aboutsummaryrefslogtreecommitdiffstats
path: root/chinese
diff options
context:
space:
mode:
authorThomas Lange <lange@debian.org>2024-01-09 20:01:07 +0100
committerThomas Lange <lange@debian.org>2024-01-09 20:01:07 +0100
commit2aa73ff15bfc4eb2afd85ca6d3ba081babf22432 (patch)
tree138d359f85bd93fc1849b19a5526da658eeb67cb /chinese
parente005fa1933fbc76d8755c603a6a35feedb002e49 (diff)
remove unused security files
This is what I did: git rm -rf */security/199* git rm -rf */security/20* git rm -rf */security/key-rollover git rm -rf */security/undated git rm -rf */lts/security/20* It removes 54335 files, including around 9650 DSA/DLA data files, 44189 wml files, nearly 500 Makefiles
Diffstat (limited to 'chinese')
-rw-r--r--chinese/security/2002/Makefile1
-rw-r--r--chinese/security/2002/dsa-197.wml25
-rw-r--r--chinese/security/2002/dsa-198.wml26
-rw-r--r--chinese/security/2002/dsa-200.wml23
-rw-r--r--chinese/security/2002/dsa-202.wml42
-rw-r--r--chinese/security/2002/dsa-203.wml29
-rw-r--r--chinese/security/2002/dsa-204.wml26
-rw-r--r--chinese/security/2009/Makefile1
-rw-r--r--chinese/security/2009/dsa-1904.wml25
-rw-r--r--chinese/security/2009/dsa-1905.wml24
-rw-r--r--chinese/security/2009/dsa-1906.wml20
-rw-r--r--chinese/security/2009/dsa-1907.wml37
-rw-r--r--chinese/security/2009/dsa-1908.wml41
-rw-r--r--chinese/security/2017/Makefile1
-rw-r--r--chinese/security/2017/index.wml12
-rw-r--r--chinese/security/2018/Makefile1
-rw-r--r--chinese/security/2018/dsa-4205.wml13
-rw-r--r--chinese/security/2018/dsa-4212.wml21
-rw-r--r--chinese/security/2018/dsa-4215.wml19
-rw-r--r--chinese/security/2018/index.wml12
-rw-r--r--chinese/security/2019/Makefile1
-rw-r--r--chinese/security/2019/dsa-4543.wml23
-rw-r--r--chinese/security/2019/dsa-4544.wml17
-rw-r--r--chinese/security/2019/dsa-4574.wml17
-rw-r--r--chinese/security/2021/Makefile1
-rw-r--r--chinese/security/2021/dsa-4822.wml18
-rw-r--r--chinese/security/2021/dsa-4823.wml18
-rw-r--r--chinese/security/2021/dsa-4824.wml18
-rw-r--r--chinese/security/2021/dsa-4825.wml36
-rw-r--r--chinese/security/2021/dsa-4826.wml18
-rw-r--r--chinese/security/2021/dsa-4827.wml18
-rw-r--r--chinese/security/2021/dsa-4828.wml18
-rw-r--r--chinese/security/2021/dsa-4829.wml23
-rw-r--r--chinese/security/2021/dsa-4830.wml35
-rw-r--r--chinese/security/2021/dsa-4831.wml19
-rw-r--r--chinese/security/2021/dsa-4832.wml17
-rw-r--r--chinese/security/2021/dsa-4833.wml18
-rw-r--r--chinese/security/2021/dsa-4834.wml18
-rw-r--r--chinese/security/2021/dsa-4835.wml18
-rw-r--r--chinese/security/2021/dsa-4836.wml19
-rw-r--r--chinese/security/2021/dsa-4837.wml20
-rw-r--r--chinese/security/2021/dsa-4838.wml19
-rw-r--r--chinese/security/2021/dsa-4839.wml19
-rw-r--r--chinese/security/2021/dsa-4840.wml18
-rw-r--r--chinese/security/2021/dsa-4841.wml20
-rw-r--r--chinese/security/2021/dsa-4842.wml18
-rw-r--r--chinese/security/2021/dsa-4843.wml91
-rw-r--r--chinese/security/2021/dsa-4844.wml20
-rw-r--r--chinese/security/2021/dsa-4845.wml20
-rw-r--r--chinese/security/2021/dsa-4846.wml150
-rw-r--r--chinese/security/2021/dsa-4847.wml19
-rw-r--r--chinese/security/2021/dsa-4848.wml19
-rw-r--r--chinese/security/2021/dsa-4849.wml20
-rw-r--r--chinese/security/2021/dsa-4850.wml18
-rw-r--r--chinese/security/2021/dsa-4851.wml20
-rw-r--r--chinese/security/2021/dsa-4852.wml19
-rw-r--r--chinese/security/2021/dsa-4853.wml19
-rw-r--r--chinese/security/2021/dsa-4854.wml25
-rw-r--r--chinese/security/2021/dsa-4855.wml28
-rw-r--r--chinese/security/2021/dsa-4856.wml19
-rw-r--r--chinese/security/2021/dsa-4857.wml18
-rw-r--r--chinese/security/2021/dsa-4858.wml62
-rw-r--r--chinese/security/2021/dsa-4859.wml19
-rw-r--r--chinese/security/2021/dsa-4860.wml19
-rw-r--r--chinese/security/2021/dsa-4861.wml19
-rw-r--r--chinese/security/2021/dsa-4862.wml18
-rw-r--r--chinese/security/2021/dsa-4863.wml18
-rw-r--r--chinese/security/2021/dsa-4864.wml20
-rw-r--r--chinese/security/2021/dsa-4865.wml19
-rw-r--r--chinese/security/2021/index.wml12
70 files changed, 0 insertions, 1594 deletions
diff --git a/chinese/security/2002/Makefile b/chinese/security/2002/Makefile
deleted file mode 100644
index 17f19c095e2..00000000000
--- a/chinese/security/2002/Makefile
+++ /dev/null
@@ -1 +0,0 @@
-include $(subst webwml/chinese,webwml/english,$(CURDIR))/Makefile
diff --git a/chinese/security/2002/dsa-197.wml b/chinese/security/2002/dsa-197.wml
deleted file mode 100644
index 5e08d5aa243..00000000000
--- a/chinese/security/2002/dsa-197.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-#use wml::debian::translation-check translation="3d3908a97777c39b4ff6b8457295f222163c479e"
-
-<define-tag description>暫存器溢位</define-tag>
-<define-tag moreinfo>
-#<p>A problem in the Courier sqwebmail package, a CGI program to grant
-#authenticated access to local mailboxes, has been discovered. The
-#program did not drop permissions fast enough upon startup under
-#certain circumstances so a local shell user can execute the sqwebmail
-#binary and manage to read an arbitrary file on the local filesystem.</p>
-<p>在 Courier sqwebmail 套件中發現一個問題。Courier sqwebmail 是一個 CGI [CN:程序:][HKTW:程式:],能透過它[CN:獲取:][HKTW:取得:]本地端[CN:訪問:][HKTW:存取:]郵件的權限。[CN:該程序:][HKTW:這個程式:]啟動時,會在某種情形下來不及阻止不正確的[CN:訪問:][HKTW:存取:]權限,讓本地端[CN:用戶:][HKTW:使用者:]能透過 shell [CN:運行:][HKTW:執行:] sqwebmail [CN:文件:][HKTW:檔:]並讀取本地端系統中的任何[CN:文件:][HKTW:檔案:]。</p>
-
-#<p>This problem has been fixed in version 0.37.3-2.3 for the current
-#stable distribution (woody) and in version 0.40.0-1 for the unstable
-#distribution (sid). The old stable distribution (potato) does not
-#contain Courier sqwebmail packages. <code>courier-ssl</code> packages
-#are also not affected since they don't expose an sqwebmail package.</p>
-<p>這個問題已經在[CN:當前:][HKTW:目前的:]穩定版 (woody) 的 0.37.3-2.3 版,及開發中版本 (sid) 的 0.40.0-1 版中修正。舊的穩定版 (potato) 不包含 Courier sqwebmail 套件。<code>courier-ssl</code> 套件也不會被影響到,因為它們不使用 sqwebmail 套件。</p>
-
-#<p>We recommend that you upgrade your sqwebmail package immediately.</p>
-<p>我們建議您即刻更新您的 sqwebmail 套件。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2002/dsa-197.data"
-# $Id$
diff --git a/chinese/security/2002/dsa-198.wml b/chinese/security/2002/dsa-198.wml
deleted file mode 100644
index 53ffec15e1b..00000000000
--- a/chinese/security/2002/dsa-198.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-
-#use wml::debian::translation-check translation="e6ed305b85f77db8e8f70bb62eb7c447b5598ab9"
-
-<define-tag description>阻絕服務 (DoS) 攻擊</define-tag>
-<define-tag moreinfo>
-#<p>A problem has been discovered in nullmailer, a simple relay-only mail
-#transport agent for hosts that relay mail to a fixed set of smart
-#relays. When a mail is to be delivered locally to a user that doesn't
-#exist, nullmailer tries to deliver it, discovers a user unknown error
-#and stops delivering. Unfortunately, it stops delivering entirely,
-#not only this mail. Hence, it's very easy to craft a denial of service.</p>
-<p>在 nullmailer 中發現了一個問題。nullmailer 是一個只負責轉寄信件的郵件傳遞程式(MTA),用於將信件轉送給固定的聰明轉送伺服器 (smart relays)。當一封郵件到達本地端傳送給不存在的使用者時,nullmailer 會嘗試傳送它,發現使用者不存在,然後停止傳送。不過,它會整個停下來,而不是只停送這封郵件而已。所以,這很容易造成阻絕服務攻擊。</p>
-
-#<p>This problem has been fixed in version 1.00RC5-16.1woody2 for the
-#current stable distribution (woody) and in version 1.00RC5-17 for the
-#unstable distribution (sid). The old stable distribution (potato)
-#does not contain a nullmailer package.</p>
-<p>這個問題已經在目前的穩定版 (woody) 的 1.00RC5-16.1woody2 版,及開發中版本 (sid) 的 1.00RC5-17 版中修正。舊的穩定版 (potato) 套件中沒有 nullmailer 套件。</p>
-
-#<p>We recommend that you upgrade your nullmailer package.</p>
-<p>我們建議您更新您的 nullmailer 套件。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2002/dsa-198.data"
-# $Id$
diff --git a/chinese/security/2002/dsa-200.wml b/chinese/security/2002/dsa-200.wml
deleted file mode 100644
index 3d545a24a87..00000000000
--- a/chinese/security/2002/dsa-200.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="889dc8a1259b47ea6bdda9a1d8702e98782b2ee5"
-
-<define-tag description>遠端安全漏洞 (remote exploit)</define-tag>
-<define-tag moreinfo>
-#<p>Steve Langasek found an exploitable bug in the password handling
-#code in samba: when converting from DOS code-page to little endian
-#UCS2 unicode a buffer length was not checked and a buffer could
-#be overflowed. There is no known exploit for this, but an upgrade
-#is strongly recommended.</p>
-<p>Steve Langasek 發現一個在 samba 密碼處理上的安全漏洞:當它要將 DOS
-code-page 轉變為 little endian UCS2 unicode 時,有一個暫存器的長度未做
-檢查,而可能導致暫存器溢位。目前還沒有接收到任何因此而被入侵的消息,但
-強烈建議大家儘速更新。</p>
-
-#<p>This problem has been fixed in version 2.2.3a-12 of the Debian
-#samba packages and upstream version 2.2.7.</p>
-<p>這個問題在 Debian 中的 samba 套件 2.2.3a-12 版及 2.2.7 版中已做修正。</p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2002/dsa-200.data"
-# $Id$
diff --git a/chinese/security/2002/dsa-202.wml b/chinese/security/2002/dsa-202.wml
