{
 "cells": [
  {
   "cell_type": "code",
   "execution_count": 1,
   "metadata": {},
   "outputs": [],
   "source": [
    "import sys\n",
    "sys.path.append('..')\n",
    "import service.CIService as CIService\n",
    "import service.CVEService as CVEService"
   ]
  },
  {
   "cell_type": "code",
   "execution_count": 2,
   "metadata": {},
   "outputs": [],
   "source": [
    "# 获取指定日期的CIList（漏洞分析阶段和分支排查阶段）\n",
    "startExpDate = '2024-09-22'\n",
    "endExpDate = '2024-10-18'\n",
    "ciInfoList = CIService.getCIInfoList(startExpDate, endExpDate)"
   ]
  },
  {
   "cell_type": "code",
   "execution_count": 8,
   "metadata": {},
   "outputs": [
    {
     "name": "stdout",
     "output_type": "stream",
     "text": [
      "cve_id: CVE-2024-46678, type: 有效漏洞, reason: None, stage: None, createTime: 2024-09-14 13:40:30, expirationTime: 2024-10-14 13:40:29, internalId: OHPSIRT-2024-092657\n",
      "cve_id: CVE-2024-46713, type: 有效漏洞, reason: None, stage: None, createTime: 2024-09-14 13:36:31, expirationTime: 2024-10-14 13:36:30, internalId: OHPSIRT-2024-093181\n",
      "cve_id: CVE-2024-46858, type: 有效漏洞, reason: None, stage: None, createTime: 2024-09-28 20:02:31, expirationTime: 2024-10-12 20:02:31, internalId: OHPSIRT-2024-094763\n",
      "cve_id: CVE-2024-46676, type: 有效漏洞, reason: None, stage: None, createTime: 2024-09-14 11:54:31, expirationTime: 2024-10-14 11:54:30, internalId: OHPSIRT-2024-092857\n",
      "cve_id: CVE-2024-46679, type: 有效漏洞, reason: None, stage: None, createTime: 2024-09-14 11:52:30, expirationTime: 2024-10-14 11:52:30, internalId: OHPSIRT-2024-098147\n",
      "cve_id: CVE-2024-42122, type: 有效漏洞, reason: None, stage: None, createTime: 2024-09-16 21:52:30, expirationTime: 2024-10-16 21:52:30, internalId: OHPSIRT-2024-09744\n",
      "cve_id: CVE-2024-42144, type: 有效漏洞, reason: None, stage: None, createTime: 2024-09-16 22:16:31, expirationTime: 2024-10-16 22:16:30, internalId: OHPSIRT-2024-098860\n",
      "cve_id: CVE-2024-46849, type: 有效漏洞, reason: None, stage: None, createTime: 2024-09-29 01:40:31, expirationTime: 2024-10-13 01:40:31, internalId: OHPSIRT-2024-094815\n",
      "cve_id: CVE-2024-46818, type: 有效漏洞, reason: None, stage: None, createTime: 2024-09-28 23:04:32, expirationTime: 2024-10-12 23:04:32, internalId: OHPSIRT-2024-09873\n",
      "cve_id: CVE-2024-46828, type: 有效漏洞, reason: None, stage: None, createTime: 2024-09-29 00:00:30, expirationTime: 2024-10-13 00:00:30, internalId: OHPSIRT-2024-09348\n",
      "cve_id: CVE-2024-46854, type: 有效漏洞, reason: None, stage: None, createTime: 2024-09-29 01:00:32, expirationTime: 2024-10-13 01:00:32, internalId: OHPSIRT-2024-095475\n",
      "cve_id: CVE-2024-46685, type: 有效漏洞, reason: None, stage: None, createTime: 2024-09-15 00:04:30, expirationTime: 2024-10-15 00:04:30, internalId: OHPSIRT-2024-094409\n",
      "cve_id: CVE-2024-42131, type: 有效漏洞, reason: None, stage: None, createTime: 2024-09-16 21:56:30, expirationTime: 2024-10-16 21:56:30, internalId: OHPSIRT-2024-093694\n",
      "cve_id: CVE-2024-46681, type: 有效漏洞, reason: None, stage: None, createTime: 2024-09-14 14:02:31, expirationTime: 2024-10-14 14:02:30, internalId: OHPSIRT-2024-091561\n",
      "cve_id: CVE-2024-46689, type: 有效漏洞, reason: None, stage: None, createTime: 2024-09-14 13:46:31, expirationTime: 2024-10-14 13:46:30, internalId: OHPSIRT-2024-091766\n"
     ]
    }
   ],
   "source": [
