",
      "\n"
     ]
    }
   ],
   "source": [
    "#更新数据库中issue的状态\n",
    "def update_issue_status(issue_list):\n",
    "    with sqlite3.connect(db_path) as conn:\n",
    "        for issue in issue_list:\n",
    "            no = issue.no\n",
    "            newState = GiteeService.getIssueState(GiteeService.getSoup(issue.url))\n",
    "            if issue.state != newState:\n",
    "                print(\"issue: {} {}->{}\\n\".format(no, issue.state, newState))\n",
    "            IssueDao.update_issue_status(conn, no, newState)\n",
    "update_issue_status(issue_list)"
   ]
  },
  {
   "cell_type": "code",
   "execution_count": 6,
   "metadata": {},
   "outputs": [],
   "source": [
    "# 获取所有待办的issue\n",
    "def getTodoIssueList():\n",
    "    todo_list = GiteeService.get_issue_list_from_db(state=IssueDao.State.todo)\n",
    "    return todo_list\n",
    "issue_list = getTodoIssueList()"
   ]
  },
  {
   "cell_type": "code",
   "execution_count": null,
   "metadata": {},
   "outputs": [],
   "source": [
    "import dao.AnalysisDao as AnalysisDao\n",
    "import sqlite3\n",
    "def analyzeGitee(issue_list):\n",
    "    with sqlite3.connect(db_path) as conn:\n",
    "        for issue in issue_list:\n",
    "            info = \"\"\n",
    "            if issue.cve is None:\n",
    "                print(\"{} 没有cve\\n\".format(issue.no))\n",
    "                continue\n",
    "            else:\n",
    "                if AnalysisDao.is_already_analyze(conn, issue.no, AnalysisDao.AnalysisType.GITEE):\n",
    "                    print(\"{} 已经分析过了, 结论是：{}\\n\".format(issue.no, AnalysisDao.get_analysis(conn, issue.no, AnalysisDao.AnalysisType.GITEE)))\n",
    "                    continue\n",
    "                historyList = GiteeService.getHistoryIssueList(issue.cve)\n",
    "                if len(historyList) == 0:\n",
    "                    print(\"{} 没有历史issue\\n\".format(issue.cve))\n",
    "                else:\n",
    "                    for item in GiteeService.getHistoryIssueList(issue.cve):\n",
    "                        info += str(item) + \"\\n\"\n",
    "                        print(item)\n",
    "            AnalysisDao.update_analysis(conn, issue.no, AnalysisDao.AnalysisType.GITEE, True, info)\n",
    "analyzeGitee(issue_list)"
   ]
  },
  {
   "cell_type": "code",
   "execution_count": null,
   "metadata": {},
   "outputs": [],
   "source": [
    "import service.CIService as CIService\n",
    "CICommentSet = set()\n",
    "def analyzeCI(issue_list):\n",
    "    for issue in issue_list:\n",
    "        if issue.cve is None:\n",
    "            continue\n",
    "        tAndR = CIService.getTypeAndReason(issue.cve)\n",
    "        print(issue.no, tAndR)\n",
    "        t = tAndR['type']\n",
    "        r = tAndR['reaseon']\n",
    "        comment = \"\"\n",
    "        if t is not None:\n",
    "            comment = str(t)\n",
    "            if r is not None:\n",
    "                comment += \"，\" + str(r)\n",
    "            # resp = GiteeService.commentOnIssue(issue.targetId, comment=comment)\n",
    "            # GiteeService.collectCIComment(resp, CICommentSet)\n",
    "        AnalysisDao.update_analysis(conn, issue.no, AnalysisDao.AnalysisType.CI, True, comment)"
   ]
  },
  {
   "cell_type": "code",
   "execution_count": null,
   "metadata": {},
   "outputs": [],
   "source": [
    "with sqlite3.connect(db_path) as conn:\n",
    "    all_analysis =  AnalysisDao.get_all_analysis(conn)\n",
    "    for item in all_analysis:\n",
    "        print(item)"
   ]
  },
  {
   "cell_type": "code",
   "execution_count": null,
   "metadata": {},
   "outputs": [],
   "source": [
    "def clearComment():\n",
    "    for item in GiteeService.comment_set:\n",
    "        print(GiteeService.delete_comment(item))\n",