deleted file mode 100644
index e20cf64e8fe..00000000000
--- a/chinese/security/2002/dsa-202.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-#use wml::debian::translation-check translation="bfe0f70f38a6a393244a7c7f24482dff616eb5ec"
-
-#<define-tag description>insecure temporary files</define-tag>
-<define-tag description>不安全的暫存檔案</define-tag>
-<define-tag moreinfo>
-#<p>Tatsuya Kinoshita discovered that IM, which contains interface
-#commands and Perl libraries for E-mail and NetNews, creates temporary
-#files insecurely.</p>
-<p>Tatsuya Kinoshita 發現 IM 會生不安全的暫存檔案。IM 包含了 E-mail 與
-NetNews 的介面與 Perl 函式庫等。</p>
-
-<ul>
-#<li> The impwagent program creates a temporary directory in an insecure
-# manner in /tmp using predictable directory names without checking
-# the return code of mkdir, so it's possible to seize a permission
-# of the temporary directory by local access as another user.</li>
-<li>impwagent 這支程式會用不安全的方式,在 /tmp 下產生一個可以預測名稱
-的暫存目錄,而且不會檢查 mkdir 的回傳值。所以有可能會使用其他使用者產生
-的暫存目錄。</li>
-
-#<li> The immknmz program creates a temporary file in an insecure manner
-# in /tmp using a predictable filename, so an attacker with local
-# access can easily create and overwrite files as another user.</li>
-<li>immknmz 這支程式會用不安全的方式,在 /tmp 下產生一個可以預測名稱的暫存目錄
-,所以在本機上的攻擊者可以很輕易地產生並覆寫這些暫存檔案。</li>
-
-</ul>
-
-#<p>These problems have been fixed in version 141-18.1 for the current
-#stable distribution (woody), in version 133-2.2 of the old stable
-#distribution (potato) and in version 141-20 for the unstable
-#distribution (sid).</p>
-<p>這些問題已經在目前的穩定版 (woody) 的 141-18.1 版,還有舊的穩定版
-(potato) 的 133-2.2 版,以及開發中版本 (sid) 的 141-20 版中修正。</p>
-
-#<p>We recommend that you upgrade your IM package.</p>
-<p>我們建議您立刻更新您的 IM 套件。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2002/dsa-202.data"
-# $Id$
diff --git a/chinese/security/2002/dsa-203.wml b/chinese/security/2002/dsa-203.wml
deleted file mode 100644
index 0420b39d4fd..00000000000
--- a/chinese/security/2002/dsa-203.wml
+++ /dev/null
@@ -1,29 +0,0 @@
-#use wml::debian::translation-check translation="39e4bee06fdab8b723c7e77db178c08e7b4f74b8"
-
-#<define-tag description>arbitrary command execution</define-tag>
-<define-tag description>任意執行指令</define-tag>
-<define-tag moreinfo>
-#<p>Robert Luberda found a security problem in smb2www, a Windows Network
-#client that is accessible through a web browser. This could lead a
-#remote attacker to execute arbitrary programs under the user id
-#www-data on the host where smb2www is running.</p>
-<p>Robert Luberda 發現了 smb2www 中的一個安全問題。smb2www 是一個
-Windows 網路客戶端程式,能讓您透過瀏覽器來瀏覽 Windows 網路。這可能會遭
-受遠端攻擊,在執行 smb2www 的機器上透過 www-data 使用者來執行任意程式。
-</p>
-
-#<p>This problem has been fixed in version 980804-16.1 for the current
-#stable distribution (woody), in version 980804-8.1 of the old stable
-#distribution (potato) and in version 980804-17 for the unstable
-#distribution (sid).</p>
-<p>這個問題已經在目前的穩定版 (woody) 的 980804-16.1 版、舊的穩定版
-(potato) 的 980804-8.1 版、以及開發中版本 (sid) 的 980804-17 版中修正。
-</p>
-
-#<p>We recommend that you upgrade your smb2www package immediately.</p>
-<p>我們建議您立刻更換 smb2www 套件。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2002/dsa-203.data"
-# $Id$
diff --git a/chinese/security/2002/dsa-204.wml b/chinese/security/2002/dsa-204.wml
deleted file mode 100644
index 987f6fa66a7..00000000000
--- a/chinese/security/2002/dsa-204.wml
+++ /dev/null
@@ -1,26 +0,0 @@
-#use wml::debian::translation-check translation="c64c044c914c257b90ff19ddc3ae3d9e1204b72d"
-#<define-tag description>arbitrary program execution</define-tag>
-<define-tag description>任意執行程式</define-tag>
-<define-tag moreinfo>
-#<p>The KDE team has <a href="http://www.kde.org/info/security/advisory-20021111-1.txt">
-#discovered</a> a vulnerability in the support for various
-#network protocols via the KIO. The implementation of the rlogin and telnet
-#protocols allows a carefully crafted URL in an HTML page, HTML email or
-#other KIO-enabled application to execute arbitrary commands on the
-#system using the victim's account on the vulnerable machine.</p>
-<p>KDE 團隊<a href="http://www.kde.org/info/security/advisory-20021111-1.txt">發現</a>了在 KIO 支援多個網路通訊協定時的弱點。若是在 HTML 網頁、HTML 電子郵件或其他 KIO 的應用軟體中置入一個特殊的 URL,能透過 rlogin 與 telnet 協定來利用受攻擊機器上的帳號,任意執行系統上的指令。</p>
-
-#<p>This problem has been fixed by disabling rlogin and telnet in version
-#2.2.2-13.woody.5 for the current stable distribution (woody). The old
-#stable distribution (potato) is not affected since it doesn't contain
-#KDE. A correction for the package in the unstable distribution (sid)
-#is not yet available.</p>
-<p>這個問題只要關掉 2.2.2-13.woody.5 版本中的 rlogin 與 telnet 即可。舊的穩定版 (potato) 並不受到影響,因為它不含 KDE。在開發中版本 (sid) 中的套件尚未修正。</p>
-
-#<p>We recommend that you upgrade your kdelibs3 package immediately.</p>
-<p>我們建議您立刻更換您的 kdelibs3 套件。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2002/dsa-204.data"
-# $Id$
diff --git a/chinese/security/2009/Makefile b/chinese/security/2009/Makefile
deleted file mode 100644
index 17f19c095e2..00000000000
--- a/chinese/security/2009/Makefile
+++ /dev/null
@@ -1 +0,0 @@
-include $(subst webwml/chinese,webwml/english,$(CURDIR))/Makefile
diff --git a/chinese/security/2009/dsa-1904.wml b/chinese/security/2009/dsa-1904.wml
deleted file mode 100644
index e7654f036eb..00000000000
--- a/chinese/security/2009/dsa-1904.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-#use wml::debian::translation-check translation="9fcc9dae29b68fc404a741cc37991e40e6cb1efb" maintainer="Hsin-lin Cheng"
-<define-tag description>輸入驗證不足</define-tag>
-<define-tag moreinfo>
-
-<p>Daniel Stenberg 發現 wget,一個使用 HTTP(S) 與 FTP 從網站取回檔案的網路實用工具,很
-容易受到「Null Prefix Attacks Against SSL/TLS Certificates」弱點攻擊,這個弱點已在
-Blackhat conference 發表了一段時間。這允許攻擊者經由精心製作,在 Common Name 欄位注入空
-位元組 (null byte) 的 ITU-T X.509 憑證,執行不被注意的中間人攻擊 (man-in-the-middle
-attacks)。</p>
-
-
-<p>對於 oldstable distribution (etch),這個問題已在 1.10.2-2+etch1 版被修正。</p>
-
-<p>對於 stable distribution (lenny),這個問題已在 1.11.4-2+lenny1 版被修正。</p>
-
-<p>對於 testing distribution (squeeze),這問題很快會被修正。</p>
-
-<p>對於 unstable distribution (sid),這個問題已在 1.12-1 版被修正。</p>
-
-
-<p>我們建議你升級你的 wget 套件。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2009/dsa-1904.data"
diff --git a/chinese/security/2009/dsa-1905.wml b/chinese/security/2009/dsa-1905.wml
deleted file mode 100644
index 70a2fec1369..00000000000
--- a/chinese/security/2009/dsa-1905.wml
+++ /dev/null
@@ -1,24 +0,0 @@
-#use wml::debian::translation-check translation="1f8a4b3311f317330ee3c3ecc83043b2102825d1" maintainer="Hsin-lin Cheng"
-<define-tag description>輸入驗證不足</define-tag>
-<define-tag moreinfo>
-<p>python-django 的表單函式庫,一個高階 Python 網站開發框架,
-在驗證電子郵件與網址時使用了選擇不當的 regular expression。
-由於不適當的回溯 ,攻擊者可以憑藉特別精心製作的電子郵件或
-網址,透過 django 表單函式庫驗證執行阻斷服務攻擊 (100% CPU
-佔用量) 。</p>
-
-
-<p>oldstable distribution (etch) 的 python-django,不受這個問題影響。</p>
-
-<p>對於 stable distribution (lenny),這個問題已在 1.0.2-1+lenny2 版被修正。</p>
-
-<p>對於 testing distribution (squeeze),這個問題很快會被修正。</p>
-
-<p>對於 unstable distribution (sid),這個問題已在 1.1.1-1 版被修正。</p>
-
-
-<p>我們建議你升級你的 python-django 套件。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2009/dsa-1905.data"
diff --git a/chinese/security/2009/dsa-1906.wml b/chinese/security/2009/dsa-1906.wml
deleted file mode 100644
index dea9b9ef469..00000000000
--- a/chinese/security/2009/dsa-1906.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="8da95139c3595d47371ba8d288784086ae2ebacd" maintainer="Hsin-lin Cheng"
-<define-tag description>Clamav 的 stable 與 oldstable 版本停止開發公告</define-tag>
-<define-tag moreinfo>
-
-<p>Clamav 安全支援,一個 Unix 防毒實用工具,已經停止 stable
-distribution (lenny) 與 oldstable distribution (etch) 的開發。Clamav
-上游已經停止支援 etch 與 lenny 發行版。還有,我們已發行
-版本的病毒掃描器不再能輕易地接收簽章更新。</p>
-
-<p>我們建議所有的 clamav 使用者考慮轉移到 debian-volatile 的版本
-,在盡最大努力的基礎上接收定期更新與安全支援。</p>
-
-<p>有關 debian-volatile 的更多訊息,請造訪
-<a href="$(HOME)/volatile/">https://www.debian.org/volatile/</a>。</p>
-
-</define-tag>
-
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2009/dsa-1906.data"
diff --git a/chinese/security/2009/dsa-1907.wml b/chinese/security/2009/dsa-1907.wml
deleted file mode 100644
index ff875b6a32e..00000000000
--- a/chinese/security/2009/dsa-1907.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-#use wml::debian::translation-check translation="b128ca5f062ffd92dfde8a7b5888d4e87ec075f2" maintainer="Hsin-lin Cheng"
-<define-tag description>多個安全漏洞</define-tag>
-<define-tag moreinfo>
-
-<p>Kvm 是一個全虛擬化系統,目前已被發現多個安全漏洞。
-國際安全組織 CVE (Common Vulnerability and Exposure) 找到以下問題:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2008-5714">CVE-2008-5714</a>
-
-<p>Chris Webb 發現一個 off-by-one 缺陷,限制了 KVM 的 VNC 密碼最多只能有 7
-個字元。這個 8 個字元被有意限制成 7 個的瑕疵,可能造成遠端攻擊者更容易猜到
-VNC 的密碼。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3290">CVE-2009-3290</a>
