External check
CVE-2019-0223: TODO: check CVE-2019-3868: RESERVED -- The output might be a bit terse, but the above ids are known elsewhere, check the references in the tracker. The second part indicates the status of that id in the tracker at the moment the script was run.
DSA candidates
activemq/stable -- atftp/stable -- borgbackup/stable -- ceph/stable -- evolution-data-server/stable -- evolution-ews/stable -- ffmpeg/stable -- freeradius/stable -- gnutls28/stable -- graphviz/stable -- guacamole-client/stable -- hdf5/stable -- imagemagick/stable -- jackson-databind/stable -- jinja2/stable -- jruby/stable -- jupyter-notebook/stable -- libmediainfo/stable -- libspring-java/stable -- modsecurity-crs/stable -- monit/stable -- mupdf/stable -- node-fresh/stable -- openvswitch/stable -- pacemaker/stable -- php7.0/stable -- phpmyadmin/stable -- poppler/stable -- python-urllib3/stable -- python2.7/stable -- python3.5/stable -- resiprocate/stable -- ruby-rails-admin/stable -- ruby-rails-html-sanitizer/stable -- ruby-zip/stable -- salt/stable -- sqlalchemy/stable -- suricata/stable -- symfony/stable -- tomcat8/stable -- wpa/stable -- -- The above is a list of DSA candidates based on the tracker's information. One should evaluate the candidates and either add them to dsa-needed.txt or consider tagging them no-dsa.