    "for ciInfo in ciInfoList:\n",
    "    print(ciInfo)"
   ]
  },
  {
   "cell_type": "code",
   "execution_count": 4,
   "metadata": {},
   "outputs": [
    {
     "data": {
      "text/plain": [
       "[<model.CVE.CVE at 0x12d8862d950>,\n",
       " <model.CVE.CVE at 0x12d88522010>,\n",
       " <model.CVE.CVE at 0x12d88620090>,\n",
       " <model.CVE.CVE at 0x12d8861d3d0>,\n",
       " <model.CVE.CVE at 0x12d88608d10>,\n",
       " <model.CVE.CVE at 0x12d8866e550>,\n",
       " <model.CVE.CVE at 0x12d88551150>,\n",
       " <model.CVE.CVE at 0x12d8867d750>,\n",
       " <model.CVE.CVE at 0x12d8866e890>,\n",
       " <model.CVE.CVE at 0x12d88613f10>,\n",
       " <model.CVE.CVE at 0x12d8860bbd0>,\n",
       " <model.CVE.CVE at 0x12d88673fd0>,\n",
       " <model.CVE.CVE at 0x12d88612310>,\n",
       " <model.CVE.CVE at 0x12d8867c690>,\n",
       " <model.CVE.CVE at 0x12d8846bed0>,\n",
       " <model.CVE.CVE at 0x12d8865a750>,\n",
       " <model.CVE.CVE at 0x12d88550c50>,\n",
       " <model.CVE.CVE at 0x12d88484610>,\n",
       " <model.CVE.CVE at 0x12d8867e490>,\n",
       " <model.CVE.CVE at 0x12d8866e990>,\n",
       " <model.CVE.CVE at 0x12d880c8f10>,\n",
       " <model.CVE.CVE at 0x12d8866ed50>,\n",
       " <model.CVE.CVE at 0x12d88671010>,\n",
       " <model.CVE.CVE at 0x12d886a7910>,\n",
       " <model.CVE.CVE at 0x12d884fa1d0>,\n",
       " <model.CVE.CVE at 0x12d886a6390>,\n",
       " <model.CVE.CVE at 0x12d88621690>,\n",
       " <model.CVE.CVE at 0x12d88670450>,\n",
       " <model.CVE.CVE at 0x12d886a67d0>,\n",
       " <model.CVE.CVE at 0x12d88693a10>,\n",
       " <model.CVE.CVE at 0x12d886b7150>,\n",
       " <model.CVE.CVE at 0x12d8868c4d0>,\n",
       " <model.CVE.CVE at 0x12d886b5310>,\n",
       " <model.CVE.CVE at 0x12d886a7450>,\n",
       " <model.CVE.CVE at 0x12d8867eed0>,\n",
       " <model.CVE.CVE at 0x12d8868d410>,\n",
       " <model.CVE.CVE at 0x12d88637b90>,\n",
       " <model.CVE.CVE at 0x12d886120d0>,\n",
       " <model.CVE.CVE at 0x12d88611290>,\n",
       " <model.CVE.CVE at 0x12d88611c10>,\n",
       " <model.CVE.CVE at 0x12d886b4910>,\n",
       " <model.CVE.CVE at 0x12d8867df10>,\n",
       " <model.CVE.CVE at 0x12d886bac90>,\n",
       " <model.CVE.CVE at 0x12d88659b90>,\n",
       " <model.CVE.CVE at 0x12d8867d450>,\n",
       " <model.CVE.CVE at 0x12d88652f90>,\n",
       " <model.CVE.CVE at 0x12d88555350>,\n",
       " <model.CVE.CVE at 0x12d886a5950>,\n",
       " <model.CVE.CVE at 0x12d8866cb50>,\n",
       " <model.CVE.CVE at 0x12d8867f850>,\n",
       " <model.CVE.CVE at 0x12d88609410>,\n",
       " <model.CVE.CVE at 0x12d88611850>,\n",
       " <model.CVE.CVE at 0x12d885f60d0>,\n",
       " <model.CVE.CVE at 0x12d886115d0>,\n",
       " <model.CVE.CVE at 0x12d884fbb90>,\n",
       " <model.CVE.CVE at 0x12d8860b950>,\n",
       " <model.CVE.CVE at 0x12d88613190>,\n",
       " <model.CVE.CVE at 0x12d8861f3d0>,\n",
       " <model.CVE.CVE at 0x12d880c8c50>,\n",
       " <model.CVE.CVE at 0x12d886217d0>,\n",
       " <model.CVE.CVE at 0x12d884f9e50>,\n",
       " <model.CVE.CVE at 0x12d880c3150>,\n",
       " <model.CVE.CVE at 0x12d886b5d50>,\n",
       " <model.CVE.CVE at 0x12d8868c590>,\n",
       " <model.CVE.CVE at 0x12d8861d550>,\n",
       " <model.CVE.CVE at 0x12d8860bc90>,\n",
       " <model.CVE.CVE at 0x12d886918d0>,\n",
       " <model.CVE.CVE at 0x12d8861e6d0>,\n",