-
-<p>KVM 被發現其 kvm_emulate_hypercall 函式不會防止從 ring 0 存取 MMU
-hypercalls,這會允許本地客戶端 OS 使用者導致阻斷服務攻擊 (客戶端內核崩潰)
-,或者讀寫客戶端內核記憶體。</p></li>
-
-</ul>
-
-<p>oldstable distribution (etch) 不含 kvm。</p>
-
-<p>對於 stable distribution (lenny), 這些問題已在 72+dfsg-5~lenny3 版被修正。</p>
-
-<p>對於 testing distribution (squeeze) 這些問題很快會被修正。</p>
-
-<p>對於 unstable distribution (sid) 這些問題已在 85+dfsg-4.1 版被修正。</p>
-
-
-<p>我們建議你更新你的 kvm 套件。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2009/dsa-1907.data"
diff --git a/chinese/security/2009/dsa-1908.wml b/chinese/security/2009/dsa-1908.wml
deleted file mode 100644
index 42560138f71..00000000000
--- a/chinese/security/2009/dsa-1908.wml
+++ /dev/null
@@ -1,41 +0,0 @@
-#use wml::debian::translation-check translation="b128ca5f062ffd92dfde8a7b5888d4e87ec075f2" maintainer="Hsin-lin Cheng"
-<define-tag description>多個安全漏洞</define-tag>
-<define-tag moreinfo>
-<p>Samba 已被發現多個安全漏洞,samba 是 Unix 系統上的 SMB/CIFS 通訊協定實作,
-提供與其他作業系統跨平台的檔案與列印分享以及更多支援。
-國際安全組織 CVE (Common Vulnerability and Exposure) 找到以下問題:</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-2948">CVE-2009-2948</a>
-
-<p>當 mount.cifs 實用工具處於詳細模式 (verbose mode) 時,缺少妥善的檔案權限檢查。
-這會允許本機端使用者以指定檔案做為憑證檔並企圖掛載 samba 分享,洩漏部份任意內容。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-2906">CVE-2009-2906</a>
-
-<p>回應 samba 非預期的 oplock 中斷 (break) 通知,可能會導致服務陷入無窮迴圈。
-攻擊者可以使用這個漏洞,經由特別精心製作的 SMB 請求 (request) 執行阻斷服務 (DoS) 攻擊。
-</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-2813">CVE-2009-2813</a>
-<p>缺乏對於沒有為使用者建構或指定家目錄情況的錯誤處理,這可能會導致檔案洩漏。
-在 [homes] 自動啟用分享或以使用者名稱直接建立分享的情況之下,samba 沒有強制執行分享限制
-,這導致攻擊者能從根目錄存取檔案系統。</p></li>
-
-</ul>
-
-<p>對於 oldstable distribution (etch),這個問題很快會被修正。</p>
-
-<p>對於 stable distribution (lenny),這個問題已在 2:3.2.5-4lenny7 版被修正。</p>
-
-<p>對於 testing distribution (squeeze),這個問題很快會被修正。</p>
-
-<p>對於 unstable distribution (sid),這個問題已在 2:3.4.2-1 版被修正。</p>
-
-
-<p>我們建議你升級你的 samba 套件。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2009/dsa-1908.data"
diff --git a/chinese/security/2017/Makefile b/chinese/security/2017/Makefile
deleted file mode 100644
index 17f19c095e2..00000000000
--- a/chinese/security/2017/Makefile
+++ /dev/null
@@ -1 +0,0 @@
-include $(subst webwml/chinese,webwml/english,$(CURDIR))/Makefile
diff --git a/chinese/security/2017/index.wml b/chinese/security/2017/index.wml
deleted file mode 100644
index f69e73505cc..00000000000
--- a/chinese/security/2017/index.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-#use wml::debian::translation-check translation="dace092385d19a97d0a21f78d1600118aa5bc25b"
-<define-tag pagetitle>2017 年安全通告</define-tag>
-#use wml::debian::template title="<pagetitle>" GEN_TIME="yes"
-#use wml::debian::recent_list
-
-<:= get_recent_list ('.', '0', '$(ENGLISHDIR)/security/2017', '', 'dsa-\d+' ) :>
-
-<p>要获取最新 Debian 安全通告,您可以订阅我们的
-<a href="https://lists.debian.org/debian-security-announce/">\
-<strong>debian-security-announce</strong></a> 邮件列表。
-您也可以<a href="https://lists.debian.org/debian-security-announce/debian-security-announce-2017/">\
-浏览列表的在线存档</a>。</p>
diff --git a/chinese/security/2018/Makefile b/chinese/security/2018/Makefile
deleted file mode 100644
index 17f19c095e2..00000000000
--- a/chinese/security/2018/Makefile
+++ /dev/null
@@ -1 +0,0 @@
-include $(subst webwml/chinese,webwml/english,$(CURDIR))/Makefile
diff --git a/chinese/security/2018/dsa-4205.wml b/chinese/security/2018/dsa-4205.wml
deleted file mode 100644
index be323864def..00000000000
--- a/chinese/security/2018/dsa-4205.wml
+++ /dev/null
@@ -1,13 +0,0 @@
-#use wml::debian::translation-check translation="9102095a33d1bb4101b9b1a6e7c3ee3b3421a78b" maintainer="Boyuan Yang"
-<define-tag description>Debian 8 终止支持的预先通知</define-tag>
-<define-tag moreinfo>
-
-<p>在此通知 Debian 8(代号“jessie”)的常规安全支持将于今年六月十七日结束。</p>
-
-<p>与先前的发行版本类似,额外的长期支持将只针对某些限定范围的机器架构和软件包提供。
-届时我们会发布一份单独的声明进行通知。</p>
-
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4205.data"
diff --git a/chinese/security/2018/dsa-4212.wml b/chinese/security/2018/dsa-4212.wml
deleted file mode 100644
index 003d2655949..00000000000
--- a/chinese/security/2018/dsa-4212.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="97c63276e44b98a1da68595f99dc2712f2352661" maintainer="Boyuan Yang"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Etienne Stalmans 发现 git,一个快速、可扩展的分布式版本控制系统,\
-目前易受一个利用恶意编写的 .gitmodules 文件中的子模块名称而允许任意代码\
-执行的漏洞的影响。</p>
-
-<p>对旧稳定版本(jessie),该问题已在 1:2.1.4-2.1+deb8u6
-版本中修复。</p>
-
-<p>对当前稳定版本(stretch),该问题已在 1:2.11.0-3+deb9u3
-版本中修复。</p>
-
-<p>我们推荐您升级您的 git 软件包。</p>
-
-<p>如需了解 git 的详细安全状况,请参考其安全追踪页面:
-<a href="https://security-tracker.debian.org/tracker/git">https://security-tracker.debian.org/tracker/git</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4212.data"
diff --git a/chinese/security/2018/dsa-4215.wml b/chinese/security/2018/dsa-4215.wml
deleted file mode 100644
index de11f2523d2..00000000000
--- a/chinese/security/2018/dsa-4215.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="52c000832f536f52b57bcf563167053210095c0b" maintainer="Boyuan Yang"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Man Yue Mo、Lars Krapf 和 Pierre Ernst 发现 Batik,一个处理 SVG
-图像的工具箱,没有适当地对输入进行验证。该问题可以使得攻击者发起拒绝服务攻击、\
-发起跨站点脚本攻击或访问服务器上限制访问的文件。</p>
-
-<p>对旧稳定版系统(jessie),该问题已在 1.7+dfsg-5+deb8u1 版本中修复。</p>
-
-<p>对稳定版系统(stretch),该问题已在 1.8-4+deb9u1 版本中修复。</p>
-
-<p>我们推荐您升级 batik 软件包。</p>
-
-<p>如需了解 batik 的详细安全状态,请参考其安全追踪页面:
-<a href="https://security-tracker.debian.org/tracker/batik">https://security-tracker.debian.org/tracker/batik</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2018/dsa-4215.data"
diff --git a/chinese/security/2018/index.wml b/chinese/security/2018/index.wml
deleted file mode 100644
index 57001f8b84b..00000000000
--- a/chinese/security/2018/index.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-#use wml::debian::translation-check translation="8635bbbedf6cf68c100d16e30d03160b02a7aad7" maintainer="Boyuan Yang"
-<define-tag pagetitle>2018 年安全通告</define-tag>
-#use wml::debian::template title="<pagetitle>" GEN_TIME="yes"
-#use wml::debian::recent_list
-
-<:= get_recent_list ('.', '0', '$(ENGLISHDIR)/security/2018', '', 'dsa-\d+' ) :>
-
-<p>要获取最新 Debian 安全通告,您可以订阅我们的
-<a href="https://lists.debian.org/debian-security-announce/">\
-<strong>debian-security-announce</strong></a> 邮件列表。
-您也可以<a href="https://lists.debian.org/debian-security-announce/2018/">\
-浏览列表的在线存档</a>。</p>
diff --git a/chinese/security/2019/Makefile b/chinese/security/2019/Makefile
deleted file mode 100644
index 17f19c095e2..00000000000
--- a/chinese/security/2019/Makefile
+++ /dev/null
@@ -1 +0,0 @@
-include $(subst webwml/chinese,webwml/english,$(CURDIR))/Makefile
diff --git a/chinese/security/2019/dsa-4543.wml b/chinese/security/2019/dsa-4543.wml
deleted file mode 100644
index c0815f1cdc2..00000000000
--- a/chinese/security/2019/dsa-4543.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="1d182b3abd199000857dae0786cf70a840908dd1"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Joe Vennix 发现 sudo(一款设计用于为特定用户提供受限的超级用户权限的程序)在通过
-ALL 关键字配置,允许用户以指定用户身份通过 RunAs 方式执行命令时,sudo 会允许用户通\
-过指定用户 ID 为 -1 或 4294967295,从而以 root 身份执行命令。这会使得用户即使在
-RunAs 方式明确禁止 root 权限的情况下,获得充分的 sudo 权限来以 root 身份执行命令。</p>
-
-<p>细节信息可以访问上游公告获取:
-<a href="https://www.sudo.ws/alerts/minus_1_uid.html">https://www.sudo.ws/alerts/minus_1_uid.html</a>。</p>
-
-<p>对旧稳定版系统(stretch),该问题已在 1.8.19p1-2.1+deb9u1 版本中修复。</p>
-
-<p>对稳定版系统(buster),该问题已在 1.8.27-1+deb10u1 版本中修复。</p>
-
-<p>我们推荐您升级您的 sudo 软件包。</p>
-
-<p>如需了解 sudo 的详细安全状态,请参考其安全追踪页面:
-<a href="https://security-tracker.debian.org/tracker/sudo">https://security-tracker.debian.org/tracker/sudo</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4543.data"
diff --git a/chinese/security/2019/dsa-4544.wml b/chinese/security/2019/dsa-4544.wml
deleted file mode 100644
index 2557bb43f43..00000000000
--- a/chinese/security/2019/dsa-4544.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-#use wml::debian::translation-check translation="824bb3a694e85897a4c09b1b62e6d8ceab45f71f"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>X41 D-Sec 发现 unbound(一款具有验证、递归和缓存功能的 DNS 解析器)没有正确
-处理一些 NOTIFY 请求。这种情形下会由于应用崩溃导致远程拒绝服务。</p>
-
-<p>对稳定版系统(buster),该问题已在 1.9.0-2+deb10u1 版本中修复。</p>
-
-<p>我们推荐您升级您的 unbound 软件包。</p>
-
-<p>如需了解 unbound 的详细安全状态,请参考其安全追踪页面:
-<a href="https://security-tracker.debian.org/tracker/unbound">\
-https://security-tracker.debian.org/tracker/unbound</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4544.data"
diff --git a/chinese/security/2019/dsa-4574.wml b/chinese/security/2019/dsa-4574.wml
deleted file mode 100644
index 32386ef6ce5..00000000000
--- a/chinese/security/2019/dsa-4574.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-#use wml::debian::translation-check translation="a9d7dc155ea549b91437b73d3bb84bd32f16da90"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Holger 在 Redmine(一款项目管理 web 应用)中发现了 SQL 注入。此外,在 Textile 格式化