    "    GiteeService.comment_set.clear()\n",
    "    print(\"cleared comment set\")\n",
    "    for item in CICommentSet:\n",
    "        print(GiteeService.delete_comment(item))\n",
    "    CICommentSet.clear()\n",
    "    print(\"cleared CICommentSet\")"
   ]
  },
  {
   "cell_type": "code",
   "execution_count": 3,
   "metadata": {},
   "outputs": [],
   "source": [
    "# 分析issue 的commit_id\n",
    "import service.CommitService as CommitService\n",
    "from service.CommitService import Commit\n",
    "import threading\n",
    "import time\n",
    "def getCommitList(issue_list):\n",
    "    commit_list = []\n",
    "    task_list = []\n",
    "    #目前仅仅处理带有cve的issue\n",
    "    for issue in issue_list:\n",
    "        def run(issue=issue):\n",
    "            cve = issue.cve\n",
    "            if cve is None:\n",
    "                print(\"issue:{}没有cve\\n\".format(issue.no))\n",
    "                return\n",
    "            commit_ids = CommitService.getCommitIdFromCVE(cve)\n",
    "            if commit_ids is None:\n",
    "                print(\"未找到cve:{}对应的commit\\n\".format(cve))\n",
    "                return\n",
    "            commit_list.append(Commit(cve, commit_ids['mainline'], commit_ids['stable/5.10'], commit_ids['title'], commit_ids['fixes'], commit_ids['url']))\n",
    "        t = threading.Thread(target=run)\n",
    "        task_list.append(t)\n",
    "        time.sleep(1) # 防止最大连接数超出限制，导致程序出错 https://blog.csdn.net/wancongconga/article/details/111030335\n",
    "        t.start()\n",
    "        print(\"start task:{}\".format(issue.no))\n",
    "    for task in task_list:\n",
    "        task.join()\n",
    "    return commit_list"
   ]
  },
  {
   "cell_type": "code",
   "execution_count": 24,
   "metadata": {},
   "outputs": [
    {
     "name": "stdout",
     "output_type": "stream",
     "text": [
      "['#IA665I', '【Openharmony_4.1_release】【RK3568】【必现】【Kernel_linux_5.10】打开编译选项CONFIG_BLK_CGROUP后编译失败', None, '待分析cve', '', '', '', '', '', '', '', '', None, '', '', '', '', '']\n",
      "['#IAR0BT', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【安全】【漏洞编码】:  CVE-2024-41097 ', 'CVE-2024-41097', '', '', '', '', '', '75ddbf776dd04a09fb9e5267ead5d0c989f84506', '', '', '', '误报，CONFIG_USB_CXACRU && CONFIG_USB_ATM&&CONFIG_USB_CXACRU && CONFIG_USB_SPEEDTOUCH未开启 不涉及', '', '', '', '', '']\n",
      "['#IAR0B8', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【安全】【漏洞编码】: CVE-2024-42086 ', 'CVE-2024-42086', '', '', '', '', '', 'c326551e99f5416986074ce78bef94f6a404b517', '', '', '', '误报，CONFIG_BME680未开启 不涉及', '', '', '', '', '']\n",
      "['#IAR08A', '[安全问题]:【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】 【漏洞编号】CVE-2024-42104 ', 'CVE-2024-42104', '', '', '', '', '', '2f2fa9cf7c3537958a82fbe8c8595a5eb0861ad7', '', '', '', '误报，CONFIG_NILFS2_FS未开启 不涉及', '', '', '', '', '']\n",
      "['#IAR06X', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【安全】漏洞CVE-2024-42087', 'CVE-2024-42087', '', '', '', '', '', 'cae52f61fda0f5d2949dc177f984c9e187d4c6a0', '', '', '', '误报，CONFIG_DRM_PANEL_ILITEK_ILI9881C未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQXAB', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中CVE-2024-27051', 'CVE-2024-27051', '', '', '', '', '', '9127599c075caff234359950117018a010dd01db', '', '', '', '误报，CONFIG_ARM_BRCMSTB_AVS_CPUFREQ未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQX8B', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中CVE-2024-27074', 'CVE-2024-27074', '', '', '', '', '', 'b49fe84c6cefcc1c2336d793b53442e716c95073', '', '', '', '误报，CONFIG_VIDEO_GO7007未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQX7F', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中CVE-2024-27412', 'CVE-2024-27412', '', '', '', '', '', 'd7acc4a569f5f4513120c85ea2b9f04909b7490f', '', '', '', '误报，CONFIG_BATTERY_BQ27XXX_I2C未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQX6X', '[安全问题]: 【安全】【CVE-2024-42295】【OpenHarmony:kernel_linux_5.10 】', 'CVE-2024-42295', '', '', '', '', '', '5f0a6800b8aec1b453c7fe4c44fcaac5ffe9d52e', '', '', '', '误报，CONFIG_NILFS2_FS选项未开启 不涉及\\n', '', '', '', '', '']\n",