       " <model.CVE.CVE at 0x12d88631dd0>,\n",
       " <model.CVE.CVE at 0x12d8864fcd0>,\n",
       " <model.CVE.CVE at 0x12d885f4410>,\n",
       " <model.CVE.CVE at 0x12d88670690>,\n",
       " <model.CVE.CVE at 0x12d8862d010>,\n",
       " <model.CVE.CVE at 0x12d8866efd0>,\n",
       " <model.CVE.CVE at 0x12d886b6cd0>,\n",
       " <model.CVE.CVE at 0x12d8860b450>,\n",
       " <model.CVE.CVE at 0x12d88621890>,\n",
       " <model.CVE.CVE at 0x12d8868e5d0>,\n",
       " <model.CVE.CVE at 0x12d88631a10>]"
      ]
     },
     "execution_count": 4,
     "metadata": {},
     "output_type": "execute_result"
    }
   ],
   "source": [
    "# 将ciInfoList转为cve_id_list\n",
    "cve_id_list = []\n",
    "for ciInfo in ciInfoList:\n",
    "    cve_id_list.append(ciInfo.cve_id)\n",
    "# 对这些CI进行分析\n",
    "cveList = CVEService.get_cve_list(cve_id_list)\n",
    "cveList"
   ]
  },
  {
   "cell_type": "code",
   "execution_count": 5,
   "metadata": {},
   "outputs": [
    {
     "name": "stdout",
     "output_type": "stream",
     "text": [
      "cve_id: CVE-2022-48921, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2024-39468, mainline_commitId: 02c418774f76a0a36a6195c9dbf8971eb4130a15, stable_commitId: b055752675cd1d1db4ac9c2750db3dc3e89ea261, title: smb: client: fix deadlock in smb2_find_smb_tcon(), fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9pf203qrSQ5VpDTiG=U0DUa7gC1NJmJAog0y7U=TcuFjA@mail.gmail.com/\n",
      "cve_id: CVE-2024-43901, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2024-44938, mainline_commitId: None, stable_commitId: None, title: jfs: Fix shift-out-of-bounds in dbDiscardAG, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/\n",
      "cve_id: CVE-2024-45028, mainline_commitId: a1e627af32ed60713941cbfc8075d44cad07f6dd, stable_commitId: 9b9ba386d7bfdbc38445932c90fa9444c0524bea, title: mmc: mmc_test: Fix NULL dereference on allocation failure, fixes_commitId: Introduced by commit 2661081 (&#34;mmc_test: highmem tests&#34;) in v2.6.27-rc1. Fixed in v6.11-rc5., cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/\n",
      "cve_id: CVE-2024-44982, mainline_commitId: bfa1a6283be390947d3649c482e5167186a37016, stable_commitId: None, title: drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails, fixes_commitId: Introduced by commit 25fdd59 (&#34;drm/msm: Add SDM845 DPU support&#34;) in v4.19-rc1. Fixed in v6.11-rc5., cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/\n",
      "cve_id: CVE-2024-44958, mainline_commitId: e22f910a26cc2a3ac9c66b8e935ef2a7dd881117, stable_commitId: None, title: sched/smt: Fix unbalance sched_smt_present dec/inc, fixes_commitId: Introduced by commit c5511d0 (&#34;sched/smt: Make sched_smt_present track topology&#34;) in v4.20-rc5., cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/\n",
      "cve_id: CVE-2024-44943, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2022-48916, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2022-48905, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2024-45009, mainline_commitId: 1c1f721375989579e46741f59523e39ec9b2a9bd, stable_commitId: None, title: mptcp: pm: only decrement add_addr_accepted for MPJ req, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9rm1=zQVazcf2R5KeOq4QVxGRr6ozVoE+QW1v3WOSKZ=A@mail.gmail.com/\n",