-中发现了跨站脚本问题。</p>
-
-<p>对旧稳定版本(stretch),该问题已在 3.3.1-4+deb9u3 版本中修复。</p>
-
-<p>我们推荐您升级您的 redmine 软件包。</p>
-
-<p>如需了解 redmine 的详细安全状态,请参考其安全追踪页面:
-<a href="https://security-tracker.debian.org/tracker/redmine">\
-https://security-tracker.debian.org/tracker/redmine</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2019/dsa-4574.data"
diff --git a/chinese/security/2021/Makefile b/chinese/security/2021/Makefile
deleted file mode 100644
index 17f19c095e2..00000000000
--- a/chinese/security/2021/Makefile
+++ /dev/null
@@ -1 +0,0 @@
-include $(subst webwml/chinese,webwml/english,$(CURDIR))/Makefile
diff --git a/chinese/security/2021/dsa-4822.wml b/chinese/security/2021/dsa-4822.wml
deleted file mode 100644
index e460930feb6..00000000000
--- a/chinese/security/2021/dsa-4822.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="ce053bc67f7e188f5978ad5bbfd7c2786669f07c"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>David Cook 报告了几个影响p11-kit中RPC协议的内存安全问题,
-p11-kit是一个提供加载和枚举PKCS#11模块的库。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 0.23.15-2+deb10u1。</p>
-
-<p>我们建议您升级您的 p11-kit 软件包。</p>
-
-<p>查看关于 p11-kit 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/p11-kit">https://security-tracker.debian.org/tracker/p11-kit</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4822.data"
diff --git a/chinese/security/2021/dsa-4823.wml b/chinese/security/2021/dsa-4823.wml
deleted file mode 100644
index 6ff00b153ac..00000000000
--- a/chinese/security/2021/dsa-4823.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="df41ee2d83423c2e6bcdc9061671b96ead8a6074"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>发现在InfluxDB(一个时间序列、度量和分析数据库)中对JWT令牌的错误验证可能会导致绕过身份验证</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 1.6.4-1+deb10u1。</p>
-
-<p>我们建议您升级您的 influxdb 软件包。</p>
-
-<p>查看关于 influxdb 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/influxdb">\
-https://security-tracker.debian.org/tracker/influxdb</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4823.data"
diff --git a/chinese/security/2021/dsa-4824.wml b/chinese/security/2021/dsa-4824.wml
deleted file mode 100644
index 9a80125d4d9..00000000000
--- a/chinese/security/2021/dsa-4824.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="b7239518c823ae53e2826fd2e71efbc6e91007e3"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Chromium web浏览器中发现多个安全问题,可能导致执行任意代码、拒绝服务或信息泄露。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 87.0.4280.88-0.4~deb10u1。</p>
-
-<p>我们建议您升级您的 chromium 软件包。</p>
-
-<p>查看关于 chromium 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/chromium">\
-https://security-tracker.debian.org/tracker/chromium</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4824.data"
diff --git a/chinese/security/2021/dsa-4825.wml b/chinese/security/2021/dsa-4825.wml
deleted file mode 100644
index b731ef25abc..00000000000
--- a/chinese/security/2021/dsa-4825.wml
+++ /dev/null
@@ -1,36 +0,0 @@
-#use wml::debian::translation-check translation="28bc87857803972597b697f1aafdfc05773ea8db"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>在Dovecot电子邮件服务器中发现了多个漏洞。</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-24386">CVE-2020-24386</a>
-
- <p>当imap休眠处启动时,攻击者(具有访问邮件服务器的有效凭据)可以使
- Dovecot发现文件系统目录结构,并通过精心构建的命令访问其他用户的电子邮件。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25275">CVE-2020-25275</a>
-
- <p>Innokentii Sennovskiy 报告当第10000个MIME部分是
- message/rfc822(或者父级是 multipart/digest)时,
- Dovecot中的邮件传递和解析可能会崩溃。
- 此缺陷是由早期更改
- <a href="https://security-tracker.debian.org/tracker/CVE-2020-12100">\
- CVE-2020-12100</a>引入的。</p></li>
-
-</ul>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 1:2.3.4.1-5+deb10u5。</p>
-
-<p>我们建议您升级您的 dovecot 软件包。</p>
-
-<p>查看关于 dovecot 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/dovecot">\
-https://security-tracker.debian.org/tracker/dovecot</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4825.data"
diff --git a/chinese/security/2021/dsa-4826.wml b/chinese/security/2021/dsa-4826.wml
deleted file mode 100644
index 83e5fea77d1..00000000000
--- a/chinese/security/2021/dsa-4826.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="27a3db159df9f47798f0f5c818d5f1dafdd4a815"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>在 Node.js 中发现了两个漏洞,这可能导致拒绝服务,并可能导致执行任意代码或HTTP请求偷渡。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 10.23.1~dfsg-1~deb10u1。</p>
-
-<p>我们建议您升级您的 nodejs 软件包。</p>
-
-<p>查看关于 nodejs 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/nodejs">\
-https://security-tracker.debian.org/tracker/nodejs</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4826.data"
diff --git a/chinese/security/2021/dsa-4827.wml b/chinese/security/2021/dsa-4827.wml
deleted file mode 100644
index 6e95de62105..00000000000
--- a/chinese/security/2021/dsa-4827.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="2250192440b4e4662c2bd0c7ab63e34e6ff313ee"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Mozilla Firefox web浏览器中发现安全问题,可能导致执行任意代码。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 78.6.1esr-1~deb10u1。</p>
-
-<p>我们建议您升级您的 firefox-esr 软件包。</p>
-
-<p>查看关于 firefox-esr 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">\
-https://security-tracker.debian.org/tracker/firefox-esr</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4827.data"
diff --git a/chinese/security/2021/dsa-4828.wml b/chinese/security/2021/dsa-4828.wml
deleted file mode 100644
index 3cddac48c16..00000000000
--- a/chinese/security/2021/dsa-4828.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="c7278d0cf5a2c92a64386bb83ed50bdb7e9b56f4"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Liaogui Zhong 在XStream中发现了两个安全问题,XStream是一个Java库,用于将对象序列化为XML,然后再次序列化,这可能导致在解组时删除文件或伪造服务器端请求。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 1.4.11.1-1+deb10u2。</p>
-
-<p>我们建议您升级您的 libxstream-java 软件包。</p>
-
-<p>查看关于 libxstream-java 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/libxstream-java">\
-https://security-tracker.debian.org/tracker/libxstream-java</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4828.data"
diff --git a/chinese/security/2021/dsa-4829.wml b/chinese/security/2021/dsa-4829.wml
deleted file mode 100644
index 600e035400b..00000000000
--- a/chinese/security/2021/dsa-4829.wml
+++ /dev/null
@@ -1,23 +0,0 @@
-#use wml::debian::translation-check translation="6deb41e83064921e63d318734179cf3b4d8867e0"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>A flaw was discovered in coturn, a TURN and STUN server for VoIP. By
-default coturn does not allow peers on the loopback addresses
-(127.x.x.x and ::1). A remote attacker can bypass the protection via a
-specially crafted request using a peer address of <q>0.0.0.0</q> and trick
-coturn in relaying to the loopback interface. If listening on IPv6 the
-loopback interface can also be reached by using either [::1] or [::] as
-the address。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 4.5.1.1-1.1+deb10u2。</p>
-
-<p>我们建议您升级您的 coturn 软件包。</p>
-
-<p>查看关于 coturn 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/coturn">https://security-tracker.debian.org/tracker/coturn</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4829.data"
diff --git a/chinese/security/2021/dsa-4830.wml b/chinese/security/2021/dsa-4830.wml
deleted file mode 100644
index 99c1a82a90a..00000000000
--- a/chinese/security/2021/dsa-4830.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-#use wml::debian::translation-check translation="cc173b8d34b89c7d43e8628759e88ae4a67b7db9"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Simon McVittie 在flatpak门户服务中发现了一个bug,
-它允许沙盒应用程序在主机系统上执行任意代码(沙盒逃脱)。</p>
-
-<p>The Flatpak portal D-Bus service (flatpak-portal, also known by its
-D-Bus service name org.freedesktop.portal.Flatpak) allows apps in a
-Flatpak sandbox to launch their own subprocesses in a new sandbox
-instance, either with the same security settings as the caller or
-with more restrictive security settings. For example, this is used in
-Flatpak-packaged web browsers such as Chromium to launch subprocesses
-that will process untrusted web content, and give those subprocesses a
-more restrictive sandbox than the browser itself。</p>
-
-<p>In vulnerable versions, the Flatpak portal service passes caller-specified
-environment variables to non-sandboxed processes on the host system,
-and in particular to the flatpak run command that is used to launch the
-new sandbox instance. A malicious or compromised Flatpak app could set
-environment variables that are trusted by the flatpak run command, and
-use them to execute arbitrary code that is not in a sandbox。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 1.2.5-0+deb10u2。</p>
-
-<p>我们建议您升级您的 flatpak 软件包。</p>
-