      "['#IAQX6U', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中CVE-2024-42311', 'CVE-2024-42311', '', '', '', '', '', '10f7163bfb5f8b4e0c9c05a939f20b8540e33c65', '', '', '', '误报，CONFIG_HFS_FS未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQX4G', '[安全问题]: 【安全】【CVE-2024-27001】【OpenHarmony:kernel_linux_5.10 】', 'CVE-2024-27001', '', '', '', '', '', 'f15370e315976198f338b41611f37ce82af6cf54', '', '', \"Issue('no':#I9VS8D, 'title':[安全问题]: [漏洞] [master] CVE-2024-27001, 'url':https://gitee.com//openharmony/kernel_linux_5.10/issues/I9VS8D?from=project-issue, 'state':已拒绝, 'cve':CVE-2024-27001, 'targetId':16599469)\\n\", '误报，CONFIG_COMEDI_VMK80XX未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQX3D', '[安全问题]: 【安全】【CVE-2024-27008】【OpenHarmony:kernel_linux_5.10 】', 'CVE-2024-27008', '', '', '', '', '', '097c7918fcfa1dee233acfd1f3029f00c3bc8062', '', '', '', '', '', '', '', '', '']\n",
      "['#IAQX2U', '[安全问题]: 【安全】【CVE-2024-42297】【OpenHarmony:kernel_linux_5.10 】', 'CVE-2024-42297', '', '', '', '', '', '54bc4e88447e385c4d4ffa85d93e0dce628fcfa6', '', '', '', '', '', '', '', '', '']\n",
      "['#IAQX28', '[安全问题]: 【安全】【CVE-2024-27024】【OpenHarmony:kernel_linux_5.10 】', 'CVE-2024-27024', '', '', '', '', '', '9dfc15a10dfd44f8ff7f27488651cb5be6af83c2', '', '', '', '误报，CONFIG_RDS未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQX1S', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中CVE-2024-42310', 'CVE-2024-42310', '', '', '', '', '', 'b6ac46a00188cde50ffba233e6efb366354a1de5', '', '', '', '误报，CONFIG_DRM_GMA500未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQX1T', '[安全问题]: 【安全】【CVE-2024-27028】【OpenHarmony:kernel_linux_5.10 】', 'CVE-2024-27028', '', '', '', '', '', 'bcfcdf19698024565eff427706ebbd8df65abd11', '', '', '', '误报，CONFIG_SPI_MT65XX未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQX14', '[安全问题]: 【安全】【CVE-2024-42301】【OpenHarmony:kernel_linux_5.10 】', 'CVE-2024-42301', '', '', '', '', '', 'a44f88f7576bc1916d8d6293f5c62fbe7cbe03e0', '', '', '', '误报，CONFIG_PARPORT未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQX11', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-42313', 'CVE-2024-42313', '', '', '', '', '', '4c9d235630d35db762b85a4149bbb0be9d504c36', '', '', '', '误报，CONFIG_VIDEO_QCOM_VENUS未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQWZF', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中CVE-2024-43829', 'CVE-2024-43829', '', '', '', '', '', '4e87f592a46bb804d8f833da6ce702ae4b55053f', '', '', '', '误报，CONFIG_DRM_QXL选项未开启，不涉及', '', '', '', '', '']\n",
      "['#IAQWZE', '[安全问题]: 【安全】【CVE-2024-42301】【OpenHarmony:kernel_linux_5.10 】', 'CVE-2024-42301', '', '', '', '', '', 'a44f88f7576bc1916d8d6293f5c62fbe7cbe03e0', '', '', '', '误报，CONFIG_PARPORT未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQWY7', '[安全问题]: 【安全】【CVE-2024-27044】【OpenHarmony:kernel_linux_5.10 】', 'CVE-2024-27044', '', '', '', '', '', '330caa061af53ea6d287d7c43d0703714e510e08', '', '', '', '', '', '', '', '', '']\n",
      "['#IAQWY1', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-43849', 'CVE-2024-43849', '', '', '', '', '', 'eab05737ee22216250fe20d27f5a596da5ea6eb7', '', '', '', '误报，CONFIG_QCOM_PDR_HELPERS未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQWWV', '[安全问题]: 【安全】【CVE-2024-27045】【OpenHarmony:kernel_linux_5.10 】', 'CVE-2024-27045', '', '', '', '', '', 'ff28893c96c5e0927a4da10cd24a3522ca663515', '', '', '', '', '', '', '', '', '']\n",