      "cve_id: CVE-2024-46675, mainline_commitId: 14e497183df28c006603cc67fd3797a537eef7b9, stable_commitId: b72da4d89b97da71e056cc4d1429b2bc426a9c2f, title: usb: dwc3: core: Prevent USB core invalid event buffer, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9rm1=zQVazcf2R5KeOq4QVxGRr6ozVoE+QW1v3WOSKZ=A@mail.gmail.com/\n",
      "cve_id: CVE-2022-48914, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2024-42286, mainline_commitId: eb1d4ce2609584eeb7694866f34d4b213caa3af9, stable_commitId: a3ab508a4853a9f5ae25a7816a4889f09938f63c, title: scsi: qla2xxx: validate nvme_local_port correctly, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9pV6wf1Pdm3jYcNbjopB-3HzYfRkDLLMyHzLtH0Hcd3RQ@mail.gmail.com/\n",
      "cve_id: CVE-2024-42136, mainline_commitId: efb905aeb44b0e99c0e6b07865b1885ae0471ebf, stable_commitId: None, title: cdrom: rearrange last_media_change check to avoid, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9pMBYkD3R3zDqMTfQEX6Qj9Nz3=1TRbiEe+KefEmu=N4g@mail.gmail.com/\n",
      "cve_id: CVE-2024-46677, mainline_commitId: defd8b3c37b0f9cb3e0f60f47d3d78d459d57fda, stable_commitId: 8bbb9e4e0e66a39282e582d0440724055404b38c, title: gtp: fix a potential NULL pointer dereference, fixes_commitId: Introduced by commit 1e3a3ab (&#34;gtp: make GTP sockets in gtp_newlink optional&#34;) in v4.12-rc1., cve_url: https://lore.kernel.org/all/CAODzB9rm1=zQVazcf2R5KeOq4QVxGRr6ozVoE+QW1v3WOSKZ=A@mail.gmail.com/\n",
      "cve_id: CVE-2024-44948, mainline_commitId: None, stable_commitId: 450b6b22acdaac67a18eaf5ed498421ffcf10051, title: x86/mtrr: Check if fixed MTRRs exist before saving them, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/\n",
      "cve_id: CVE-2024-41040, mainline_commitId: 26488172b0292bed837b95a006a3f3431d1898c3, stable_commitId: b81a523d54ea689414f67c9fb81a5b917a41ed55, title: net/sched: Fix UAF when resolving a clash, fixes_commitId: Introduced by commit 0cc254e (&#34;net/sched: act_ct: Offload connections with commit action&#34;) in v5.13-rc5., cve_url: https://lore.kernel.org/all/CAODzB9pMBYkD3R3zDqMTfQEX6Qj9Nz3=1TRbiEe+KefEmu=N4g@mail.gmail.com/\n",
      "cve_id: CVE-2024-43893, mainline_commitId: None, stable_commitId: 52b138f1021113e593ee6ad258ce08fe90693a9e, title: serial: core: check uartclk for zero to avoid divide by zero, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/\n",
      "cve_id: CVE-2024-43906, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2024-45003, mainline_commitId: 2a0629834cd82f05d424bbc193374f9a43d1f87d, stable_commitId: 03880af02a78bc9a98b5a581f529cf709c88a9b8, title: vfs: Don&#39;t evict inode under the inode lru traversing context, fixes_commitId: Introduced by commit e50e512 (&#34;ext4: xattr-in-inode support&#34;) in v4.13-rc1. Introduced by commit 7959cf3 (&#34;ubifs: journal: Handle xattrs like, cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/\n",
      "cve_id: CVE-2021-47610, mainline_commitId: 26d776fd0f79f093a5d0ce1a4c7c7a992bc3264c, stable_commitId: None, title: drm/msm: Fix null ptr access msm_ioctl_gem_submit(), fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9qccTi6qBXT3gzRzxozhpk86SfisvN6yz1f5bwATyHK4g@mail.gmail.com/\n",
      "cve_id: CVE-2024-43904, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2022-48901, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2024-41060, mainline_commitId: 6fb15dcbcf4f212930350eaee174bb60ed40a536, stable_commitId: None, title: drm/radeon: check bo_va-&gt;bo is non-NULL before using it, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9pMBYkD3R3zDqMTfQEX6Qj9Nz3=1TRbiEe+KefEmu=N4g@mail.gmail.com/\n",