-<p>查看关于 flatpak 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/flatpak">\
-https://security-tracker.debian.org/tracker/flatpak</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4830.data"
diff --git a/chinese/security/2021/dsa-4831.wml b/chinese/security/2021/dsa-4831.wml
deleted file mode 100644
index 0e3592dfb2c..00000000000
--- a/chinese/security/2021/dsa-4831.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="6d1643a67509927d077347faabf9fdb8fdcb2dc5"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Johan Smits 发现ruby redcarpet,一个markdown解析器,没有正确地验证它的输入。
-这将允许攻击者发起跨站点脚本攻击。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 3.4.0-4+deb10u1。</p>
-
-<p>我们建议您升级您的 ruby-redcarpet 软件包。</p>
-
-<p>查看关于 ruby-redcarpet 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/ruby-redcarpet">\
-https://security-tracker.debian.org/tracker/ruby-redcarpet</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4831.data"
diff --git a/chinese/security/2021/dsa-4832.wml b/chinese/security/2021/dsa-4832.wml
deleted file mode 100644
index aa7abd9ea8a..00000000000
--- a/chinese/security/2021/dsa-4832.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-#use wml::debian::translation-check translation="a5c79088ff2296ccbad43ece8403cb9d49aa69ac"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Chromium web浏览器中发现多个安全问题,可能导致执行任意代码、拒绝服务或信息泄露。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 87.0.4280.141-0.1~deb10u1。</p>
-
-<p>我们建议您升级您的 chromium 软件包。</p>
-
-<p>查看关于 chromium 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/chromium">https://security-tracker.debian.org/tracker/chromium</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4832.data"
diff --git a/chinese/security/2021/dsa-4833.wml b/chinese/security/2021/dsa-4833.wml
deleted file mode 100644
index fabe5261f7e..00000000000
--- a/chinese/security/2021/dsa-4833.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="44daa28d7165e7856597605819dd8a2aa51c048f"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Andrew Wesie在GStreamer多媒体框架的H264支持中发现了缓冲区溢出,这可能导致执行任意代码。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 1.14.4-1deb10u1。</p>
-
-<p>我们建议您升级您的 gst-plugins-bad1.0 软件包。</p>
-
-<p>查看关于 gst-plugins-bad1.0 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/gst-plugins-bad1.0">\
-https://security-tracker.debian.org/tracker/gst-plugins-bad1.0</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4833.data"
diff --git a/chinese/security/2021/dsa-4834.wml b/chinese/security/2021/dsa-4834.wml
deleted file mode 100644
index 8faf6bd9315..00000000000
--- a/chinese/security/2021/dsa-4834.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="13bfa3423af65169b2f2d0d153f852ba4103dd3c"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>在VLC媒体播放器中发现多个漏洞,如果打开格式错误的媒体文件,可能导致执行任意代码或拒绝服务。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 3.0.12-0+deb10u1。</p>
-
-<p>我们建议您升级您的 vlc 软件包。</p>
-
-<p>查看关于 vlc 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/vlc">\
-https://security-tracker.debian.org/tracker/vlc</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4834.data"
diff --git a/chinese/security/2021/dsa-4835.wml b/chinese/security/2021/dsa-4835.wml
deleted file mode 100644
index cf270039031..00000000000
--- a/chinese/security/2021/dsa-4835.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="3fea03cb934f83fd2586afe70178153c8330281f"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>在Tomcat servlet和JSP引擎中发现了两个漏洞,这可能导致信息泄露</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 9.0.31-1~deb10u3。</p>
-
-<p>我们建议您升级您的 tomcat9 软件包。</p>
-
-<p>查看关于 tomcat9 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/tomcat9">\
-https://security-tracker.debian.org/tracker/tomcat9</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4835.data"
diff --git a/chinese/security/2021/dsa-4836.wml b/chinese/security/2021/dsa-4836.wml
deleted file mode 100644
index 33698f131dc..00000000000
--- a/chinese/security/2021/dsa-4836.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="9510422e7838a480b1a6078d836538bb3c6b029a"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>在Open-vSwitch(一种基于软件的以太网虚拟交换机)
-的LLPD实现中发现了两个漏洞,这可能导致拒绝服务。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 2.10.6+ds1-0+deb10u1。</p>
-
-<p>我们建议您升级您的 openvswitch 软件包。</p>
-
-<p>查看关于 openvswitch 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/openvswitch">\
-https://security-tracker.debian.org/tracker/openvswitch</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4836.data"
diff --git a/chinese/security/2021/dsa-4837.wml b/chinese/security/2021/dsa-4837.wml
deleted file mode 100644
index 9e8c87d5ae4..00000000000
--- a/chinese/security/2021/dsa-4837.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="23b235270837433bab2ef3d3919d771d79b42a73"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>在强大的远程执行管理器salt中发现了几个漏洞。
-这些缺陷可能导致绕过Salt-SSH的身份验证和调用,
-通过TLS执行模块创建具有弱文件权限的证书,
-或者使用SSH客户端使用Salt-API进行shell注入。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 2018.3.4+dfsg1-6+deb10u2。</p>
-
-<p>我们建议您升级您的 salt 软件包。</p>
-
-<p>查看关于 salt 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/salt">https://security-tracker.debian.org/tracker/salt</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4837.data"
diff --git a/chinese/security/2021/dsa-4838.wml b/chinese/security/2021/dsa-4838.wml
deleted file mode 100644
index 03510946966..00000000000
--- a/chinese/security/2021/dsa-4838.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="7332091fb9221dc7f16942318bcf63cea083ed52"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Tavis Ormandy在Mutt(一种支持MIME、GPG、PGP和线程的基于文本的邮件读取器)
-的rfc822组收件人解析中发现了一个内存泄漏漏洞,这可能导致拒绝服务。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 1.10.1-2.1+deb10u5。</p>
-
-<p>我们建议您升级您的 mutt 软件包。</p>
-
-<p>查看关于 mutt 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/mutt">\
-https://security-tracker.debian.org/tracker/mutt</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4838.data"
diff --git a/chinese/security/2021/dsa-4839.wml b/chinese/security/2021/dsa-4839.wml
deleted file mode 100644
index 47f99c9445e..00000000000
--- a/chinese/security/2021/dsa-4839.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="3430520092002ba2cf08a905c95e82635551b172"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Qualys研究实验室在sudo中发现了一个基于堆的缓冲区溢出漏洞,
-sudo是一个旨在为特定用户提供有限超级用户权限的程序。
-任何本地用户(sudoers和非sudoers)都可以利用此漏洞升级ROOT权限。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 1.8.27-1+deb10u3。</p>
-
-<p>我们建议您升级您的 sudo 软件包。</p>
-
-<p>查看关于 sudo 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/sudo">https://security-tracker.debian.org/tracker/sudo</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4839.data"
diff --git a/chinese/security/2021/dsa-4840.wml b/chinese/security/2021/dsa-4840.wml
deleted file mode 100644
index a4717adb94f..00000000000
--- a/chinese/security/2021/dsa-4840.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="105f0db4e352f9e78b2dc8c412985cf171a97805"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Mozilla Firefox web浏览器中发现多个安全问题,这可能导致执行任意代码或信息泄露。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 78.7.0esr-1~deb10u1。</p>
-
-<p>我们建议您升级您的 firefox-esr 软件包。</p>
-
-<p>查看关于 firefox-esr 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">\
-https://security-tracker.debian.org/tracker/firefox-esr</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4840.data"
diff --git a/chinese/security/2021/dsa-4841.wml b/chinese/security/2021/dsa-4841.wml
deleted file mode 100644
index d402538840d..00000000000
--- a/chinese/security/2021/dsa-4841.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="29834dabc5508da0cafcf2a974c4ab5c7943d209"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>在一个集群资源管理和作业调度系统
-Simple Linux Utility for Resource Management(SLURM)中发现了多个安全问题,
-这些问题可能导致拒绝服务、信息泄露或权限提升。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 18.08.5.2-1+deb10u2。</p>
-
-<p>我们建议您升级您的 slurm-llnl 软件包。</p>
-
-<p>查看关于 slurm-llnl 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/slurm-llnl">\
-https://security-tracker.debian.org/tracker/slurm-llnl</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4841.data"
diff --git a/chinese/security/2021/dsa-4842.wml b/chinese/security/2021/dsa-4842.wml
deleted file mode 100644
index 59131ae82fa..00000000000
--- a/chinese/security/2021/dsa-4842.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="6c95eff37261f5db13f187dc4c5f8c9ce72e75bc"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>在Thunderbird中发现了多个安全问题,这些问题可能导致执行任意代码、拒绝服务或信息泄漏。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 1:78.7.0-1~deb10u1。</p>
-
-<p>我们建议您升级您的 thunderbird 软件包。</p>
-
-<p>查看关于 thunderbird 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/thunderbird">\
-https://security-tracker.debian.org/tracker/thunderbird</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4842.data"
