External check

2018-05-22 Thread Security Tracker
CVE-2018-0765: TODO: check, can potentially affect mono packages
CVE-2018-1039: TODO: check, can potentially affect mono packages
CVE-2018-1067: TODO: check, unclear if issue is in src:untertow or in its use 
in WildFly (issue is incomplete fix for CVE-2016-4993, which might need an 
update depending on the result)
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.



DSA candidates

2018-05-22 Thread Security Tracker
blender
--
cups
--
derby
--
evolution
--
exiv2
--
glibc
--
imagemagick
--
jasperreports
--
jruby
--
kdepim
--
libpodofo
--
libspring-java
--
libvncserver
--
memcached
--
opencv
--
openexr
--
python-pysaml2
--
ruby-rack-protection
--
ruby-sanitize
--
simplesamlphp
--
slurm-llnl
--
tiff
--
vim-syntastic
--
wireshark
--
xdg-utils
--
xen
--
zookeeper
--
gitlab/stable
--
kf5-messagelib/stable
--
phpmyadmin/stable
--
qemu/stable
--
ruby-doorkeeper/stable
--
ruby-omniauth-saml/stable
--
ruby-rails-html-sanitizer/stable
--
ruby-saml/stable
--
vncterm/stable
--
libspring-security-2.0-java/oldstable
--
php-horde-crypt/oldstable
--
--
The above is a list of DSA candidates based on the tracker's information.
One should evaluate the candidates and either add them to dsa-needed.txt
or consider tagging them no-dsa.