      "cve_id: CVE-2024-46798, mainline_commitId: b4a90b543d9f62d3ac34ec1ab97fc5334b048565, stable_commitId: 8ca21e7a27c66b95a4b215edc8e45e5d66679f9f, title: ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object, fixes_commitId: Introduced by commit a72706e (&#34;ASoC: codec2codec: remove ephemeral variables&#34;) in v5.4-rc1., cve_url: https://lore.kernel.org/all/CAODzB9rm1=zQVazcf2R5KeOq4QVxGRr6ozVoE+QW1v3WOSKZ=A@mail.gmail.com/\n",
      "cve_id: CVE-2024-44941, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2021-4441, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2024-43912, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2023-52912, mainline_commitId: 99f1a36c90a7524972be5a028424c57fa17753ee, stable_commitId: None, title: drm/amdgpu: Fixed bug on error when unloading amdgpu, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9pV6wf1Pdm3jYcNbjopB-3HzYfRkDLLMyHzLtH0Hcd3RQ@mail.gmail.com/\n",
      "cve_id: CVE-2023-52916, mainline_commitId: c281355068bc258fd619c5aefd978595bede7bfe, stable_commitId: None, title: media: aspeed: Fix memory overwrite if timing is 1600x, fixes_commitId: Introduced by commit d0876b2 (&#34;mptcp: add the incoming RM_ADDR support&#34;) in v5.10-rc1., cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/\n",
      "cve_id: CVE-2024-45018, mainline_commitId: e9767137308daf906496613fd879808a07f006a2, stable_commitId: e5ceff2196dc633c995afb080f6f44a72cff6e1d, title: netfilter: flowtable: initialise extack before use, fixes_commitId: Introduced by commit c29f74e (&#34;netfilter: nf_flow_table: hardware offload support&#34;) in v5.5-rc1., cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/\n",
      "cve_id: CVE-2024-46674, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2022-48893, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2024-43909, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2024-44940, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2022-48826, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2022-48906, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2022-48923, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2024-42123, mainline_commitId: 506c245f3f1cd989cb89811a7f06e04ff8813a0d, stable_commitId: 5ceb40cdee721e13cbe15a0515cacf984e11236b, title: drm/amdgpu: fix double free err_addr pointer warnings, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9pMBYkD3R3zDqMTfQEX6Qj9Nz3=1TRbiEe+KefEmu=N4g@mail.gmail.com/\n",
      "cve_id: CVE-2024-43913, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2024-43894, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2024-43886, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2024-43895, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2022-48931, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2024-44950, mainline_commitId: 7d3b793faaab1305994ce568b59d61927235f57b, stable_commitId: f098e8fc7227166206256c18d56ab622039108b1, title: serial: sc16is7xx: fix invalid FIFO access with, fixes_commitId: Introduced by commit dfeae61 (&#34;serial: sc16is7xx&#34;) in v3.16-rc1. Fixed in v6.11-rc3., cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/\n",
      "cve_id: CVE-2024-43883, mainline_commitId: None, stable_commitId: 4dacdb9720aaab10b6be121eae55820174d97174, title: usb: vhci-hcd: Do not drop references before new, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/\n",