diff --git a/chinese/security/2021/dsa-4843.wml b/chinese/security/2021/dsa-4843.wml
deleted file mode 100644
index dd325001435..00000000000
--- a/chinese/security/2021/dsa-4843.wml
+++ /dev/null
@@ -1,91 +0,0 @@
-#use wml::debian::translation-check translation="7d4e416de9b0d5870d3b56d250bdbed4f5cdde8b"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Linux内核中发现了几个可能导致权限提升、拒绝服务或信息泄漏的漏洞。</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27815">CVE-2020-27815</a>
-
- <p>A flaw was reported in the JFS filesystem code allowing a local
- attacker with the ability to set extended attributes to cause a
- denial of service。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27825">CVE-2020-27825</a>
-
- <p>Adam <q>pi3</q> Zabrocki reported a use-after-free flaw in the ftrace
- ring buffer resizing logic due to a race condition, which could
- result in denial of service or information leak。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-27830">CVE-2020-27830</a>
-
- <p>Shisong Qin reported a NULL pointer dereference flaw in the Speakup
- screen reader core driver。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-28374">CVE-2020-28374</a>
-
- <p>David Disseldorp discovered that the LIO SCSI target implementation
- performed insufficient checking in certain XCOPY requests. An
- attacker with access to a LUN and knowledge of Unit Serial Number
- assignments can take advantage of this flaw to read and write to any
- LIO backstore, regardless of the SCSI transport settings。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29568">CVE-2020-29568 (XSA-349)</a>
-
- <p>Michael Kurth and Pawel Wieczorkiewicz reported that frontends can
- trigger OOM in backends by updating a watched path。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29569">CVE-2020-29569 (XSA-350)</a>
-
- <p>Olivier Benjamin and Pawel Wieczorkiewicz reported a use-after-free
- flaw which can be triggered by a block frontend in Linux blkback. A
- misbehaving guest can trigger a dom0 crash by continuously
- connecting / disconnecting a block frontend。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29660">CVE-2020-29660</a>
-
- <p>Jann Horn reported a locking inconsistency issue in the tty
- subsystem which may allow a local attacker to mount a
- read-after-free attack against TIOCGSID。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-29661">CVE-2020-29661</a>
-
- <p>Jann Horn reported a locking issue in the tty subsystem which can
- result in a use-after-free. A local attacker can take advantage of
- this flaw for memory corruption or privilege escalation。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-36158">CVE-2020-36158</a>
-
- <p>A buffer overflow flaw was discovered in the mwifiex WiFi driver
- which could result in denial of service or the execution of
- arbitrary code via a long SSID value。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-3347">CVE-2021-3347</a>
-
- <p>It was discovered that PI futexes have a kernel stack use-after-free
- during fault handling. An unprivileged user could use this flaw to
- crash the kernel (resulting in denial of service) or for privilege
- escalation。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-20177">CVE-2021-20177</a>
-
- <p>A flaw was discovered in the Linux implementation of string matching
- within a packet. A privileged user (with root or CAP_NET_ADMIN) can
- take advantage of this flaw to cause a kernel panic when inserting
- iptables rules。</p></li>
-
-</ul>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 4.19.171-2。</p>
-
-<p>我们建议您升级您的 linux 软件包。</p>
-
-<p>查看关于 linux 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/linux">\
-https://security-tracker.debian.org/tracker/linux</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4843.data"
diff --git a/chinese/security/2021/dsa-4844.wml b/chinese/security/2021/dsa-4844.wml
deleted file mode 100644
index 3f11c18872e..00000000000
--- a/chinese/security/2021/dsa-4844.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="3b85f13b6ae7d2b5dc01f391605934669f18117f"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>JSOF的Moshe Kol和Shlomi Oberman在dnsmasq中发现了几个漏洞,
-dnsmasq是一个小型的缓存DNS代理和DHCP/TFTP服务器。
-它们可能导致拒绝服务、缓存中毒或执行任意代码。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 2.80-1+deb10u1。</p>
-
-<p>我们建议您升级您的 dnsmasq 软件包。</p>
-
-<p>查看关于 dnsmasq 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/dnsmasq">\
-https://security-tracker.debian.org/tracker/dnsmasq</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4844.data"
diff --git a/chinese/security/2021/dsa-4845.wml b/chinese/security/2021/dsa-4845.wml
deleted file mode 100644
index 8e1647327c9..00000000000
--- a/chinese/security/2021/dsa-4845.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="5953186c6296cf5c12835b1379935c80bc126430"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>OpenLDAP是轻量级目录访问协议的免费实现,在其中发现了几个漏洞。
-未经验证的远程攻击者可以利用这些缺陷,通过精心构建的数据包造成拒绝服务
-(slapd daemon崩溃、无限循环)。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 2.4.47+dfsg-3+deb10u5。</p>
-
-<p>我们建议您升级您的 openldap 软件包。</p>
-
-<p>查看关于 openldap 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/openldap">\
-https://security-tracker.debian.org/tracker/openldap</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4845.data"
diff --git a/chinese/security/2021/dsa-4846.wml b/chinese/security/2021/dsa-4846.wml
deleted file mode 100644
index 0bf8bdc41a0..00000000000
--- a/chinese/security/2021/dsa-4846.wml
+++ /dev/null
@@ -1,150 +0,0 @@
-#use wml::debian::translation-check translation="603ec322379c4d19ac2617c6e9f713349947c37e"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>chromium web浏览器中发现了多个漏洞。</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-16044">CVE-2020-16044</a>
-
- <p>Ned Williamson 在 WebRTC 实现中发现了 use-after-free 问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21117">CVE-2021-21117</a>
-
- <p>Rory McNamara 在 Cryptohome 中发现了一个策略执行问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21118">CVE-2021-21118</a>
-
- <p>Tyler Nighswander 在v8 javascript库中发现了一个数据验证问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21119">CVE-2021-21119</a>
-
- <p>媒体处理中发现了 use-after-free 问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21120">CVE-2021-21120</a>
-
- <p>Nan Wang 和 Guang Gong 在 WebSQL 实现中发现一个 use-after-free 问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21121">CVE-2021-21121</a>
-
- <p>Leecraso 和 Guang Gong 在 Omnibox 中发现了一个 use-after-free 问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21122">CVE-2021-21122</a>
-
- <p>Renata Hodovan 在 Blink/WebKit 中发现了一个 use-after-free 问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21123">CVE-2021-21123</a>
-
- <p>Maciej Pulikowski 发现了一个数据验证问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21124">CVE-2021-21124</a>
-
- <p>Chaoyang Ding 在语音识别器发现了一个 use-after-free 问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21125">CVE-2021-21125</a>
-
- <p>Ron Masas 发现了一个策略执行问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21126">CVE-2021-21126</a>
-
- <p>David Erceg 在扩展中发现了一个策略执行问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21127">CVE-2021-21127</a>
-
- <p>Jasminder Pal Singh 在扩展中发现了一个策略执行问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21128">CVE-2021-21128</a>
-
- <p>Liang Dong 在 Blink/WebKit 中发现了缓冲区溢出问题t。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21129">CVE-2021-21129</a>
-
- <p>Maciej Pulikowski 发现了一个策略执行问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21130">CVE-2021-21130</a>
-
- <p>Maciej Pulikowski 发现了一个策略执行问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21131">CVE-2021-21131</a>
-
- <p>Maciej Pulikowski 发现了一个策略执行问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21132">CVE-2021-21132</a>
-
- <p>David Erceg 在开发人员工具中发现了一个实现错误。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21133">CVE-2021-21133</a>
-
- <p>wester0x01 发现了一个策略执行问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21134">CVE-2021-21134</a>
-
- <p>wester0x01 发现了一个用户接口错误。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21135">CVE-2021-21135</a>
-
- <p>ndevtk 在性能API中发现了一个实现错误。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21136">CVE-2021-21136</a>
-
- <p>Shiv Sahni, Movnavinothan V 和 Imdad Mohammed 发现了一个策略执行错误。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21137">CVE-2021-21137</a>
-
- <p>bobbybear 在开发人员工具中发现了一个实现错误。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21138">CVE-2021-21138</a>
-
- <p>Weipeng Jiang 在开发人员工具中发现了一个 use-after-free 错误。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21139">CVE-2021-21139</a>
-
- <p>Jun Kokatsu 在iframe沙盒中发现了一个实现错误。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21140">CVE-2021-21140</a>
-
- <p>David Manouchehri 在USB实现中发现了未初始化的内存。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21141">CVE-2021-21141</a>
-