      "['#IAQWWA', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中CVE-2024-42121', 'CVE-2024-42121', '', '', '', '', '', 'b5b8837d066cc182ff69fb5629ad32ade5484567', '', '', '', '', '', '', '', '', '']\n",
      "['#IAQWW3', '[安全问题]: 【安全】【CVE-2024-42304】【OpenHarmony:kernel_linux_5.10 】', 'CVE-2024-42304', '', '', '', '', '', 'de2a011a13a46468a6e8259db58b1b62071fe136', '', '', '', '有效漏洞，', '', '', '', '', '']\n",
      "['#IAQWSZ', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-27047', 'CVE-2024-27047', '', '', '', '', '', '06dd21045a7e8bc8701b0ebedcd9a30a6325878b', '', '', '', '', '', '', '', '', '']\n",
      "['#IAQWRG', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-42306', 'CVE-2024-42306', '', '', '', '', '', '2199e157a465aaf98294d3932797ecd7fce942d5', '', '', '', '', '', '', '', '', '']\n",
      "['#IAQWQL', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-27396', 'CVE-2024-27396', '', '', '', '', '', '0caff3e6390f840666b8dc1ecebf985c2ef3f1dd', '', '', '', '', '', '', '', '', '']\n",
      "['#IAQWPK', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中CVE-2024-42312', 'CVE-2024-42312', '', '', '', '', '', 'b2591c89a6e2858796111138c38fcb6851aa1955', '', '', '', '有效漏洞，', '', '', '', '', '']\n",
      "['#IAQWO0', '[安全问题]: [安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-43841', 'CVE-2024-43841', '', '', '', '', '', '05c4488a0e446c6ccde9f22b573950665e1cd414', '', '', '', '误报，CONFIG_VIRT_WIFI选项未开启，不涉及\\n', '', '', '', '', '']\n",
      "['#IAQWMB', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-43846', 'CVE-2024-43846', '', '', '', '', '', '22ae17a267f4812861f0c644186c3421ff97dbfc', '', '', '', '误报，CONFIG_OBJAGG选项未开启，不涉及\\n', '', '', '', '', '']\n",
      "['#IAQWKJ', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-43858', 'CVE-2024-43858', '', '', '', '', '', '538a27c8048f081a5ddd286f886eb986fbbc7f80', '', '', '', '误报，CONFIG_JFS_FS未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQWJN', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 未知 CVE-2024-26835', 'CVE-2024-26835', '', '', '', '', '', '31ea574aeca1aa488e18716459bde057217637af', '', '', '', '误报，CONFIG_NF_TABLES未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQWHM', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 ethtool: check device is present when getting link settings', None, '待分析cve', '', '', '', '', '', '', '', '', '', '', '', '', '', '']\n",
      "['#IAQWEY', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中   netfilter: nf_tables_ipv6: consider network offset in netdev/egress v…', None, '待分析cve', '', '', '', '', '', '', '', '', '', '', '', '', '', '']\n",
      "['#IAQW3P', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-26814', 'CVE-2024-26814', '', '', '', '', '', 'a563fc18583ca4f42e2fdd0c70c7c618288e7ede', '', '', '', '', '', '', '', '', '']\n",
      "['#IAQW2R', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-39489', 'CVE-2024-39489', '', '', '', '', '', 'daf341e0a2318b813427d5a78788c86f4a7f02be', '', '', '', '误报，CONFIG_IPV6_SEG6_HMAC未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQVZQ', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-26956', 'CVE-2024-26956', '', '', '', '', '', 'c3b5c5c31e723b568f83d8cafab8629d9d830ffb', '', '', '', '', '', '', '', '', '']\n",
      "['#IAQVYZ', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-39487', 'CVE-2024-39487', '', '', '', '', '', '707c85ba3527ad6aa25552033576b0f1ff835d7b', '', '', '', '误报，CONFIG_BONDING未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQVXR', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-26851', 'CVE-2024-26851', '', '', '', '', '', 'ccd1108b16ab572d9bf635586b0925635dbd6bbc', '', '', '', '误报，CONFIG_NF_CONNTRACK_H323未开启  不涉及', '', '', '', '', '']\n",