      "cve_id: CVE-2024-43914, mainline_commitId: None, stable_commitId: c384dd4f1fb3b14a2fd199360701cc163ea88705, title: md/raid5: avoid BUG_ON() while continue reshape after, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/\n",
      "cve_id: CVE-2022-48902, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2022-48910, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2024-45016, mainline_commitId: c07ff8592d57ed258afee5a5e04991a48dbaf382, stable_commitId: c414000da1c2ea1ba9a5e5bb1a4ba774e51e202d, title: netem: fix return value if duplicate enqueue fails, fixes_commitId: Introduced by commit 5845f70 (&#34;net: netem: fix skb length BUG_ON in __skb_to_sgvec&#34;) in v5.0., cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/\n",
      "cve_id: CVE-2024-44960, mainline_commitId: 973a57891608a98e894db2887f278777f564de18, stable_commitId: 7cc9ebcfe58be22f18056ad8bc6272d120bdcb3e, title: usb: gadget: core: Check for unset descriptor, fixes_commitId: Introduced by commit 54f83b8 (&#34;USB: gadget: Reject endpoints with 0 maxpacket value&#34;) in v5.4-rc6., cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/\n",
      "cve_id: CVE-2024-44968, mainline_commitId: 541a900d245536d4809cb1aa322c3fcc2cdb58a6, stable_commitId: 668c6c4a7e9e9f081c06b70f30104fb7013437ed, title: tick/broadcast: Move per CPU pointer access into the, fixes_commitId: Introduced by commit f7d43dd (&#34;tick/broadcast: Make takeover of broadcast hrtimer reliable&#34;) in v6.11-rc1., cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/\n",
      "cve_id: CVE-2024-45008, mainline_commitId: 99d3bf5f7377d42f8be60a6b9cb60fb0be34dceb, stable_commitId: 05dd9aabd04f9b5eb04dab9bb83d8c3e982d7549, title: Input: MT - limit max slots, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/\n",
      "cve_id: CVE-2024-44947, mainline_commitId: 3c0da3d163eb32f1f91891efaade027fa9b245b9, stable_commitId: 4690e2171f651e2b415e3941ce17f2f7b813aff6, title: fuse: Initialize beyond-EOF page contents before, fixes_commitId: Introduced by commit a1d75f2 (&#34;fuse: add store request&#34;) in v2.6.36-rc1. Fixed in v6.11-rc4., cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/\n",
      "cve_id: CVE-2024-42253, mainline_commitId: bfc6444b57dc7186b6acc964705d7516cbaf3904, stable_commitId: None, title: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9r0+B=YgU2Wp4oEiiLzFa2oAVPKdD=dOqDQ8Kd=UgaMzA@mail.gmail.com/\n",
      "cve_id: CVE-2024-46673, mainline_commitId: 919ddf8336f0b84c0453bac583808c9f165a85c2, stable_commitId: 9e96dea7eff6f2bbcd0b42a098012fc66af9eb69, title: scsi: aacraid: Fix double-free on probe failure, fixes_commitId: Introduced by commit 8e0c5eb (&#34;[SCSI] aacraid: Newer adapter communication iterface support&#34;) in v2.6.20.16., cve_url: https://lore.kernel.org/all/CAODzB9rm1=zQVazcf2R5KeOq4QVxGRr6ozVoE+QW1v3WOSKZ=A@mail.gmail.com/\n",
      "cve_id: CVE-2024-45026, mainline_commitId: 7db4042336580dfd75cb5faa82c12cd51098c90b, stable_commitId: e245a18281c252c8dbc467492e09bb5d4b012118, title: s390/dasd: fix error recovery leading to data, fixes_commitId: Introduced by commit 5e2b17e (&#34;s390/dasd: Add dynamic formatting support for ESE volumes&#34;) in v5.3-rc1., cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/\n",