- <p>Maciej Pulikowski 发现了一个策略执行错误。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21142">CVE-2021-21142</a>
-
- <p>Khalil Zhani 发现了一个 use-after-free 问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21143">CVE-2021-21143</a>
-
- <p>Allen Parker 和 Alex Morgan 在扩展中发现了缓冲区溢出问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21144">CVE-2021-21144</a>
-
- <p>Leecraso 和 Guang Gong 发现了缓冲区溢出问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21145">CVE-2021-21145</a>
-
- <p>发现了一个 use-after-free 问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21146">CVE-2021-21146</a>
-
- <p>Alison Huffman 和 Choongwoo Han 发现了一个 use-after-free 问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21147">CVE-2021-21147</a>
-
- <p>Roman Starkov 在skia库中发现了一个实现错误。</p></li>
-
-</ul>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 88.0.4324.146-1~deb10u1。</p>
-
-<p>我们建议您升级您的 chromium 软件包。</p>
-
-<p>查看关于 chromium 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/chromium">\
-https://security-tracker.debian.org/tracker/chromium</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4846.data"
diff --git a/chinese/security/2021/dsa-4847.wml b/chinese/security/2021/dsa-4847.wml
deleted file mode 100644
index 4fd5ade4aca..00000000000
--- a/chinese/security/2021/dsa-4847.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="f948129211d92c2e0093fb2dbf1fe25c4da5f837"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>在嵌入式设备的网络管理器 ConnMan 中发现了一个远程信息泄漏漏洞
-和一个远程缓冲区溢出漏洞,这可能导致拒绝服务或执行任意代码。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 1.36-2.1~deb10u1。</p>
-
-<p>我们建议您升级您的 connman 软件包。</p>
-
-<p>查看关于 connman 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/connman">\
-https://security-tracker.debian.org/tracker/connman</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4847.data"
diff --git a/chinese/security/2021/dsa-4848.wml b/chinese/security/2021/dsa-4848.wml
deleted file mode 100644
index e3e9bcb5836..00000000000
--- a/chinese/security/2021/dsa-4848.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="35d36e32dc79a523fa0577da0912f84adca764e0"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>在Go编程语言的实现中发现了多个安全问题,这可能会导致拒绝服务,
-P-224曲线实现可能会生成不正确的输出。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 1.11.6-1+deb10u4。</p>
-
-<p>我们建议您升级您的 golang-1.11 软件包。</p>
-
-<p>查看关于 golang-1.11 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/golang-1.11">\
-https://security-tracker.debian.org/tracker/golang-1.11</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4848.data"
diff --git a/chinese/security/2021/dsa-4849.wml b/chinese/security/2021/dsa-4849.wml
deleted file mode 100644
index e2ba35038ad..00000000000
--- a/chinese/security/2021/dsa-4849.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="6a616753f50ac040bb0442c928584ff59857f54c"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Roman Fiedler 在 firejail 中的 OverlayFS 代码中发现一个漏洞,
-firejail 是一个沙盒程序,用于限制不受信任应用程序的运行环境,
-这可能导致ROOT权限提升。
-此更新将禁用 firejail 中的 OverlayFS 支持。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 0.9.58.2-2+deb10u2。</p>
-
-<p>我们建议您升级您的 firejail 软件包。</p>
-
-<p>查看关于 firejail 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/firejail">https://security-tracker.debian.org/tracker/firejail</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4849.data"
diff --git a/chinese/security/2021/dsa-4850.wml b/chinese/security/2021/dsa-4850.wml
deleted file mode 100644
index c5831bb48b5..00000000000
--- a/chinese/security/2021/dsa-4850.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="5c3dfa640369c614f0e6c9553cd46fdf11abddde"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>发现压缩实用程序 zstd 临时公开了其输入的全部可读版本,即使原始文件具有控制权限。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 1.3.8+dfsg-3+deb10u1。</p>
-
-<p>我们建议您升级您的 libzstd 软件包。</p>
-
-<p>查看关于 libzstd 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/libzstd">\
-https://security-tracker.debian.org/tracker/libzstd</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4850.data"
diff --git a/chinese/security/2021/dsa-4851.wml b/chinese/security/2021/dsa-4851.wml
deleted file mode 100644
index cd89abcd035..00000000000
--- a/chinese/security/2021/dsa-4851.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="d006ce565fcf7220e57c35571bee0fdf83341df6"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Thomas Akesson 在版本控制系统Subversion的 mod_authz_svn 模块中发现
-了一个可远程触发的漏洞。当在存储库中使用 AuthzSVNReposRelativeAccessFile 选项
-的authz规则时,未经身份验证的远程客户端可以通过发送对不存在的存储库 URL 的请求
-来利用此漏洞导致拒绝服务。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 1.10.4-1+deb10u2。</p>
-
-<p>我们建议您升级您的 subversion 软件包。</p>
-
-<p>查看关于 subversion 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/subversion">https://security-tracker.debian.org/tracker/subversion</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4851.data"
diff --git a/chinese/security/2021/dsa-4852.wml b/chinese/security/2021/dsa-4852.wml
deleted file mode 100644
index d8f29775c31..00000000000
--- a/chinese/security/2021/dsa-4852.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="1c4239860022f3a722fee53eebd9a97b979ab14b"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Joakim Hindersson 发现基于软件的以太网虚拟交换机 openvswitch 允许恶意用户通过
-发送精心构建的数据包来造成拒绝服务。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 2.10.7+ds1-0+deb10u1。</p>
-
-<p>我们建议您升级您的 openvswitch 软件包。</p>
-
-<p>查看关于 openvswitch 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/openvswitch">\
-https://security-tracker.debian.org/tracker/openvswitch</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4852.data"
diff --git a/chinese/security/2021/dsa-4853.wml b/chinese/security/2021/dsa-4853.wml
deleted file mode 100644
index 8a23aa46fb1..00000000000
--- a/chinese/security/2021/dsa-4853.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="b277300840a940d2378dcbdbbc797aff8067437d"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>发现 SPIP,一种用于发布的网站引擎,允许恶意用户执行跨站点脚本攻击、
-访问敏感信息或执行任意代码。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 3.2.4-1+deb10u4。</p>
-
-<p>我们建议您升级您的 spip 软件包。</p>
-
-<p>查看关于 spip 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/spip">\
-https://security-tracker.debian.org/tracker/spip</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4853.data"
diff --git a/chinese/security/2021/dsa-4854.wml b/chinese/security/2021/dsa-4854.wml
deleted file mode 100644
index 5b4f0c16941..00000000000
--- a/chinese/security/2021/dsa-4854.wml
+++ /dev/null
@@ -1,25 +0,0 @@
-#use wml::debian::translation-check translation="c85aa63fe1c5972ca4ac07ff9adf7c38a41f1475"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>在 webkit2gtk web 引擎中发现了以下漏洞。</p>
-
-<ul>
-<li>
-<a href="https://security-tracker.debian.org/tracker/CVE-2020-13558">CVE-2020-13558</a>
-<p>Marcin Noga 发现,处理恶意构建的 web 内容可能导致任意代码执行。</p>
-</li>
-</ul>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 2.30.5-1~deb10u1。</p>
-
-<p>我们建议您升级您的 webkit2gtk 软件包。</p>
-
-<p>查看关于 webkit2gtk 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/webkit2gtk">\
-https://security-tracker.debian.org/tracker/webkit2gtk</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4854.data"
diff --git a/chinese/security/2021/dsa-4855.wml b/chinese/security/2021/dsa-4855.wml
deleted file mode 100644
index 55e8918d6f9..00000000000
--- a/chinese/security/2021/dsa-4855.wml
+++ /dev/null
@@ -1,28 +0,0 @@
-#use wml::debian::translation-check translation="0b9c89566ef13daffbc9185681dac5de2ae0d592"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>在安全套接字层工具包OpenSSL中发现了多个漏洞。
-在x64_64 Montgomery 平方过程中发现了溢出错误、
-CipherUpdate 中发现整数溢出
-以及 X509_issuer_and_serial_hash() 空指针解引用缺陷,
-这可能会导致拒绝服务。</p>
-
-<p>更多信息参见上游警报:
-<a href="https://www.openssl.org/news/secadv/20191206.txt">\
-https://www.openssl.org/news/secadv/20191206.txt</a> 和
-<a href="https://www.openssl.org/news/secadv/20210216.txt">\
-https://www.openssl.org/news/secadv/20210216.txt</a>。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 1.1.1d-0+deb10u5。</p>
-
-<p>我们建议您升级您的 openssl 软件包。</p>
-
-<p>查看关于 openssl 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/openssl">\
-https://security-tracker.debian.org/tracker/openssl</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4855.data"
diff --git a/chinese/security/2021/dsa-4856.wml b/chinese/security/2021/dsa-4856.wml
deleted file mode 100644
index 94238d9b1cc..00000000000
--- a/chinese/security/2021/dsa-4856.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="3db6cc25244cc7b89a4f96961d7636ae98e489e1"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>PHP是一种广泛使用的开源通用脚本语言,它存在多个安全问题,可能导致拒绝服务、
-信息泄露、cookie伪造或错误的加密。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 7.3.27-1~deb10u1。</p>
-
-<p>我们建议您升级您的 php7.3 软件包。</p>
-
-<p>查看关于 php7.3 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/php7.3">\