      "['#IAQVW5', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-39484', 'CVE-2024-39484', '', '', '', '', '', '6ff7cfa02baabec907f6f29ea76634e6256d2ec4', '', '', '', '误报，CONFIG_MMC_DAVINCI 未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQVUF', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-39482', 'CVE-2024-39482', '', '', '', '', '', '2c3d7b03b658dc8bfa6112b194b67b92a87e081b', '', '', '', '误报，CONFIG_BCACHE未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQVTD', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 高 CVE-2024-39480', 'CVE-2024-39480', '', '', '', '', '', 'cfdc2fa4db57503bc6d3817240547c8ddc55fa96', '', '', '', '误报，CONFIG_KGDB_KDB未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQVQF', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-39476', 'CVE-2024-39476', '', '', '', '', '', 'aa64464c8f4d2ab92f6d0b959a1e0767b829d787', '', '', '', '误报，CONFIG_MD_RAID456未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQVPE', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-39471', 'CVE-2024-39471', '', '', '', '', '', '8112fa72b7f139052843ff484130d6f97e9f052f', '', '', '', '误报，CONFIG_DRM_AMDGPU未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQVND', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-26955', 'CVE-2024-26955', '', '', '', '', '', 'f0fe7ad5aff4f0fcf988913313c497de85f1e186', '', '', \"Issue('no':#IAIKIO, 'title':【漏洞】 【master】 CVE-2024-26955, 'url':https://gitee.com//openharmony/kernel_linux_5.10/issues/IAIKIO?from=project-issue, 'state':已拒绝, 'cve':CVE-2024-26955, 'targetId':17662560)\\n\", '误报，CONFIG_NILFS2_FS未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQVLF', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-39301', 'CVE-2024-39301', '', '', '', '', '', '124947855564572713d705a13be7d0c9dae16a17', '', '', '', '误报，CONFIG_NET_9P未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQVJA', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-39292', 'CVE-2024-39292', '', '', '', '', '', '351d1a64544944b44732f6a64ed65573b00b9e14', '', '', '', '误报，CONFIG_UML未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQVIA', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-38662', 'CVE-2024-38662', '', '', '', '', '', '29467edc23818dc5a33042ffb4920b49b090e63d', '', '', '', '误报，CONFIG_BPF_STREAM_PARSER未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQVFL', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-38661', 'CVE-2024-38661', '', '', '', '', '', '7360cef95aa1ea2b5efb7b5e2ed32e941664e1f0', '', '', '', '误报，CONFIG_S390未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQVEW', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-26857', 'CVE-2024-26857', '', '', '', '', '', 'c7137900691f5692fe3de54566ea7b30bb35d66c', '', '', '', '误报，CONFIG_GENEVE未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQVE8', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-38659', 'CVE-2024-38659', '', '', '', '', '', '3c0d36972edbe56fcf98899622d9b90ac9965227', '', '', '', '误报，CONFIG_ENIC未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQVBA', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-38635', 'CVE-2024-38635', '', '', '', '', '', 'fd4bcb991ebaf0d1813d81d9983cfa99f9ef5328', '', '', '', '误报，CONFIG_SOUNDWIRE_CADENCE未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQVA1', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-38634', 'CVE-2024-38634', '', '', '', '', '', 'cc121e3722a0a2c8f716ef991e5425b180a5fb94', '', '', '', '误报，CONFIG_SERIAL_MAX3100 未开启，不涉及', '', '', '', '', '']\n",
      "['#IAQV78', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-26951', 'CVE-2024-26951', '', '', '', '', '', 'f52be46e3e6ecefc2539119784324f0cbc09620a', '', '', '', '误报，CONFIG_WIREGUARD未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQV6R', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】【kernel_linux_5.10】【威胁等级】: 中 CVE-2024-38627', 'CVE-2024-38627', '', '', '', '', '', '713fc00c571dde4af3db2dbd5d1b0eadc327817b', '', '', '', '误报，CONFIG_STM未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQV2U', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】CVE-2024-26861【kernel_linux_5.10】【威胁等级】: 中 ', None, '待分析cve', '', '', '', '', '', '', '', '', '', '', '', '', '', '']\n",