      "cve_id: CVE-2024-41076, mainline_commitId: aad11473f8f4be3df86461081ce35ec5b145ba68, stable_commitId: None, title: NFSv4: Fix memory leak in nfs4_set_security_label, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9pMBYkD3R3zDqMTfQEX6Qj9Nz3=1TRbiEe+KefEmu=N4g@mail.gmail.com/\n",
      "cve_id: CVE-2024-45015, mainline_commitId: aedf02e46eb549dac8db4821a6b9f0c6bf6e3990, stable_commitId: None, title: drm/msm/dpu: move dpu_encoder&#39;s connector assignment, fixes_commitId: Introduced by commit 25fdd59 (&#34;drm/msm: Add SDM845 DPU support&#34;) in v4.19-rc1. Fixed in v6.11-rc5., cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/\n",
      "cve_id: CVE-2024-1151, mainline_commitId: 6e2f90d31fe09f2b852de25125ca875aabd81367, stable_commitId: 55cfccb658fc142d7fbfeae2d0496b7841d128c3, title: net: openvswitch: limit the number of recursions from action sets, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9pjy0TLHQN0yHWc8MoTDk+azCAFiUxvLGHSBe3LWELERg@mail.gmail.com/\n",
      "cve_id: CVE-2024-44952, mainline_commitId: 15fffc6a5624b13b428bb1c6e9088e32a55eb82c, stable_commitId: f098e8fc7227166206256c18d56ab622039108b1, title: driver core: Fix uevent_show() vs driver detach race, fixes_commitId: Introduced by commit c0a4009 (&#34;drivers: core: synchronize really_probe() and dev_uevent()&#34;) in v6.10-rc4., cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/\n",
      "cve_id: CVE-2022-48900, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2023-45896, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2023-52915, mainline_commitId: 7bf744f2de0a848fb1d717f5831b03db96feae89, stable_commitId: 6c01ef65de0b321b2db1ef9abf8f1d15862b937e, title: media: dvb-usb-v2: af9035: Fix null-ptr-deref in, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/\n",
      "cve_id: CVE-2024-46700, mainline_commitId: 11752c013f562a1124088a35bd314aa0e9f0e88f, stable_commitId: 747bc154577de6e6af4bc99abfa859b8419bb4d8, title: drm/amdgpu/mes: fix mes ring buffer overflow, fixes_commitId: Introduced by commit de32462 (&#34;drm/amdgpu: cleanup MES11 command submission&#34;) in v6.11-rc1., cve_url: https://lore.kernel.org/all/CAODzB9rm1=zQVazcf2R5KeOq4QVxGRr6ozVoE+QW1v3WOSKZ=A@mail.gmail.com/\n",
      "cve_id: CVE-2024-25741, mainline_commitId: e587a7633dfee8987a999cf253f7c52a8e09276c, stable_commitId: 2798fc1560716c7945587ad43bef8f31f78c00af, title: usb/f_printer: WARNING in usb_ep_queue, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9pf203qrSQ5VpDTiG=U0DUa7gC1NJmJAog0y7U=TcuFjA@mail.gmail.com/\n",
      "cve_id: CVE-2024-44957, mainline_commitId: 1c682593096a487fd9aebc079a307ff7a6d054a3, stable_commitId: None, title: xen: privcmd: Switch from mutex to spinlock for irqfds, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/\n",
      "cve_id: CVE-2024-44939, mainline_commitId: None, stable_commitId: None, title: jfs: fix null ptr deref in dtInsertEntry, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/\n",
      "cve_id: CVE-2024-41066, mainline_commitId: 0983d288caf984de0202c66641577b739caad561, stable_commitId: None, title: ibmvnic: Add tx check to prevent skb leak, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9pMBYkD3R3zDqMTfQEX6Qj9Nz3=1TRbiEe+KefEmu=N4g@mail.gmail.com/\n",
      "cve_id: CVE-2024-44988, mainline_commitId: 528876d867a23b5198022baf2e388052ca67c952, stable_commitId: 050e7274ab2150cd212b2372595720e7b83a15bd, title: net: dsa: mv88e6xxx: Fix out-of-bound access, fixes_commitId: Introduced by commit 75c05a7 (&#34;net: dsa: mv88e6xxx: Fix counting of ATU violations&#34;) in v5.0-rc6., cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/\n",