-https://security-tracker.debian.org/tracker/php7.3</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4856.data"
diff --git a/chinese/security/2021/dsa-4857.wml b/chinese/security/2021/dsa-4857.wml
deleted file mode 100644
index 31cbe8b3d8f..00000000000
--- a/chinese/security/2021/dsa-4857.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="f11c835c6487253210688706e7b7c11464c54a6c"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>在SPNEGO实现中发现了一个缓冲区溢出漏洞,该漏洞会影响BIND(DNS服务器实现)
-中的GSSAPI安全策略协商,从而导致拒绝服务(守护进程崩溃)或可能执行任意代码</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 1:9.11.5.P4+dfsg-5.1+deb10u3。</p>
-
-<p>我们建议您升级您的 bind9 软件包。</p>
-
-<p>查看关于 bind9 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/bind9">https://security-tracker.debian.org/tracker/bind9</a>。</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4857.data"
diff --git a/chinese/security/2021/dsa-4858.wml b/chinese/security/2021/dsa-4858.wml
deleted file mode 100644
index 8e0b91cd393..00000000000
--- a/chinese/security/2021/dsa-4858.wml
+++ /dev/null
@@ -1,62 +0,0 @@
-#use wml::debian::translation-check translation="0f4f3e8210b7403850a5550da354ea08036f8c2f"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>chromium web浏览器中发现了多个漏洞</p>
-
-<ul>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21148">CVE-2021-21148</a>
-
- <p>Mattias Buelens 在v8 javascript库中发现了一个缓冲区溢出问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21149">CVE-2021-21149</a>
-
- <p>Ryoya Tsukasaki 在数据传输实现中发现堆栈溢出问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21150">CVE-2021-21150</a>
-
- <p>Woojin Oh 在文件下载中发现了一个 use-after-free(释放后可重用)问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21151">CVE-2021-21151</a>
-
- <p>Khalil Zhani 在支付系统中发现了一个 use-after-free 问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21152">CVE-2021-21152</a>
-
- <p>在媒体处理中发现缓冲区溢出。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21153">CVE-2021-21153</a>
-
- <p>Jan Ruge 在GPU进程中发现堆栈溢出问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21154">CVE-2021-21154</a>
-
- <p>Abdulrahman Alqabandi 在Tab Strip实现中发现缓冲区溢出问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21155">CVE-2021-21155</a>
-
- <p>Khalil Zhani 在Tab Strip实现中发现缓冲区溢出问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21156">CVE-2021-21156</a>
-
- <p>Sergei Glazunov 在v8 javascript库中发现了一个缓冲区溢出问题。</p></li>
-
-<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-21157">CVE-2021-21157</a>
-
- <p>在websockets实现中发现了一个 use-after-free 问题。</p></li>
-
-</ul>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 88.0.4324.182-1~deb10u1。</p>
-
-<p>我们建议您升级您的 chromium 软件包。</p>
-
-<p>查看关于 chromium 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/chromium">\
-https://security-tracker.debian.org/tracker/chromium</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4858.data"
diff --git a/chinese/security/2021/dsa-4859.wml b/chinese/security/2021/dsa-4859.wml
deleted file mode 100644
index a5ccaa52d8f..00000000000
--- a/chinese/security/2021/dsa-4859.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="123908fe74f54620222a349a507f9178a2faf07a"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>发现压缩实用程序zstd易受多线程竞争条件的影响:即使原始文件具有限制权限,
-它也会在很短的时间内临时公开其输入的所有用户可读版本。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 1.3.8+dfsg-3+deb10u2。</p>
-
-<p>我们建议您升级您的 libzstd 软件包。</p>
-
-<p>查看关于 libzstd 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/libzstd">\
-https://security-tracker.debian.org/tracker/libzstd</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4859.data"
diff --git a/chinese/security/2021/dsa-4860.wml b/chinese/security/2021/dsa-4860.wml
deleted file mode 100644
index ed7779667cf..00000000000
--- a/chinese/security/2021/dsa-4860.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="17b26eb27e095ada2631f748a90b0252c6b1437d"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>在OpenLDAP中发现了证书列表精确断言验证(Certificate List Exact Assertion)
-中的漏洞,OpenLDAP是轻量级目录访问协议的免费实现。未经身份验证的远程攻击者
-可以利用此漏洞通过精心构建的数据包造成拒绝服务(slapd daemon崩溃)。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 2.4.47+dfsg-3+deb10u6。</p>
-
-<p>我们建议您升级您的 openldap 软件包。</p>
-
-<p>查看关于 openldap 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/openldap">https://security-tracker.debian.org/tracker/openldap</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4860.data"
diff --git a/chinese/security/2021/dsa-4861.wml b/chinese/security/2021/dsa-4861.wml
deleted file mode 100644
index 8a440246be1..00000000000
--- a/chinese/security/2021/dsa-4861.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="25518192d421a3133547e82abb73fb6b6e248f73"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Felix Weinmann 报告 screen 在处理组合字符时存在缺陷,
-screen 是具有 VT100/ANSI 终端仿真的终端多路复用器,
-这可能导致拒绝服务,或通过精心构建的 UTF-8 字符序列执行任意代码。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 4.6.2-3+deb10u1。</p>
-
-<p>我们建议您升级您的 screen 软件包。</p>
-
-<p>查看关于 screen 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/screen">https://security-tracker.debian.org/tracker/screen</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4861.data"
diff --git a/chinese/security/2021/dsa-4862.wml b/chinese/security/2021/dsa-4862.wml
deleted file mode 100644
index fdf8fa790bb..00000000000
--- a/chinese/security/2021/dsa-4862.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="7dfc4e9cb47cfdd07f29cd7fd327dd0b8aaa8173"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Mozilla Firefox web 浏览器中发现多个安全问题,这可能导致执行任意代码或信息泄露。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 78.8.0esr-1~deb10u1。</p>
-
-<p>我们建议您升级您的 firefox-esr 软件包。</p>
-
-<p>查看关于 firefox-esr 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/firefox-esr">\
-https://security-tracker.debian.org/tracker/firefox-esr</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4862.data"
diff --git a/chinese/security/2021/dsa-4863.wml b/chinese/security/2021/dsa-4863.wml
deleted file mode 100644
index 4de5f5d0f55..00000000000
--- a/chinese/security/2021/dsa-4863.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="7d3c74be8da3768df1cdde9dc5637023c2b5b5e2"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>在 Node.js 中发现了两个漏洞,这可能导致拒绝服务或DNS重绑定攻击。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 10.24.0~dfsg-1~deb10u1。</p>
-
-<p>我们建议您升级您的 nodejs 软件包。</p>
-
-<p>查看关于 nodejs 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/nodejs">\
-https://security-tracker.debian.org/tracker/nodejs</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4863.data"
diff --git a/chinese/security/2021/dsa-4864.wml b/chinese/security/2021/dsa-4864.wml
deleted file mode 100644
index c68b72edc01..00000000000
--- a/chinese/security/2021/dsa-4864.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="8270ea7b516481664732e77ea8ce861b543af400"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>Beast Glatisant 和 Jelmer Vernooij 报告 python-aiohttp
-(一种异步HTTP客户端/服务端框架)容易出现开放式重定向漏洞。
-恶意创建的指向基于 aiohttp 的 web 服务的链接可能会将浏览器重定向到其他网站。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 3.5.1-1+deb10u1。</p>
-
-<p>我们建议您升级您的 python-aiohttp 软件包。</p>
-
-<p>查看关于 python-aiohttp 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/python-aiohttp">\
-https://security-tracker.debian.org/tracker/python-aiohttp</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4864.data"
diff --git a/chinese/security/2021/dsa-4865.wml b/chinese/security/2021/dsa-4865.wml
deleted file mode 100644
index 90788af482b..00000000000
--- a/chinese/security/2021/dsa-4865.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="d2d43f7892fddceb361d33ffe2506775b6501ee8"
-<define-tag description>安全更新</define-tag>
-<define-tag moreinfo>
-<p>在Docker(一个Linux容器运行时)中发现了多个安全问题,
-这可能导致拒绝服务、信息泄漏或权限提升。</p>
-
-<p>在稳定版(buster)中,此问题已被修复于
-版本 18.09.1+dfsg1-7.1+deb10u3。</p>
-
-<p>我们建议您升级您的 docker.io 软件包。</p>
-
-<p>查看关于 docker.io 的详细信息,
-请访问其安全追踪页面
-<a href="https://security-tracker.debian.org/tracker/docker.io">\
-https://security-tracker.debian.org/tracker/docker.io</a></p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2021/dsa-4865.data"
diff --git a/chinese/security/2021/index.wml b/chinese/security/2021/index.wml
deleted file mode 100644
index c1e340231ae..00000000000
--- a/chinese/security/2021/index.wml
+++ /dev/null
@@ -1,12 +0,0 @@
-#use wml::debian::translation-check translation="6924311eff583467dfc63d4affd3eca6c37ec5be"
-<define-tag pagetitle>2021 年安全通告</define-tag>
-#use wml::debian::template title="<pagetitle>" GEN_TIME="yes"
-#use wml::debian::recent_list
-
-<:= get_recent_list ('.', '0', '$(ENGLISHDIR)/security/2021', '', 'dsa-\d+' ) :>
-
-<p>要获取最新 Debian 安全通告,
-您可以订阅我们的
-<a href="https://lists.debian.org/debian-security-announce/">\
-<strong>debian-security-announce</strong></a>邮件列表。
-您也可以<a href="https://lists.debian.org/debian-security-announce/debian-security-announce-2021/">浏览列表的在线存档</a>。</p>

© 2014-2024 Faster IT GmbH | imprint | privacy policy