Hi, This week I:
- Went through other distributions' vulnerability identifiers for similarities in notation. - Implemented a vulnerability identifier normalization function, so that vulnerabilities inconsistent in notation are normalized and uniform. - Ran a script on the DSA list[1] to check how many iterations of the same DSA have newer CVEs. This was mainly for ascertaining if it would be necessary to crawl all iterations of a given DSA. - Refactored some code, particularly the vulnerability aliasing, xpath determination and Debian crawling functionalities. - Rewrote some tests so that only public APIs are tested. - Went through Debian's New Maintainers' Guide[2] and practised a bit of packaging. My working repository: https://github.com/jajajasalu2/patch-finder Cheers, Jaskaran [1] https://salsa.debian.org/security-tracker-team/security-tracker/blob/master/data/DSA/list [2]https://www.debian.org/doc/manuals/maint-guide/