      "cve_id: CVE-2022-48920, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2024-43903, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None\n",
      "cve_id: CVE-2024-46800, mainline_commitId: 3b3a2a9c6349e25a025d2330f479bc33a6ccb54a, stable_commitId: 98c75d76187944296068d685dfd8a1e9fd8c4fdc, title: sch/netem: fix use after free in netem_dequeue, fixes_commitId: Introduced by commit 5061253 (&#34;netem: fix classful handling&#34;) in v3.3-rc1. Fixed in v6.11-rc7., cve_url: https://lore.kernel.org/all/CAODzB9rm1=zQVazcf2R5KeOq4QVxGRr6ozVoE+QW1v3WOSKZ=A@mail.gmail.com/\n",
      "cve_id: CVE-2024-44954, mainline_commitId: None, stable_commitId: e7e7d2b180d8f297cea6db43ea72402fd33e1a29, title: ALSA: line6: Fix racy access to midibuf, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/\n",
      "cve_id: CVE-2024-45021, mainline_commitId: 046667c4d3196938e992fba0dfcde570aa85cd0e, stable_commitId: ad149f5585345e383baa65f1539d816cd715fd3b, title: memcg_write_event_control(): fix a user-triggerable oops, fixes_commitId: Introduced by commit 0dea116 (&#34;cgroup: implement eventfd-based generic API for notifications&#34;) in v2.6.34-rc2., cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/\n",
      "cve_id: CVE-2024-45025, mainline_commitId: 9a2fa1472083580b6c66bdaf291f591e1170123a, stable_commitId: fe5bf14881701119aeeda7cf685f3c226c7380df, title: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHAR, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/\n",
      "cve_id: CVE-2024-42287, mainline_commitId: 4475afa2646d3fec176fc4d011d3879b26cb26e3, stable_commitId: 57ba7563712227647f82a92547e82c96cd350553, title: scsi: qla2xxx: Complete command early within lock, fixes_commitId: Introduced by commit 0367076 (&#34;scsi: qla2xxx: Perform lockless command completion in abort path&#34;) in v6.3-rc4., cve_url: https://lore.kernel.org/all/CAODzB9pV6wf1Pdm3jYcNbjopB-3HzYfRkDLLMyHzLtH0Hcd3RQ@mail.gmail.com/\n",
      "cve_id: CVE-2024-38600, mainline_commitId: 87988a534d8e12f2e6fc01fe63e6c1925dc5307c, stable_commitId: None, title: ALSA: Fix deadlocks with kctl removals at disconnection, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9qccTi6qBXT3gzRzxozhpk86SfisvN6yz1f5bwATyHK4g@mail.gmail.com/\n"
     ]
    }
   ],
   "source": [
    "for cve in cveList:\n",
    "    print(cve)"
   ]
  },
  {
   "cell_type": "code",
   "execution_count": 6,
   "metadata": {},
   "outputs": [
    {
     "ename": "SyntaxError",
     "evalue": "invalid syntax (1468119324.py, line 1)",
     "output_type": "error",
     "traceback": [
      "\u001b[1;36m  Cell \u001b[1;32mIn[6], line 1\u001b[1;36m\u001b[0m\n\u001b[1;33m    for cve\u001b[0m\n\u001b[1;37m           ^\u001b[0m\n\u001b[1;31mSyntaxError\u001b[0m\u001b[1;31m:\u001b[0m invalid syntax\n"
     ]
    }
   ],
   "source": []
  }
 ],
 "metadata": {
  "kernelspec": {
   "display_name": "base",
   "language": "python",
   "name": "python3"
  },
  "language_info": {
   "codemirror_mode": {
    "name": "ipython",
    "version": 3
   },
   "file_extension": ".py",
   "mimetype": "text/x-python",
   "name": "python",
   "nbconvert_exporter": "python",
   "pygments_lexer": "ipython3",
   "version": "3.8.0"
  }
 },
 "nbformat": 4,
 "nbformat_minor": 2
}
