External check
CVE-2018-0765: TODO: check, can potentially affect mono packages CVE-2018-1039: TODO: check, can potentially affect mono packages CVE-2018-1067: TODO: check, unclear if issue is in src:untertow or in its use in WildFly (issue is incomplete fix for CVE-2016-4993, which might need an update depending on the result) -- The output might be a bit terse, but the above ids are known elsewhere, check the references in the tracker. The second part indicates the status of that id in the tracker at the moment the script was run.
DSA candidates
blender -- cups -- derby -- evolution -- exiv2 -- glibc -- imagemagick -- jasperreports -- jruby -- kdepim -- libpodofo -- libspring-java -- libvncserver -- memcached -- opencv -- openexr -- python-pysaml2 -- ruby-rack-protection -- ruby-sanitize -- simplesamlphp -- slurm-llnl -- tiff -- vim-syntastic -- wireshark -- xdg-utils -- xen -- zookeeper -- gitlab/stable -- kf5-messagelib/stable -- phpmyadmin/stable -- qemu/stable -- ruby-doorkeeper/stable -- ruby-omniauth-saml/stable -- ruby-rails-html-sanitizer/stable -- ruby-saml/stable -- vncterm/stable -- libspring-security-2.0-java/oldstable -- php-horde-crypt/oldstable -- -- The above is a list of DSA candidates based on the tracker's information. One should evaluate the candidates and either add them to dsa-needed.txt or consider tagging them no-dsa.