      "['#IAQV02', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】CVE-2024-26863【kernel_linux_5.10】【威胁等级】: 中 ', 'CVE-2024-26863', '', '', '', '', '', '7fb2d4d6bb1c85f7a23aace0ed6c86a95dea792a', '', '', '', '误报，CONFIG_HSR未开启 不涉及', '', '', '', '', '']\n",
      "['#IAQUYA', '[安全问题]: 【OpenHamrony 5.0.0.41】【内核子系统】【ToC】【RK3568】【必现-10/10】CVE-2024-26950【kernel_linux_5.10】【威胁等级】: 中', None, '待分析cve', '', '', '', '', '', '', '', '', '', '', '', '', '', '']\n",
      "['#IAQTSW', '[安全问题]:[master] 【linux kernel 5.10.210】【必现-3/3】linux kernel组件存在CVE漏洞CVE-2024-42147', 'CVE-2024-42147', '', '', '', '', '', None, '', '', '', '', '', '', '', '', '']\n",
      "['#IAQTS3', '[安全问题]: [master]【linux kernel 5.10.210】【必现-3/3】linux kernel组件存在CVE漏洞CVE-2024-42122', 'CVE-2024-42122', '', '', '', '', '', '5ceb40cdee721e13cbe15a0515cacf984e11236b', '', '', '', '有效漏洞', '', '', '', '', '']\n",
      "['#IAQTQD', '[安全问题]: [master]【linux kernel 5.10.210】【必现-3/3】linux kernel组件存在CVE漏洞CVE-2024-42121', 'CVE-2024-42121', '', '', '', '', '', 'b5b8837d066cc182ff69fb5629ad32ade5484567', '', '', '', '', '', '', '', '', '']\n",
      "['#IAQSDX', '[安全问题]: 【安全】【OpenHarmony:kernel_linux_5.10】fuse: use unsigned type for getxattr/listxattr size truncation', None, '待分析cve', '', '', '', '', '', '', '', '', '', '', '', '', '', '']\n",
      "['#IAQSDK', '[安全问题]: 【安全】【OpenHarmony:kernel_linux_5.10】fuse: use unsigned type for getxattr/listxattr size truncation', None, '待分析cve', '', '', '', '', '', '', '', '', '', '', '', '', '', '']\n",
      "['#IAQSD9', '[安全问题]: 【安全】【OpenHarmony:kernel_linux_5.10】media: uvcvideo: Fix integer overflow calculating timestamp', None, '待分析cve', '', '', '', '', '', '', '', '', '', '', '', '', '', '']\n"
     ]
    }
   ],
   "source": [
    "\n",
    "csv_list = []\n",
    "issue_list = getTodoIssueList()\n",
    "# commit_list = getCommitList(issue_list)\n",
    "for issue in issue_list:\n",
    "    # 生成表格时排除4.0和4.1的release\n",
    "    if \"OpenHarmony-4.1-Release\" in issue.title or \"OpenHarmony-4.0-Release\" in issue.title:\n",
    "        continue\n",
    "    temp = []\n",
    "    temp.extend(['' for i in range(18)])\n",
    "    temp[0] = issue.no\n",
    "    # temp[1] = '=HYPERLINK(\\\"{}\\\",\\\"{}\\\")'.format(issue.url, issue.title)\n",
    "    temp[1] = issue.title\n",
    "    temp[2] = issue.cve\n",
    "    if issue.cve is None:\n",
    "        temp[3] = \"待分析cve\"\n",
    "    for commit in commit_list:\n",
    "        if commit.cve == issue.cve:\n",
    "            temp[8] = commit.stable_commitId\n",
    "    with sqlite3.connect(db_path) as conn:\n",
    "        temp[11] = AnalysisDao.get_analysis(conn, issue.no, AnalysisDao.AnalysisType.GITEE)\n",
    "        temp[12] = AnalysisDao.get_analysis(conn, issue.no, AnalysisDao.AnalysisType.CI)\n",
    "    csv_list.append(temp)\n",
    "for item in csv_list:\n",
    "    print(item)\n",
    "import csv\n",
    "with open('todo.csv', 'w', newline='', encoding='utf8') as f:\n",
    "    writer = csv.writer(f)\n",
    "    writer.writerows(csv_list)"
   ]
  }
 ],
 "metadata": {
  "kernelspec": {
   "display_name": "Python 3",
   "language": "python",
   "name": "python3"
  },
  "language_info": {
   "codemirror_mode": {
    "name": "ipython",
    "version": 3
   },
   "file_extension": ".py",
   "mimetype": "text/x-python",
   "name": "python",
   "nbconvert_exporter": "python",
   "pygments_lexer": "ipython3",
   "version": "3.8.0"
  }
 },
 "nbformat": 4,
 "nbformat_minor": 2
}
