diff --git a/cve-vulner-manager/controllers/hook.go b/cve-vulner-manager/controllers/hook.go index 2a60429f2d98201c3600d437d2f0022d2a086862..fce3df266f4257a9b4002ecb320201c26a58354a 100644 --- a/cve-vulner-manager/controllers/hook.go +++ b/cve-vulner-manager/controllers/hook.go @@ -1765,6 +1765,8 @@ func analysisComment(owner, accessToken, path string, cuAccount string, cBody st } issueTmp.OpenEulerScore = fv cols = append(cols, k) + // Dominated by openeuler score, update cve level + issueTmp.CveLevel = models.OpenEulerScoreProc(fv) } case "openeuler_vector": if v != "" && len(v) > 1 { diff --git a/cve-vulner-manager/taskhandler/common.go b/cve-vulner-manager/taskhandler/common.go index 4d197b7698fa3533fef9da02c3a3aac0be8bfc09..07b3a3d129a0fddb512d77fda03b1ef426ad782b 100644 --- a/cve-vulner-manager/taskhandler/common.go +++ b/cve-vulner-manager/taskhandler/common.go @@ -904,10 +904,6 @@ func CreateIssueBody(accessToken, owner, path, assignee string, if err != nil { floatOpenEulerScore = 0.0 } - nvdScore, err := strconv.ParseFloat(score, 64) - if err != nil { - nvdScore = 0.0 - } cveAnalysis := "" if its.CveAnalysis != "" && len(its.CveAnalysis) > 1 { cveAnalysis = strings.Replace(its.CveAnalysis, "\n", "", -1) @@ -983,7 +979,7 @@ func CreateIssueBody(accessToken, owner, path, assignee string, cvePkg := fmt.Sprintf("[%s](https://gitee.com/%s/%s)", cve.PackName, owner, path) cveRepo := fmt.Sprintf("[%s](https://gitee.com/%s/%s)", cve.RepoName, owner, path) cve.CveDetailUrl = "https://nvd.nist.gov/vuln/detail/" + cve.CveNum - cve.CveLevel = models.OpenEulerScoreProc(nvdScore) + cve.CveLevel = models.OpenEulerScoreProc(its.OpenEulerScore) if len(cve.CveVersion) > 0 && cve.CveVersion[0] == ',' { cve.CveVersion = cve.CveVersion[1:] }